Sample records for multiple access control

  1. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  2. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  3. System access control study

    DOT National Transportation Integrated Search

    1974-06-01

    The report presents a summary of a study conducted for the Transportation Systems Center of promising access control techniques which are applicable to an aeronautical satellite system. Several frequency division multiple access (FDMA) and time divis...

  4. Feedback power control strategies in wireless sensor networks with joint channel decoding.

    PubMed

    Abrardo, Andrea; Ferrari, Gianluigi; Martalò, Marco; Perna, Fabio

    2009-01-01

    In this paper, we derive feedback power control strategies for block-faded multiple access schemes with correlated sources and joint channel decoding (JCD). In particular, upon the derivation of the feasible signal-to-noise ratio (SNR) region for the considered multiple access schemes, i.e., the multidimensional SNR region where error-free communications are, in principle, possible, two feedback power control strategies are proposed: (i) a classical feedback power control strategy, which aims at equalizing all link SNRs at the access point (AP), and (ii) an innovative optimized feedback power control strategy, which tries to make the network operational point fall in the feasible SNR region at the lowest overall transmit energy consumption. These strategies will be referred to as "balanced SNR" and "unbalanced SNR," respectively. While they require, in principle, an unlimited power control range at the sources, we also propose practical versions with a limited power control range. We preliminary consider a scenario with orthogonal links and ideal feedback. Then, we analyze the robustness of the proposed power control strategies to possible non-idealities, in terms of residual multiple access interference and noisy feedback channels. Finally, we successfully apply the proposed feedback power control strategies to a limiting case of the class of considered multiple access schemes, namely a central estimating officer (CEO) scenario, where the sensors observe noisy versions of a common binary information sequence and the AP's goal is to estimate this sequence by properly fusing the soft-output information output by the JCD algorithm.

  5. Traffic handling capability of a broadband indoor wireless network using CDMA multiple access

    NASA Astrophysics Data System (ADS)

    Zhang, Chang G.; Hafez, H. M.; Falconer, David D.

    1994-05-01

    CDMA (code division multiple access) may be an attractive technique for wireless access to broadband services because of its multiple access simplicity and other appealing features. In order to investigate traffic handling capabilities of a future network providing a variety of integrated services, this paper presents a study of a broadband indoor wireless network supporting high-speed traffic using CDMA multiple access. The results are obtained through the simulation of an indoor environment and the traffic capabilities of the wireless access to broadband 155.5 MHz ATM-SONET networks using the mm-wave band. A distributed system architecture is employed and the system performance is measured in terms of call blocking probability and dropping probability. The impacts of the base station density, traffic load, average holding time, and variable traffic sources on the system performance are examined. The improvement of system performance by implementing various techniques such as handoff, admission control, power control and sectorization are also investigated.

  6. Feedback Power Control Strategies in Wireless Sensor Networks with Joint Channel Decoding

    PubMed Central

    Abrardo, Andrea; Ferrari, Gianluigi; Martalò, Marco; Perna, Fabio

    2009-01-01

    In this paper, we derive feedback power control strategies for block-faded multiple access schemes with correlated sources and joint channel decoding (JCD). In particular, upon the derivation of the feasible signal-to-noise ratio (SNR) region for the considered multiple access schemes, i.e., the multidimensional SNR region where error-free communications are, in principle, possible, two feedback power control strategies are proposed: (i) a classical feedback power control strategy, which aims at equalizing all link SNRs at the access point (AP), and (ii) an innovative optimized feedback power control strategy, which tries to make the network operational point fall in the feasible SNR region at the lowest overall transmit energy consumption. These strategies will be referred to as “balanced SNR” and “unbalanced SNR,” respectively. While they require, in principle, an unlimited power control range at the sources, we also propose practical versions with a limited power control range. We preliminary consider a scenario with orthogonal links and ideal feedback. Then, we analyze the robustness of the proposed power control strategies to possible non-idealities, in terms of residual multiple access interference and noisy feedback channels. Finally, we successfully apply the proposed feedback power control strategies to a limiting case of the class of considered multiple access schemes, namely a central estimating officer (CEO) scenario, where the sensors observe noisy versions of a common binary information sequence and the AP's goal is to estimate this sequence by properly fusing the soft-output information output by the JCD algorithm. PMID:22291536

  7. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  8. Asynchronous, Decentralized DS-CDMA Using Feedback-Controlled Spreading Sequences for Time-Dispersive Channels

    NASA Astrophysics Data System (ADS)

    Miyatake, Teruhiko; Chiba, Kazuki; Hamamura, Masanori; Tachikawa, Shin'ichi

    We propose a novel asynchronous direct-sequence codedivision multiple access (DS-CDMA) using feedback-controlled spreading sequences (FCSSs) (FCSS/DS-CDMA). At the receiver of FCSS/DS-CDMA, the code-orthogonalizing filter (COF) produces a spreading sequence, and the receiver returns the spreading sequence to the transmitter. Then the transmitter uses the spreading sequence as its updated version. The performance of FCSS/DS-CDMA is evaluated over time-dispersive channels. The results indicate that FCSS/DS-CDMA greatly suppresses both the intersymbol interference (ISI) and multiple access interference (MAI) over time-invariant channels. FCSS/DS-CDMA is applicable to the decentralized multiple access.

  9. Gambling involvement and increased risk of gambling problems.

    PubMed

    Phillips, James G; Ogeil, Rowan; Chow, Yang-Wai; Blaszczynski, Alex

    2013-12-01

    The opportunity to gamble has undergone rapid expansion with technology allowing for access to gambling products 24 h a day. This increased online availability challenges governments' abilities to restrict access to gambling. Indeed, the ready access to multiple forms of gambling may potentially contribute to impaired control over urges for problem gamblers. The present study considered whether problem gamblers manifested a tendency to engage in multiple forms of gambling and identified forms of gambling which were more strongly related to problem gambling. In reanalyses of two surveys (Sample 1, N = 464, Sample 2, N = 1141), significant relationships accounting for between 11.3 and 13.5% of the variance were found between the numbers of forms of gambling accessed and degree of problem. Participation in online poker, playing cards and sports wagering were linked to problem gambling. Access to multiple forms of gambling may pose difficulties for the tracking and control of gambling.

  10. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    PubMed

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  11. Multiple access techniques and spectrum utilization of the GLOBALSTAR mobile satellite system

    NASA Astrophysics Data System (ADS)

    Louie, Ming; Cohen, Michel; Rouffet, Denis; Gilhousen, Klein S.

    The GLOBALSTAR System is a Low Earth Orbit (LEO) satellite-based mobile communications system that is interoperable with the current and future Public Land Mobile Network (PLMN). The GLOBALSTAR System concept is based upon technological advancement in two key areas: (1) the advancement in LEO satellite technology; (2) the advancement in cellular telephone technology, including the commercial applications of Code Division Multiple Access (CDMA) technologies, and of the most recent progress in Time Division Multiple Access technologies. The GLOBALSTAR System uses elements of CDMA, Frequency Division Multiple Access (FDMA), and Time Division Multiple Access (TDMA) technology, combining with satellite Multiple Beam Antenna (MBA) technology, to arrive at one of the most efficient modulation and multiple access system ever proposed for a satellite communications system. The technology used in GLOBALSTAR exploits the following techniques in obtaining high spectral efficiency and affordable cost per channel, with minimum coordination among different systems: power control, in open and closed loops, voice activation, spot beam satellite antenna for frequency reuse, weighted satellite antenna gain, multiple satellite coverage, and handoff between satellites. The GLOBALSTAR system design will use the following frequency bands: 1610-1626.5 MHz for up-link and 2483.5-2500 MHz for down-link.

  12. Embedded diagnostic, prognostic, and health management system and method for a humanoid robot

    NASA Technical Reports Server (NTRS)

    Barajas, Leandro G. (Inventor); Strawser, Philip A (Inventor); Sanders, Adam M (Inventor); Reiland, Matthew J (Inventor)

    2013-01-01

    A robotic system includes a humanoid robot with multiple compliant joints, each moveable using one or more of the actuators, and having sensors for measuring control and feedback data. A distributed controller controls the joints and other integrated system components over multiple high-speed communication networks. Diagnostic, prognostic, and health management (DPHM) modules are embedded within the robot at the various control levels. Each DPHM module measures, controls, and records DPHM data for the respective control level/connected device in a location that is accessible over the networks or via an external device. A method of controlling the robot includes embedding a plurality of the DPHM modules within multiple control levels of the distributed controller, using the DPHM modules to measure DPHM data within each of the control levels, and recording the DPHM data in a location that is accessible over at least one of the high-speed communication networks.

  13. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  14. Securely and Flexibly Sharing a Biomedical Data Management System

    PubMed Central

    Wang, Fusheng; Hussels, Phillip; Liu, Peiya

    2011-01-01

    Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285

  15. Scalable Lunar Surface Networks and Adaptive Orbit Access

    NASA Technical Reports Server (NTRS)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  16. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  17. Newer Technologies for School Security. ERIC Digest Number 145.

    ERIC Educational Resources Information Center

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  18. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  19. Design analysis tracking and data relay satellite simulation system

    NASA Technical Reports Server (NTRS)

    1974-01-01

    The design and development of the equipment necessary to simulate the S-band multiple access link between user spacecraft, the Tracking and Data Relay Satellite, and a ground control terminal are discussed. The core of the S-band multiple access concept is the use of an Adaptive Ground Implemented Phased Array. The array contains thirty channels and provides the multiplexing and demultiplexing equipment required to demonstrate the ground implemented beam forming feature. The system provided will make it possible to demonstrate the performance of a desired user and ten interfering sources attempting to pass data through the multiple access system.

  20. Tecnologias mas nuevas para la seguridad escolar (Newer Technologies for School Security). ERIC Digest.

    ERIC Educational Resources Information Center

    Schneider, Tod

    This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…

  1. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  2. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    PubMed

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS.

  3. Beam Design and User Scheduling for Nonorthogonal Multiple Access With Multiple Antennas Based on Pareto Optimality

    NASA Astrophysics Data System (ADS)

    Seo, Junyeong; Sung, Youngchul

    2018-06-01

    In this paper, an efficient transmit beam design and user scheduling method is proposed for multi-user (MU) multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) downlink, based on Pareto-optimality. The proposed beam design and user scheduling method groups simultaneously-served users into multiple clusters with practical two users in each cluster, and then applies spatical zeroforcing (ZF) across clusters to control inter-cluster interference (ICI) and Pareto-optimal beam design with successive interference cancellation (SIC) to two users in each cluster to remove interference to strong users and leverage signal-to-interference-plus-noise ratios (SINRs) of interference-experiencing weak users. The proposed method has flexibility to control the rates of strong and weak users and numerical results show that the proposed method yields good performance.

  4. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  5. A simple, effective media access protocol system for integrated, high data rate networks

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.; Maly, K.; Overstreet, C. M.; Khanna, S.; Zhang, L.

    1992-01-01

    The operation and performance of a dual media access protocol for integrated, gigabit networks are described. Unlike other dual protocols, each protocol supports a different class of traffic. The Carrier Sensed Multiple Access-Ring Network (CSMA/RN) protocol and the Circulating Reservation Packet (CRP) protocol support asynchronous and synchronous traffic, respectively. The two protocols operate with minimal impact upon each other. Performance information demonstrates that they support a complete range of integrated traffic loads, do not require call setup/termination or a special node for synchronous traffic control, and provide effective pre-use and recovery. The CRP also provides guaranteed access and fairness control for the asynchronous system. The paper demonstrates that the CSMA-CRP system fulfills many of the requirements for gigabit LAN-MAN networks most effectively and simply. To accomplish this, CSMA-CRP features are compared against similar ring and bus systems, such as Cambridge Fast Ring, Metaring, Cyclic Reservation Multiple Access, and Distributed Dual Queue Data Bus (DQDB).

  6. Distributed observing facility for remote access to multiple telescopes

    NASA Astrophysics Data System (ADS)

    Callegari, Massimo; Panciatici, Antonio; Pasian, Fabio; Pucillo, Mauro; Santin, Paolo; Aro, Simo; Linde, Peter; Duran, Maria A.; Rodriguez, Jose A.; Genova, Francoise; Ochsenbein, Francois; Ponz, J. D.; Talavera, Antonio

    2000-06-01

    The REMOT (Remote Experiment Monitoring and conTrol) project was financed by 1996 by the European Community in order to investigate the possibility of generalizing the remote access to scientific instruments. After the feasibility of this idea was demonstrated, the DYNACORE (DYNAmically, COnfigurable Remote Experiment monitoring and control) project was initiated as a REMOT follow-up. Its purpose is to develop software technology to support scientists in two different domains, astronomy and plasma physics. The resulting system allows (1) simultaneous multiple user access to different experimental facilities, (2) dynamic adaptability to different kinds of real instruments, (3) exploitation of the communication infrastructures features, (4) ease of use through intuitive graphical interfaces, and (5) additional inter-user communication using off-the-shelf projects such as video-conference tools, chat programs and shared blackboards.

  7. UNificatins and Extensions of the Multiple Access Communications Problem,

    DTIC Science & Technology

    1981-07-01

    Control , Stability and Waiting Time in a Slotted ALOHA Random Access System ," IEEE...quceing, them, the control procedure must tolerate a larger average number of’ messages in the system if it is to limit the number of times that the system ...running fas- ter than real time to provide some flow control for that class . The virtual clocks for every other class merely act as a "gate" which

  8. Broadband Time Division Multiple Access (TDMA) Solution (Tech Insertion - C4 Enhancement for the U.S. Army in Transformation)

    DTIC Science & Technology

    2005-06-01

    synchronization , timing and frequency to all of the traffic terminals through the reference burst. The MRT also periodically synchronizes all of the traffic...1 2005 Command and Control Research and Technology Symposium The Future of C2 Broadband Time Division Multiple Access (TDMA) Solution...UK Army) Dale White Barry Kruse Shawn White LTC Edward Eidson Thomas Mims COL Charles Dunn III Charlie Pangle Battle Command Battle

  9. Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things.

    PubMed

    Sun, Yanjing; Guo, Yiyu; Li, Song; Wu, Dapeng; Wang, Bin

    2018-05-15

    In this paper, a joint non-orthogonal multiple access and time division multiple access (NOMA-TDMA) scheme is proposed in Industrial Internet of Things (IIoT), which allowed multiple sensors to transmit in the same time-frequency resource block using NOMA. The user scheduling, time slot allocation, and power control are jointly optimized in order to maximize the system α -fair utility under transmit power constraint and minimum rate constraint. The optimization problem is nonconvex because of the fractional objective function and the nonconvex constraints. To deal with the original problem, we firstly convert the objective function in the optimization problem into a difference of two convex functions (D.C.) form, and then propose a NOMA-TDMA-DC algorithm to exploit the global optimum. Numerical results show that the NOMA-TDMA scheme significantly outperforms the traditional orthogonal multiple access scheme in terms of both spectral efficiency and user fairness.

  10. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    NASA Technical Reports Server (NTRS)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  11. Multiple-User, Multitasking, Virtual-Memory Computer System

    NASA Technical Reports Server (NTRS)

    Generazio, Edward R.; Roth, Don J.; Stang, David B.

    1993-01-01

    Computer system designed and programmed to serve multiple users in research laboratory. Provides for computer control and monitoring of laboratory instruments, acquisition and anlaysis of data from those instruments, and interaction with users via remote terminals. System provides fast access to shared central processing units and associated large (from megabytes to gigabytes) memories. Underlying concept of system also applicable to monitoring and control of industrial processes.

  12. Undersea Communication Network Self-Localization during the Unet󈧌 Seatrial

    DTIC Science & Technology

    2010-06-01

    Multiple Access Collision Avoidance ( MACA ) suitable for underwater networks [6]. Control frames are short 9-byte utility packets which are...Proceedings of the MILCOM’08 Conference, San Diego, CA, USA, November 2008. [6] P. Karn, MACA --a new channel access method for packet radio, in ARRL/CRRL

  13. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  14. Policy-based secure communication with automatic key management for industrial control and automation systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less

  15. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    PubMed

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme.

  16. Comparison of FDMA and CDMA for second generation land-mobile satellite communications

    NASA Technical Reports Server (NTRS)

    Yongacoglu, A.; Lyons, R. G.; Mazur, B. A.

    1990-01-01

    Code Division Multiple Access (CDMA) and Frequency Division Multiple Access (FDMA) (both analog and digital) systems capacities are compared on the basis of identical link availabilities and physical propagation models. Parameters are optimized for a bandwidth limited, multibeam environment. For CDMA, the benefits of voice activated carriers, antenna discrimination, polarization reuse, return link power control and multipath suppression are included in the analysis. For FDMA, the advantages of bandwidth efficient modulation/coding combinations, voice activated carriers, polarization reuse, beam placement, and frequency staggering were taken into account.

  17. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  18. Distributed clinical data sharing via dynamic access-control policy transformation.

    PubMed

    Rezaeibagha, Fatemeh; Mu, Yi

    2016-05-01

    Data sharing in electronic health record (EHR) systems is important for improving the quality of healthcare delivery. Data sharing, however, has raised some security and privacy concerns because healthcare data could be potentially accessible by a variety of users, which could lead to privacy exposure of patients. Without addressing this issue, large-scale adoption and sharing of EHR data are impractical. The traditional solution to the problem is via encryption. Although encryption can be applied to access control, it is not applicable for complex EHR systems that require multiple domains (e.g. public and private clouds) with various access requirements. This study was carried out to address the security and privacy issues of EHR data sharing with our novel access-control mechanism, which captures the scenario of the hybrid clouds and need of access-control policy transformation, to provide secure and privacy-preserving data sharing among different healthcare enterprises. We introduce an access-control mechanism with some cryptographic building blocks and present a novel approach for secure EHR data sharing and access-control policy transformation in EHR systems for hybrid clouds. We propose a useful data sharing system for healthcare providers to handle various EHR users who have various access privileges in different cloud environments. A systematic study has been conducted on data sharing in EHR systems to provide a solution to the security and privacy issues. In conclusion, we introduce an access-control method for privacy protection of EHRs and EHR policy transformation that allows an EHR access-control policy to be transformed from a private cloud to a public cloud. This method has never been studied previously in the literature. Furthermore, we provide a protocol to demonstrate policy transformation as an application scenario. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. Review of manual control methods for handheld maneuverable instruments.

    PubMed

    Fan, Chunman; Dodou, Dimitra; Breedveld, Paul

    2013-06-01

    By the introduction of new technologies, surgical procedures have been varying from free access in open surgery towards limited access in minimal access surgery. Improving access to difficult-to-reach anatomic sites, e.g. in neurosurgery or percutaneous interventions, needs advanced maneuverable instrumentation. Advances in maneuverable technology require the development of dedicated methods enabling surgeons to stay in direct, manual control of these complex instruments. This article gives an overview of the state-of-the-art in the development of manual control methods for handheld maneuverable instruments. It categorizes the manual control methods in three levels: a) number of steerable segments, b) number of Degrees Of Freedom (DOF), and c) coupling between control motion of the handle and steering motion of the tip. The literature research was completed by using Web of Science, Scopus and PubMed. The study shows that in controlling single steerable segments, direct as well as indirect control methods have been developed, whereas in controlling multiple steerable segments, a gradual shift can be noticed from parallel and serial control to integrated control. The development of multi-segmented maneuverable instruments is still at an early stage, and an intuitive and effective method to control them has to become a primary focus in the domain of minimal access surgery.

  20. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  1. Microprocessor-controlled, wide-range streak camera

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Amy E. Lewis, Craig Hollabaugh

    Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storagemore » using flash-based storage media. The camera’s user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.« less

  2. Microprocessor-controlled wide-range streak camera

    NASA Astrophysics Data System (ADS)

    Lewis, Amy E.; Hollabaugh, Craig

    2006-08-01

    Bechtel Nevada/NSTec recently announced deployment of their fifth generation streak camera. This camera incorporates many advanced features beyond those currently available for streak cameras. The arc-resistant driver includes a trigger lockout mechanism, actively monitors input trigger levels, and incorporates a high-voltage fault interrupter for user safety and tube protection. The camera is completely modular and may deflect over a variable full-sweep time of 15 nanoseconds to 500 microseconds. The camera design is compatible with both large- and small-format commercial tubes from several vendors. The embedded microprocessor offers Ethernet connectivity, and XML [extensible markup language]-based configuration management with non-volatile parameter storage using flash-based storage media. The camera's user interface is platform-independent (Microsoft Windows, Unix, Linux, Macintosh OSX) and is accessible using an AJAX [asynchronous Javascript and XML]-equipped modem browser, such as Internet Explorer 6, Firefox, or Safari. User interface operation requires no installation of client software or browser plug-in technology. Automation software can also access the camera configuration and control using HTTP [hypertext transfer protocol]. The software architecture supports multiple-simultaneous clients, multiple cameras, and multiple module access with a standard browser. The entire user interface can be customized.

  3. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This may help transition from concept to reality the idea of using ensembles of simultaneously instantiated access control methodologies, thereby limiting insider threat. PMID:28758045

  4. Conceptual framework of the Controlling Asthma in American Cities Project.

    PubMed

    Herman, Elizabeth Jane

    2011-02-01

    The Controlling Asthma in American Cities Project (CAACP) was designed to improve the control of asthma in inner-city populations of children with a disparate burden of symptoms and adverse outcomes. As with many chronic diseases, asthma is the manifestation of multiple biologic, environmental, and social determinants. In addition to appropriate medical management, individuals with asthma must have logistical, financial, and cultural access to environments that allow avoidance of asthma triggers and encourage good asthma management practices. In recognition of this complexity, the CAACP required the seven project sites to coordinate and synchronize multiple interventions (education, healthcare access, medical management, trigger reduction) at multiple levels (individual, home, school, community, and policy) through the collaboration of relevant groups, institutions, and individuals. This paper describes the "program theory" of the CAACP project-the assumptions about how the project worked, how the components were linked, and what outcomes were anticipated. It relates the subsequent papers in the supplement to the program theory and describes how the papers can inform and guide other community-based interventions, and advance the translation of scientific knowledge to effective interventions in communities of need.

  5. [Endovascular interventions for multiple trauma].

    PubMed

    Kinstner, C; Funovics, M

    2014-09-01

    In recent years interventional radiology has significantly changed the management of injured patients with multiple trauma. Currently nearly all vessels can be reached within a reasonably short time with the help of specially preshaped catheters and guide wires to achieve bleeding control of arterial und venous bleeding. Whereas bleeding control formerly required extensive open surgery, current interventional methods allow temporary vessel occlusion (occlusion balloons), permanent embolization and stenting. In injured patients with multiple trauma preinterventional procedural planning is performed with the help of multidetector computed tomography whenever possible. Interventional radiology not only allows minimization of therapeutic trauma but also a considerably shorter treatment time. Interventional bleeding control has developed into a standard method in the management of vascular trauma of the chest and abdomen as well as in vascular injuries of the upper and lower extremities when open surgical access is associated with increased risk. Additionally, pelvic trauma, vascular trauma of the superior thoracic aperture and parenchymal arterial lacerations of organs that can be at least partially preserved are primarily managed by interventional methods. In an interdisciplinary setting interventional radiology provides a safe and efficient means of rapid bleeding control in nearly all vascular territories in addition to open surgical access.

  6. Multiple memory stores and operant conditioning: a rationale for memory's complexity.

    PubMed

    Meeter, Martijn; Veldkamp, Rob; Jin, Yaochu

    2009-02-01

    Why does the brain contain more than one memory system? Genetic algorithms can play a role in elucidating this question. Here, model animals were constructed containing a dorsal striatal layer that controlled actions, and a ventral striatal layer that controlled a dopaminergic learning signal. Both layers could gain access to three modeled memory stores, but such access was penalized as energy expenditure. Model animals were then selected on their fitness in simulated operant conditioning tasks. Results suggest that having access to multiple memory stores and their representations is important in learning to regulate dopamine release, as well as in contextual discrimination. For simple operant conditioning, as well as stimulus discrimination, hippocampal compound representations turned out to suffice, a counterintuitive result given findings that hippocampal lesions tend not to affect performance in such tasks. We argue that there is in fact evidence to support a role for compound representations and the hippocampus in even the simplest conditioning tasks.

  7. Multiple Phase Transitions in the Culture Dissemination

    NASA Astrophysics Data System (ADS)

    Wang, Bing; Han, Yuexing; Chen, Luonan; Aihara, Kazuyuki

    We study the coevolution process in the Axelrod’s model with the consideration of agents’ abilities to access to the information. With a parameter to control the ability of communication, we observe two kinds of phase transitions both for cultural domains and network fragments, respectively. With the simulation results, we find the relationship between the critical value and the controlled parameter. The results indicate that the powerful ability to access to the information benefits the dissemination of culture in the system.

  8. A CDMA system implementation with dimming control for visible light communication

    NASA Astrophysics Data System (ADS)

    Chen, Danyang; Wang, Jianping; Jin, Jianli; Lu, Huimin; Feng, Lifang

    2018-04-01

    Visible light communication (VLC), using solid-state lightings to transmit information, has become a complement technology to wireless radio communication. As a realistic multiple access scheme for VLC system, code division multiple access (CDMA) has attracted more and more attentions in recent years. In this paper, we address and implement an improved CDMA scheme for VLC system. The simulation results reveal that the improved CDMA scheme not only supports multi-users' transmission but also maintains dimming value at about 50% and enhances the system efficiency. It can also realize the flexible dimming control by adjusting some parameters of system structure, which rarely affects the system BER performance. A real-time experimental VLC system with improved CDMA scheme is performed based on field programmable gate array (FPGA), reaching a good BER performance.

  9. Design of the frame structure for a multiservice interactive system using ATM-PON

    NASA Astrophysics Data System (ADS)

    Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae

    1998-10-01

    The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.

  10. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  11. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  12. Analysis of a display and control system man-machine interface concept. Volume 1: Final technical report

    NASA Technical Reports Server (NTRS)

    Karl, D. R.

    1972-01-01

    An evaluation was made of the feasibility of utilizing a simplified man machine interface concept to manage and control a complex space system involving multiple redundant computers that control multiple redundant subsystems. The concept involves the use of a CRT for display and a simple keyboard for control, with a tree-type control logic for accessing and controlling mission, systems, and subsystem elements. The concept was evaluated in terms of the Phase B space shuttle orbiter, to utilize the wide scope of data management and subsystem control inherent in the central data management subsystem provided by the Phase B design philosophy. Results of these investigations are reported in four volumes.

  13. Access-Control Schemes for Real-Time and Store-and-Forward Multiple-Access Communication Channels

    DTIC Science & Technology

    1980-01-01

    N00014-78-C-0778 and SThe National Science Foundation under Grant NSF-EN677- 20799 Reproduction in whole or in part is permitted for any purpose of the...by the Naval Research Laboratory under Contract NRL-N00014-78-C-0778 and by the National Science Foundation under Grant NSF-ENG77- 20799 . Special thanks

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not tomore » unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.« less

  15. Design of Accelerator Online Simulator Server Using Structured Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen, Guobao; /Brookhaven; Chu, Chungming

    2012-07-06

    Model based control plays an important role for a modern accelerator during beam commissioning, beam study, and even daily operation. With a realistic model, beam behaviour can be predicted and therefore effectively controlled. The approach used by most current high level application environments is to use a built-in simulation engine and feed a realistic model into that simulation engine. Instead of this traditional monolithic structure, a new approach using a client-server architecture is under development. An on-line simulator server is accessed via network accessible structured data. With this approach, a user can easily access multiple simulation codes. This paper describesmore » the design, implementation, and current status of PVData, which defines the structured data, and PVAccess, which provides network access to the structured data.« less

  16. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  17. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  18. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  19. Multi-static networked 3D ladar for surveillance and access control

    NASA Astrophysics Data System (ADS)

    Wang, Y.; Ogirala, S. S. R.; Hu, B.; Le, Han Q.

    2007-04-01

    A theoretical design and simulation of a 3D ladar system concept for surveillance, intrusion detection, and access control is described. It is a non-conventional system architecture that consists of: i) multi-static configuration with an arbitrarily scalable number of transmitters (Tx's) and receivers (Rx's) that form an optical wireless code-division-multiple-access (CDMA) network, and ii) flexible system architecture with modular plug-and-play components that can be deployed for any facility with arbitrary topology. Affordability is a driving consideration; and a key feature for low cost is an asymmetric use of many inexpensive Rx's in conjunction with fewer Tx's, which are generally more expensive. The Rx's are spatially distributed close to the surveyed area for large coverage, and capable of receiving signals from multiple Tx's with moderate laser power. The system produces sensing information that scales as NxM, where N, M are the number of Tx's and Rx's, as opposed to linear scaling ~N in non-network system. Also, for target positioning, besides laser pointing direction and time-of-flight, the algorithm includes multiple point-of-view image fusion and triangulation for enhanced accuracy, which is not applicable to non-networked monostatic ladars. Simulation and scaled model experiments on some aspects of this concept are discussed.

  20. Self-organizing feature maps for dynamic control of radio resources in CDMA microcellular networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    1998-03-01

    The application of artificial neural networks to the channel assignment problem for cellular code-division multiple access (CDMA) cellular networks has previously been investigated. CDMA takes advantage of voice activity and spatial isolation because its capacity is only interference limited, unlike time-division multiple access (TDMA) and frequency-division multiple access (FDMA) where capacities are bandwidth-limited. Any reduction in interference in CDMA translates linearly into increased capacity. To satisfy the high demands for new services and improved connectivity for mobile communications, microcellular and picocellular systems are being introduced. For these systems, there is a need to develop robust and efficient management procedures for the allocation of power and spectrum to maximize radio capacity. Topology-conserving mappings play an important role in the biological processing of sensory inputs. The same principles underlying Kohonen's self-organizing feature maps (SOFMs) are applied to the adaptive control of radio resources to minimize interference, hence, maximize capacity in direct-sequence (DS) CDMA networks. The approach based on SOFMs is applied to some published examples of both theoretical and empirical models of DS/CDMA microcellular networks in metropolitan areas. The results of the approach for these examples are informally compared to the performance of algorithms, based on Hopfield- Tank neural networks and on genetic algorithms, for the channel assignment problem.

  1. Object-oriented design for accelerator control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Stok, P.D.V. van der; Berk, F. van den; Deckers, R.

    1994-02-01

    An object-oriented design for the distributed computer control system of the accelerator ring EUTERPE is presented. Because of the experimental nature of the ring, flexibility is of the utmost importance. The object-oriented principles have contributed considerably to the flexibility of the design incorporating multiple views, multi-level access and distributed surveillance.

  2. Tunable optical frequency comb enabled scalable and cost-effective multiuser orthogonal frequency-division multiple access passive optical network with source-free optical network units.

    PubMed

    Chen, Chen; Zhang, Chongfu; Liu, Deming; Qiu, Kun; Liu, Shuang

    2012-10-01

    We propose and experimentally demonstrate a multiuser orthogonal frequency-division multiple access passive optical network (OFDMA-PON) with source-free optical network units (ONUs), enabled by tunable optical frequency comb generation technology. By cascading a phase modulator (PM) and an intensity modulator and dynamically controlling the peak-to-peak voltage of a PM driven signal, a tunable optical frequency comb source can be generated. It is utilized to assist the configuration of a multiple source-free ONUs enhanced OFDMA-PON where simultaneous and interference-free multiuser upstream transmission over a single wavelength can be efficiently supported. The proposed multiuser OFDMA-PON is scalable and cost effective, and its feasibility is successfully verified by experiment.

  3. People with Profound and Multiple Intellectual Disabilities Using Symbols to Control a Computer: Exploration of User Engagement and Supporter Facilitation

    ERIC Educational Resources Information Center

    Bunning, Karen; Kwiatkowska, Gosia; Weldin, Nick

    2012-01-01

    Computer usage features in everyday life for the majority of people in developed countries. Access is a problem for many users with intellectual disability. Action-research was conducted to develop and explore the potential of specially adapted, computer readable symbols for choosing and accessing media on a computer. Five people with profound and…

  4. Proceedings of the Mobile Satellite System Architectures and Multiple Access Techniques Workshop

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled

    1989-01-01

    The Mobile Satellite System Architectures and Multiple Access Techniques Workshop served as a forum for the debate of system and network architecture issues. Particular emphasis was on those issues relating to the choice of multiple access technique(s) for the Mobile Satellite Service (MSS). These proceedings contain articles that expand upon the 12 presentations given in the workshop. Contrasting views on Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), and Time Division Multiple Access (TDMA)-based architectures are presented, and system issues relating to signaling, spacecraft design, and network management constraints are addressed. An overview article that summarizes the issues raised in the numerous discussion periods of the workshop is also included.

  5. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    PubMed Central

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339

  6. A multiple camera tongue switch for a child with severe spastic quadriplegic cerebral palsy.

    PubMed

    Leung, Brian; Chau, Tom

    2010-01-01

    The present study proposed a video-based access technology that facilitated a non-contact tongue protrusion access modality for a 7-year-old boy with severe spastic quadriplegic cerebral palsy (GMFCS level 5). The proposed system featured a centre camera and two peripheral cameras to extend coverage of the frontal face view of this user for longer durations. The child participated in a descriptive case study. The participant underwent 3 months of tongue protrusion training while the multiple camera tongue switch prototype was being prepared. Later, the participant was brought back for five experiment sessions where he worked on a single-switch picture matching activity, using the multiple camera tongue switch prototype in a controlled environment. The multiple camera tongue switch achieved an average sensitivity of 82% and specificity of 80%. In three of the experiment sessions, the peripheral cameras were associated with most of the true positive switch activations. These activations would have been missed by a centre-camera-only setup. The study demonstrated proof-of-concept of a non-contact tongue access modality implemented by a video-based system involving three cameras and colour video processing.

  7. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  8. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  9. Overview of Sparse Graph for Multiple Access in Future Mobile Networks

    NASA Astrophysics Data System (ADS)

    Lei, Jing; Li, Baoguo; Li, Erbao; Gong, Zhenghui

    2017-10-01

    Multiple access via sparse graph, such as low density signature (LDS) and sparse code multiple access (SCMA), is a promising technique for future wireless communications. This survey presents an overview of the developments in this burgeoning field, including transmitter structures, extrinsic information transform (EXIT) chart analysis and comparisons with existing multiple access techniques. Such technique enables multiple access under overloaded conditions to achieve a satisfactory performance. Message passing algorithm is utilized for multi-user detection in the receiver, and structures of the sparse graph are illustrated in detail. Outlooks and challenges of this technique are also presented.

  10. Baseband-processed SS-TDMA communication system architecture and design concepts

    NASA Technical Reports Server (NTRS)

    Attwood, S.; Sabourin, D.

    1982-01-01

    The architecture and system design for a commercial satellite communications system planned for the 1990's was developed by Motorola for NASA's Lewis Research Center. The system provides data communications between individual users via trunking and customer premises service terminals utilizing a central switching satellite operating in a time-division multiple-access (TDMA) mode. The major elements of the design incorporating baseband processing include: demand-assigned multiple access reservation protocol, spectral utilization, system synchronization, modulation technique and forward error control implementation. Motorola's baseband processor design, which is being proven in a proof-of-concept advanced technology development, will perform data regeneration and message routing for individual users on-board the spacecraft.

  11. Network support for turn-taking in multimedia collaboration

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1997-01-01

    The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.

  12. Multiple Memory Stores and Operant Conditioning: A Rationale for Memory's Complexity

    ERIC Educational Resources Information Center

    Meeter, Martijn; Veldkamp, Rob; Jin, Yaochu

    2009-01-01

    Why does the brain contain more than one memory system? Genetic algorithms can play a role in elucidating this question. Here, model animals were constructed containing a dorsal striatal layer that controlled actions, and a ventral striatal layer that controlled a dopaminergic learning signal. Both layers could gain access to three modeled memory…

  13. Exploring Improvement Science in Education: Promoting College Access in Fresno Unified School District

    ERIC Educational Resources Information Center

    Aguilar, Jorge; Nayfack, Michelle; Bush-Mecenas, Susan

    2017-01-01

    California's Local Control Funding Formula (LCFF) requires districts to report multiple measures of student performance that reflect success in the goal of preparing students for college, career, and citizenship. As they engage in the Local Control Accountability Plan (LCAP) process, they are expected to use state and local indicator data from…

  14. Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie

    2008-12-01

    Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.

  15. Nurse-led immunotreatment DEcision Coaching In people with Multiple Sclerosis (DECIMS) - Feasibility testing, pilot randomised controlled trial and mixed methods process evaluation.

    PubMed

    Rahn, A C; Köpke, S; Backhus, I; Kasper, J; Anger, K; Untiedt, B; Alegiani, A; Kleiter, I; Mühlhauser, I; Heesen, C

    2018-02-01

    Treatment decision-making is complex for people with multiple sclerosis. Profound information on available options is virtually not possible in regular neurologist encounters. The "nurse decision coach model" was developed to redistribute health professionals' tasks in supporting immunotreatment decision-making following the principles of informed shared decision-making. To test the feasibility of a decision coaching programme and recruitment strategies to inform the main trial. Feasibility testing and parallel pilot randomised controlled trial, accompanied by a mixed methods process evaluation. Two German multiple sclerosis university centres. People with suspected or relapsing-remitting multiple sclerosis facing immunotreatment decisions on first line drugs were recruited. Randomisation to the intervention (n = 38) or control group (n = 35) was performed on a daily basis. Quantitative and qualitative process data were collected from people with multiple sclerosis, nurses and physicians. We report on the development and piloting of the decision coaching programme. It comprises a training course for multiple sclerosis nurses and the coaching intervention. The intervention consists of up to three structured nurse-led decision coaching sessions, access to an evidence-based online information platform (DECIMS-Wiki) and a final physician consultation. After feasibility testing, a pilot randomised controlled trial was performed. People with multiple sclerosis were randomised to the intervention or control group. The latter had also access to the DECIMS-Wiki, but received otherwise care as usual. Nurses were not blinded to group assignment, while people with multiple sclerosis and physicians were. The primary outcome was 'informed choice' after six months including the sub-dimensions' risk knowledge (after 14 days), attitude concerning immunotreatment (after physician consultation), and treatment uptake (after six months). Quantitative process evaluation data were collected via questionnaires. Qualitative interviews were performed with all nurses and a convenience sample of nine people with multiple sclerosis. 116 people with multiple sclerosis fulfilled the inclusion criteria and 73 (63%) were included. Groups were comparable at baseline. Data of 51 people with multiple sclerosis (70%) were available for the primary endpoint. In the intervention group 15 of 31 (48%) people with multiple sclerosis achieved an informed choice after six months and 6 of 20 (30%) in the control group. Process evaluation data illustrated a positive response towards the coaching programme as well as good acceptance. The pilot-phase showed promising results concerning acceptability and feasibility of the intervention, which was well perceived by people with multiple sclerosis, most nurses and physicians. Delegating parts of the immunotreatment decision-making process to trained nurses has the potential to increase informed choice and participation as well as effectiveness of patient-physician consultations. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Optical multiple access techniques for on-board routing

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Park, Eugene; Gagliardi, Robert M.

    1992-01-01

    The purpose of this research contract was to design and analyze an optical multiple access system, based on Code Division Multiple Access (CDMA) techniques, for on board routing applications on a future communication satellite. The optical multiple access system was to effect the functions of a circuit switch under the control of an autonomous network controller and to serve eight (8) concurrent users at a point to point (port to port) data rate of 180 Mb/s. (At the start of this program, the bit error rate requirement (BER) was undefined, so it was treated as a design variable during the contract effort.) CDMA was selected over other multiple access techniques because it lends itself to bursty, asynchronous, concurrent communication and potentially can be implemented with off the shelf, reliable optical transceivers compatible with long term unattended operations. Temporal, temporal/spatial hybrids and single pulse per row (SPR, sometimes termed 'sonar matrices') matrix types of CDMA designs were considered. The design, analysis, and trade offs required by the statement of work selected a temporal/spatial CDMA scheme which has SPR properties as the preferred solution. This selected design can be implemented for feasibility demonstration with off the shelf components (which are identified in the bill of materials of the contract Final Report). The photonic network architecture of the selected design is based on M(8,4,4) matrix codes. The network requires eight multimode laser transmitters with laser pulses of 0.93 ns operating at 180 Mb/s and 9-13 dBm peak power, and 8 PIN diode receivers with sensitivity of -27 dBm for the 0.93 ns pulses. The wavelength is not critical, but 830 nm technology readily meets the requirements. The passive optical components of the photonic network are all multimode and off the shelf. Bit error rate (BER) computations, based on both electronic noise and intercode crosstalk, predict a raw BER of (10 exp -3) when all eight users are communicating concurrently. If better BER performance is required, then error correction codes (ECC) using near term electronic technology can be used. For example, the M(8,4,4) optical code together with Reed-Solomon (54,38,8) encoding provides a BER of better than (10 exp -11). The optical transceiver must then operate at 256 Mb/s with pulses of 0.65 ns because the 'bits' are now channel symbols.

  17. Target Acquisition Performance of a Satellite Based Multiple Access Surveillance System

    DOT National Transportation Integrated Search

    1975-03-01

    A quantitative description of the detection performance of a satellite-based surveillance system is presented. This system is one which has been proposed for CONUS coverage in an advanced air traffic control system. In addition, the computer program ...

  18. The INDIGO-Datacloud Authentication and Authorization Infrastructure

    NASA Astrophysics Data System (ADS)

    Ceccanti, A.; Hardt, M.; Wegh, B.; Millar, AP; Caberletti, M.; Vianello, E.; Licehammer, S.

    2017-10-01

    Contemporary distributed computing infrastructures (DCIs) are not easily and securely accessible by scientists. These computing environments are typically hard to integrate due to interoperability problems resulting from the use of different authentication mechanisms, identity negotiation protocols and access control policies. Such limitations have a big impact on the user experience making it hard for user communities to port and run their scientific applications on resources aggregated from multiple providers. The INDIGO-DataCloud project wants to provide the services and tools needed to enable a secure composition of resources from multiple providers in support of scientific applications. In order to do so, a common AAI architecture has to be defined that supports multiple authentication mechanisms, support delegated authorization across services and can be easily integrated in off-the-shelf software. In this contribution we introduce the INDIGO Authentication and Authorization Infrastructure, describing its main components and their status and how authentication, delegation and authorization flows are implemented across services.

  19. Comprehensive security framework for the communication and storage of medical images

    NASA Astrophysics Data System (ADS)

    Slik, David; Montour, Mike; Altman, Tym

    2003-05-01

    Confidentiality, integrity verification and access control of medical imagery and associated metadata is critical for the successful deployment of integrated healthcare networks that extend beyond the department level. As medical imagery continues to become widely accessed across multiple administrative domains and geographically distributed locations, image data should be able to travel and be stored on untrusted infrastructure, including public networks and server equipment operated by external entities. Given these challenges associated with protecting large-scale distributed networks, measures must be taken to protect patient identifiable information while guarding against tampering, denial of service attacks, and providing robust audit mechanisms. The proposed framework outlines a series of security practices for the protection of medical images, incorporating Transport Layer Security (TLS), public and secret key cryptography, certificate management and a token based trusted computing base. It outlines measures that can be utilized to protect information stored within databases, online and nearline storage, and during transport over trusted and untrusted networks. In addition, it provides a framework for ensuring end-to-end integrity of image data from acquisition to viewing, and presents a potential solution to the challenges associated with access control across multiple administrative domains and institution user bases.

  20. Concept and implementation of the Globalstar mobile satellite system

    NASA Technical Reports Server (NTRS)

    Schindall, Joel

    1995-01-01

    Globalstar is a satellite-based mobile communications system which provides quality wireless communications (voice and/or data) anywhere in the world except the polar regions. The Globalstar system concept is based upon technological advancements in Low Earth Orbit (LEO) satellite technology and in cellular telephone technology, including the commercial application of Code Division Multiple Access (CDMA) technologies. The Globalstar system uses elements of CDMA and Frequency Division Multiple Access (FDMA), combined with satellite Multiple Beam Antenna (MBA) technology and advanced variable-rate vocoder technology to arrive at one of the most efficient modulation and multiple access systems ever proposed for a satellite communications system. The technology used in Globalstar includes the following techniques in obtaining high spectral efficiency and affordable cost per channel: (1) CDMA modulation with efficient power control; (2) high efficiency vocoder with voice activity factor; (3) spot beam antenna for increased gain and frequency reuse; (4) weighted satellite antenna gain for broad geographic coverage; (5) multisatellite user links (diversity) to enhance communications reliability; and (6) soft hand-off between beams and satellites. Initial launch is scheduled in 1997 and the system is scheduled to be operational in 1998. The Globalstar system utilizes frequencies in L-, S- and C-bands which have the potential to offer worldwide availability with authorization by the appropriate regulatory agencies.

  1. Efficient accesses of data structures using processing near memory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jayasena, Nuwan S.; Zhang, Dong Ping; Diez, Paula Aguilera

    Systems, apparatuses, and methods for implementing efficient queues and other data structures. A queue may be shared among multiple processors and/or threads without using explicit software atomic instructions to coordinate access to the queue. System software may allocate an atomic queue and corresponding queue metadata in system memory and return, to the requesting thread, a handle referencing the queue metadata. Any number of threads may utilize the handle for accessing the atomic queue. The logic for ensuring the atomicity of accesses to the atomic queue may reside in a management unit in the memory controller coupled to the memory wheremore » the atomic queue is allocated.« less

  2. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  3. The base rates and factors associated with reported access to firearms in psychiatric inpatients.

    PubMed

    Kolla, Bhanu Prakash; O'Connor, Stephen S; Lineberry, Timothy W

    2011-01-01

    The aim of this study was to define whether specific patient demographic groups, diagnoses or other factors are associated with psychiatric inpatients reporting firearms access. A retrospective medical records review study was conducted using information on access to firearms from electronic medical records for all patients 16 years and older admitted between July 2007 and May 2008 at the Mayo Clinic Psychiatric Hospital in Rochester, MN. Data were obtained only on patients providing authorization for record review. Data were analyzed using univariate and multivariate logistic regression analyses accounting for gender, diagnostic groups, comorbid substance use, history of suicide attempts and family history of suicide/suicide attempts. Seventy-four percent (1169/1580) of patients provided research authorization. The ratio of men to women was identical in both research and nonresearch authorization groups. There were 14.6% of inpatients who reported firearms access. In univariate analysis, men were more likely (P<.0001) to report access than women, and a history of previous suicide attempt(s) was associated with decreased access (P=.02). Multiple logistic regression analyses controlling for other factors found females and patients with history of previous suicide attempt(s) less likely to report access, while patients with a family history of suicide or suicide attempts reported increased firearms access. Diagnostic groups were not associated with access on univariate or multiple logistic regression analyses. Men and inpatients with a family history of suicide/suicide attempts were more likely to report firearms access. Clinicians should develop standardized systems of identification of firearms access and provide guidance on removal. Copyright © 2011 Elsevier Inc. All rights reserved.

  4. How the Adoption of the Big-Data Paradigm Affects the Key Factors That Influence the Effectiveness of an Information Assurance (IA) Framework: A Multiple-Case Study

    ERIC Educational Resources Information Center

    Apple, Benjamin G.

    2017-01-01

    This qualitative study identified those factors that influence the perceived effectiveness of traditional IA control frameworks. The key factors examined in this study are risk management, governance, access control, privacy protection, integrity, availability, reliability, and usability. The researcher endeavored to determine how the…

  5. Life history changes in Trogoderma variabile and T. inclusum due to mating delay with implications for mating disruption as a management tactic

    USDA-ARS?s Scientific Manuscript database

    Controlling postharvest pest species is a costly process with insecticide resistance and species specific control requiring multiple tactics. Mating disruption can be used to both decrease a female’s access to males and delay timing of mating and decreases overall mating success in a population and ...

  6. Packet communications in satellites with multiple-beam antennas and signal processing

    NASA Technical Reports Server (NTRS)

    Davies, R.; Chethik, F.; Penick, M.

    1980-01-01

    A communication satellite with a multiple-beam antenna and onboard signal processing is considered for use in a 'message-switched' data relay system. The signal processor may incorporate demodulation, routing, storage, and remodulation of the data. A system user model is established and key functional elements for the signal processing are identified. With the throughput and delay requirements as the controlled variables, the hardware complexity, operational discipline, occupied bandwidth, and overall user end-to-end cost are estimated for (1) random-access packet switching; and (2) reservation-access packet switching. Other aspects of this network (eg, the adaptability to channel switched traffic requirements) are examined. For the given requirements and constraints, the reservation system appears to be the most attractive protocol.

  7. D3: A Collaborative Infrastructure for Aerospace Design

    NASA Technical Reports Server (NTRS)

    Walton, Joan; Filman, Robert E.; Knight, Chris; Korsmeyer, David J.; Lee, Diana D.; Clancy, Daniel (Technical Monitor)

    2001-01-01

    DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid dynamics) model executions. DARWIN captures, stores and indexes data, manages derived knowledge (such as visualizations across multiple data sets) and provides an environment for designers to collaborate in the analysis of the results of testing. DARWIN is an interesting application because it supports high volumes of data, integrates multiple modalities of data display (e.g. images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and view of data.

  8. Wireless local area network in a prehospital environment

    PubMed Central

    Chen, Dongquan; Soong, Seng-jaw; Grimes, Gary J; Orthner, Helmuth F

    2004-01-01

    Background Wireless local area networks (WLANs) are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home) using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG) machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER). The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management. PMID:15339336

  9. Wireless local area network in a prehospital environment.

    PubMed

    Chen, Dongquan; Soong, Seng-jaw; Grimes, Gary J; Orthner, Helmuth F

    2004-08-31

    Wireless local area networks (WLANs) are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home) using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG) machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER). The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  10. Sandia Compact Sensor Node (SCSN) v. 1.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    HARRINGTON, JOHN

    2009-01-07

    The SCSN communication protocol is implemented in software and incorporates elements of Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Carrier Sense Multiple Access (CSMA) to reduce radio message collisions, latency, and power consumption. Alarm messages are expeditiously routed to a central node as a 'star' network with minimum overhead. Other messages can be routed along network links between any two nodes so that peer-to-peer communication is possible. Broadcast messages can be composed that flood the entire network or just specific portions with minimal radio traffic and latency. Two-way communication with sensor nodes, which sleep most ofmore » the time to conserve battery life, can occur at seven second intervals. SCSN software also incorporates special algorithms to minimize superfluous radio traffic that can result from excessive intrusion alarm messages. A built-in seismic detector is implemented with a geophone and software that distinguishes between pedestrian and vehicular targets. Other external sensors can be attached to a SCSN using supervised interface lines that are controlled by software. All software is written in the ANSI C language for ease of development, maintenance, and portability.« less

  11. Operating systems. [of computers

    NASA Technical Reports Server (NTRS)

    Denning, P. J.; Brown, R. L.

    1984-01-01

    A counter operating system creates a hierarchy of levels of abstraction, so that at a given level all details concerning lower levels can be ignored. This hierarchical structure separates functions according to their complexity, characteristic time scale, and level of abstraction. The lowest levels include the system's hardware; concepts associated explicitly with the coordination of multiple tasks appear at intermediate levels, which conduct 'primitive processes'. Software semaphore is the mechanism controlling primitive processes that must be synchronized. At higher levels lie, in rising order, the access to the secondary storage devices of a particular machine, a 'virtual memory' scheme for managing the main and secondary memories, communication between processes by way of a mechanism called a 'pipe', access to external input and output devices, and a hierarchy of directories cataloguing the hardware and software objects to which access must be controlled.

  12. A bioeconomic analysis of an emerald ash borer invasion of an urban forest with multiple jurisdictions

    Treesearch

    Kent F. Kovacs; Robert G. Haight; Rodrigo J. Mercader; Deborah G. McCullough

    2014-01-01

    Bio-invasions occur in management mosaics where local control affects spread and damage across political boundaries. We address two obstacles to local implementation of optimal regional control of a bio-invasion that damages public and private resources across jurisdictions: lack of local funds to protect the public resource and lack of access to protect the private...

  13. Continental Land Mass Air Traffic Control (COLM ATC). [using three artificial satellite configurations

    NASA Technical Reports Server (NTRS)

    Pecar, J. A.; Henrich, J. E.

    1973-01-01

    The application of various satellite systems and techniques relative to providing air traffic control services for the continental United States was studied. Three satellite configurations were reviewed. The characteristics and capabilities of the satellites are described. The study includes consideration for the various ranging waveforms, multiple access alternatives, and the power and bandwidth required as a function of the number of users.

  14. Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks

    PubMed Central

    Lim, Chiwoo; Kim, Sang-Hyo

    2018-01-01

    In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery. PMID:29673167

  15. Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks.

    PubMed

    Lim, Chiwoo; Jang, Min; Kim, Sang-Hyo

    2018-04-17

    In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA), is proposed for peer discovery of distributed device-to-device (D2D) communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR). The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA)-based discovery.

  16. 21 CFR 1311.120 - Electronic prescription application requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... the practitioner to sign multiple prescriptions for a single patient at one time using a single... practitioners, a practitioner authorized to sign controlled substance prescriptions must approve logical access... application must require the practitioner or his agent to select the DEA registration number to be included on...

  17. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach

    PubMed Central

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-01-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges. PMID:26997936

  18. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    PubMed

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  19. Hubless satellite communications networks

    NASA Technical Reports Server (NTRS)

    Robinson, Peter Alan

    1994-01-01

    Frequency Comb Multiple Access (FCMA) is a new combined modulation and multiple access method which will allow cheap hubless Very Small Aperture Terminal (VSAT) networks to be constructed. Theoretical results show bandwidth efficiency and power efficiency improvements over other modulation and multiple access methods. Costs of the VSAT network are reduced dramatically since a hub station is not required.

  20. An experimental distributed microprocessor implementation with a shared memory communications and control medium

    NASA Technical Reports Server (NTRS)

    Mejzak, R. S.

    1980-01-01

    The distributed processing concept is defined in terms of control primitives, variables, and structures and their use in performing a decomposed discrete Fourier transform (DET) application function. The design assumes interprocessor communications to be anonymous. In this scheme, all processors can access an entire common database by employing control primitives. Access to selected areas within the common database is random, enforced by a hardware lock, and determined by task and subtask pointers. This enables the number of processors to be varied in the configuration without any modifications to the control structure. Decompositional elements of the DFT application function in terms of tasks and subtasks are also described. The experimental hardware configuration consists of IMSAI 8080 chassis which are independent, 8 bit microcomputer units. These chassis are linked together to form a multiple processing system by means of a shared memory facility. This facility consists of hardware which provides a bus structure to enable up to six microcomputers to be interconnected. It provides polling and arbitration logic so that only one processor has access to shared memory at any one time.

  1. Multiple access capacity trade-offs for a Ka-band personal access satellite system

    NASA Technical Reports Server (NTRS)

    Dessouky, Khaled; Motamedi, Masoud

    1990-01-01

    System capability is critical to the economic viability of a personal satellite communication system. Ka band has significant potential to support a high capacity multiple access system because of the availability of bandwidth. System design tradeoffs are performed and multiple access schemes are compared with the design goal of achieving the highest capacity and efficiency. Conclusions regarding the efficiency of the different schemes and the achievable capacities are given.

  2. Shared Medical Imaging Repositories.

    PubMed

    Lebre, Rui; Bastião, Luís; Costa, Carlos

    2018-01-01

    This article describes the implementation of a solution for the integration of ownership concept and access control over medical imaging resources, making possible the centralization of multiple instances of repositories. The proposed architecture allows the association of permissions to repository resources and delegation of rights to third entities. It includes a programmatic interface for management of proposed services, made available through web services, with the ability to create, read, update and remove all components resulting from the architecture. The resulting work is a role-based access control mechanism that was integrated with Dicoogle Open-Source Project. The solution has several application scenarios like, for instance, collaborative platforms for research and tele-radiology services deployed at Cloud.

  3. Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks

    DTIC Science & Technology

    2007-01-01

    Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR

  4. Selling Our Collecting Souls: How License Agreements Are Controlling Collection Management.

    ERIC Educational Resources Information Center

    McGinnis, Suzan D.

    2000-01-01

    Considers the challenges that licensing for electronic products are creating for academic libraries. Discusses ownership of versus access to information; packaging of electronic journals; cost-benefit analysis; multiple versions of the same information, e.g. print and electronic; consortial agreements; negotiating; legal issues; and the question…

  5. Change Detection, Multiple Controllers, and Dynamic Environments: Insights from the Brain

    ERIC Educational Resources Information Center

    Pearson, John M.; Platt, Michael L.

    2013-01-01

    Foundational studies in decision making focused on behavior as the most accessible and reliable data on which to build theories of choice. More recent work, however, has incorporated neural data to provide insights unavailable from behavior alone. Among other contributions, these studies have validated reinforcement learning models by…

  6. It's in the Cards.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2000-01-01

    Examines how the use of electronic access-control system enables college and universities to provide a safer environment for students and staff. The advantages of no-key doors, adapting entry card systems for multiple uses, and successfully retaining lock and key systems when facilities do not lend themselves to electronic security are discussed.…

  7. Verbal Fluency, Semantics, Context and Symptom Complexes in Schizophrenia

    ERIC Educational Resources Information Center

    Vogel, Adam P.; Chenery, Helen J.; Dart, Catriona M.; Doan, Binh; Tan, Mildred; Copland, David A.

    2009-01-01

    Lexical-semantic access and retrieval was examined in 15 adults diagnosed with schizophrenia and matched controls. This study extends the literature through the inclusion of multiple examinations of lexical-semantic production within the same patient group and through correlating performance on these tasks with various positive and negative…

  8. Advanced multiple access concepts in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ananasso, Fulvio

    1990-01-01

    Some multiple access strategies for Mobile Satellite Systems (MSS) are discussed. These strategies were investigated in the context of three separate studies conducted for the International Maritime Satellite Organization (INMARSAT) and the European Space Agency (ESA). Satellite-Switched Frequency Division Multiple Access (SS-FDMA), Code Division Multiple Access (CDMA), and Frequency-Addressable Beam architectures are addressed, discussing both system and technology aspects and outlining advantages and drawbacks of either solution with associated relevant hardware issues. An attempt is made to compare the considered option from the standpoint of user terminal/space segment complexity, synchronization requirements, spectral efficiency, and interference rejection.

  9. International Cancer Genome Consortium Data Portal--a one-stop shop for cancer genomics data.

    PubMed

    Zhang, Junjun; Baran, Joachim; Cros, A; Guberman, Jonathan M; Haider, Syed; Hsu, Jack; Liang, Yong; Rivkin, Elena; Wang, Jianxin; Whitty, Brett; Wong-Erasmus, Marie; Yao, Long; Kasprzyk, Arek

    2011-01-01

    The International Cancer Genome Consortium (ICGC) is a collaborative effort to characterize genomic abnormalities in 50 different cancer types. To make this data available, the ICGC has created the ICGC Data Portal. Powered by the BioMart software, the Data Portal allows each ICGC member institution to manage and maintain its own databases locally, while seamlessly presenting all the data in a single access point for users. The Data Portal currently contains data from 24 cancer projects, including ICGC, The Cancer Genome Atlas (TCGA), Johns Hopkins University, and the Tumor Sequencing Project. It consists of 3478 genomes and 13 cancer types and subtypes. Available open access data types include simple somatic mutations, copy number alterations, structural rearrangements, gene expression, microRNAs, DNA methylation and exon junctions. Additionally, simple germline variations are available as controlled access data. The Data Portal uses a web-based graphical user interface (GUI) to offer researchers multiple ways to quickly and easily search and analyze the available data. The web interface can assist in constructing complicated queries across multiple data sets. Several application programming interfaces are also available for programmatic access. Here we describe the organization, functionality, and capabilities of the ICGC Data Portal.

  10. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    NASA Astrophysics Data System (ADS)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  11. Effective simulations of gas diffusion through kinetically accessible tunnels in multisubunit proteins: O2 pathways and escape routes in T-state deoxyhemoglobin.

    PubMed

    Shadrina, Maria S; English, Ann M; Peslherbe, Gilles H

    2012-07-11

    The diffusion of small gases to special binding sites within polypeptide matrices pivotally defines the biochemical specificity and reactivity of proteins. We investigate here explicit O(2) diffusion in adult human hemoglobin (HbA) as a case study employing the recently developed temperature-controlled locally enhanced sampling (TLES) method and vary the parameters to greatly increase the simulation efficiency. The method is carefully validated against standard molecular dynamics (MD) simulations and available experimental structural and kinetic data on ligand diffusion in T-state deoxyHbA. The methodology provides a viable alternative approach to traditional MD simulations and/or potential of mean force calculations for: (i) characterizing kinetically accessible diffusion tunnels and escape routes for light ligands in porous proteins; (ii) very large systems when realistic simulations require the inclusion of multiple subunits of a protein; and (iii) proteins that access short-lived conformations relative to the simulation time. In the case of T-state deoxyHbA, we find distinct ligand diffusion tunnels consistent with the experimentally observed disparate Xe cavities in the α- and β-subunits. We identify two distal barriers including the distal histidine (E7) that control access to the heme. The multiple escape routes uncovered by our simulations call for a review of the current popular hypothesis on ligand escape from hemoglobin. Larger deviations from the crystal structure during simulated diffusion in isolated α- and β-subunits highlight the dampening effects of subunit interactions and the importance of including all subunits of multisubunit proteins to map realistic kinetically accessible diffusion tunnels and escape routes.

  12. Methodological proceedings to evaluate the physical accessibility in urban historic sites.

    PubMed

    Ribeiro, Gabriela Sousa; Martins, Laura Bezerra; Monteiro, Circe Maria Gama

    2012-01-01

    Historic urban sites are set by cultural and social diversities, generating multiple activities and use and access to these sites should be available to all people including those with disabilities. Taking into consideration that using the same methodology that was used in different historic sites researches with positive results facilitates replication, we aimed to develop methodological procedures that identify conditions of physical accessibility in open public spaces and access to public buildings in historic urban sites to support proposals about design requirements for improvements to the problems diagnosed and control inadequacies of the physical environment. The study methods and techniques from different areas of knowledge culminated in a proposal built with an emphasis on user participation that could be applied with low cost and in relatively short period of time.

  13. Propulsive Reaction Control System Model

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Phan, Linh H.; Serricchio, Frederick; San Martin, Alejandro M.

    2011-01-01

    This software models a propulsive reaction control system (RCS) for guidance, navigation, and control simulation purposes. The model includes the drive electronics, the electromechanical valve dynamics, the combustion dynamics, and thrust. This innovation follows the Mars Science Laboratory entry reaction control system design, and has been created to meet the Mars Science Laboratory (MSL) entry, descent, and landing simulation needs. It has been built to be plug-and-play on multiple MSL testbeds [analysis, Monte Carlo, flight software development, hardware-in-the-loop, and ATLO (assembly, test and launch operations) testbeds]. This RCS model is a C language program. It contains two main functions: the RCS electronics model function that models the RCS FPGA (field-programmable-gate-array) processing and commanding of the RCS valve, and the RCS dynamic model function that models the valve and combustion dynamics. In addition, this software provides support functions to initialize the model states, set parameters, access model telemetry, and access calculated thruster forces.

  14. Enterprise systems security management: a framework for breakthrough protection

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2010-04-01

    Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.

  15. Spread-spectrum multiple access using wideband noncoherent MFSK

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy; Maggenti, Mark A.

    1987-01-01

    Two spread-spectrum multiple access systems which use wideband M-ary frequency shift keying (FSK) (MFSK) as the primary modulation are presented. A bit error rate performance analysis is presented and system throughput is calculated for sample C band and Ku band satellite systems. Sample link analyses are included to illustrate power and adjacent satellite interference considerations in practical multiple access systems.

  16. Random-access algorithms for multiuser computer communication networks. Doctoral thesis, 1 September 1986-31 August 1988

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Papantoni-Kazakos, P.; Paterakis, M.

    1988-07-01

    For many communication applications with time constraints (e.g., transmission of packetized voice messages), a critical performance measure is the percentage of messages transmitted within a given amount of time after their generation at the transmitting station. This report presents a random-access algorithm (RAA) suitable for time-constrained applications. Performance analysis demonstrates that significant message-delay improvement is attained at the expense of minimal traffic loss. Also considered is the case of noisy channels. The noise effect appears at erroneously observed channel feedback. Error sensitivity analysis shows that the proposed random-access algorithm is insensitive to feedback channel errors. Window Random-Access Algorithms (RAAs) aremore » considered next. These algorithms constitute an important subclass of Multiple-Access Algorithms (MAAs); they are distributive, and they attain high throughput and low delays by controlling the number of simultaneously transmitting users.« less

  17. The D3 Middleware Architecture

    NASA Technical Reports Server (NTRS)

    Walton, Joan; Filman, Robert E.; Korsmeyer, David J.; Lee, Diana D.; Mak, Ron; Patel, Tarang

    2002-01-01

    DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid-dynamics) model executions. DARWIN captures, stores and indexes data; manages derived knowledge (such as visualizations across multiple datasets); and provides an environment for designers to collaborate in the analysis of test results. DARWIN is an interesting application because it supports high-volumes of data. integrates multiple modalities of data display (e.g., images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and views of data. Here we provide an overview of the architecture of D3, the third generation of DARWIN. Earlier versions of DARWIN were characterized by browser-based interfaces and a hodge-podge of server technologies: CGI scripts, applets, PERL, and so forth. But browsers proved difficult to control, and a proliferation of computational mechanisms proved inefficient and difficult to maintain. D3 substitutes a pure-Java approach for that medley: A Java client communicates (though RMI over HTTPS) with a Java-based application server. Code on the server accesses information from JDBC databases, distributed LDAP security services, and a collaborative information system. D3 is a three tier-architecture, but unlike 'E-commerce' applications, the data usage pattern suggests different strategies than traditional Enterprise Java Beans - we need to move volumes of related data together, considerable processing happens on the client, and the 'business logic' on the server-side is primarily data integration and collaboration. With D3, we are extending DARWIN to handle other data domains and to be a distributed system, where a single login allows a user transparent access to test results from multiple servers and authority domains.

  18. Open Source Next Generation Visualization Software for Interplanetary Missions

    NASA Technical Reports Server (NTRS)

    Trimble, Jay; Rinker, George

    2016-01-01

    Mission control is evolving quickly, driven by the requirements of new missions, and enabled by modern computing capabilities. Distributed operations, access to data anywhere, data visualization for spacecraft analysis that spans multiple data sources, flexible reconfiguration to support multiple missions, and operator use cases, are driving the need for new capabilities. NASA's Advanced Multi-Mission Operations System (AMMOS), Ames Research Center (ARC) and the Jet Propulsion Laboratory (JPL) are collaborating to build a new generation of mission operations software for visualization, to enable mission control anywhere, on the desktop, tablet and phone. The software is built on an open source platform that is open for contributions (http://nasa.github.io/openmct).

  19. Barriers to prompt and effective malaria treatment among the poorest population in Kenya.

    PubMed

    Chuma, Jane; Okungu, Vincent; Molyneux, Catherine

    2010-05-27

    Prompt access to effective malaria treatment is central to the success of malaria control worldwide, but few fevers are treated with effective anti-malarials within 24 hours of symptoms onset. The last two decades saw an upsurge of initiatives to improve access to effective malaria treatment in many parts of sub-Saharan Africa. Evidence suggests that the poorest populations remain least likely to seek prompt and effective treatment, but the factors that prevent them from accessing interventions are not well understood. With plans under way to subsidize ACT heavily in Kenya and other parts of Africa, there is urgent need to identify policy actions to promote access among the poor. This paper explores access barriers to effective malaria treatment among the poorest population in four malaria endemic districts in Kenya. The study was conducted in the poorest areas of four malaria endemic districts in Kenya. Multiple data collection methods were applied including: a cross-sectional survey (n=708 households); 24 focus group discussions; semi-structured interviews with health workers (n=34); and patient exit interviews (n=359). Multiple factors related to affordability, acceptability and availability interact to influence access to prompt and effective treatment. Regarding affordability, about 40 percent of individuals who self-treated using shop-bought drugs and 42 percent who visited a formal health facility reported not having enough money to pay for treatment, and having to adopt coping strategies including borrowing money and getting treatment on credit in order to access care. Other factors influencing affordability were seasonality of illness and income sources, transport costs, and unofficial payments. Regarding acceptability, the major interrelated factors identified were provider patient relationship, patient expectations, beliefs on illness causation, perceived effectiveness of treatment, distrust in the quality of care and poor adherence to treatment regimes. Availability barriers identified were related to facility opening hours, organization of health care services, drug and staff shortages. Ensuring that all individuals suffering from malaria have prompt access to effective treatment remains a challenge for resource constrained health systems. Policy actions to address the multiple barriers of access should be designed around access dimensions, and should include broad interventions to revitalize the public health care system. Unless additional efforts are directed towards addressing access barriers among the poor and vulnerable, malaria will remain a major cause of morbidity and mortality in sub-Saharan Africa.

  20. Identification and characterization of the SSB1 locus involved in symptom development by Spring beauty latent virus infection in Arabidopsis thaliana.

    PubMed

    Fujisaki, Koki; Hagihara, Fumi; Azukawa, Yoshihiro; Kaido, Masanori; Okuno, Tetsuro; Mise, Kazuyuki

    2004-09-01

    The natural variation of Arabidopsis thaliana in response to a bromovirus, Spring beauty latent virus (SBLV), was examined. Of 63 Arabidopsis accessions tested, all were susceptible when inoculated with SBLV, although there was a large degree of variation in symptom development. Most accessions, including Columbia (Col-0), were symptomless or developed only mild symptoms, but four accessions, including S96, showed severe symptoms of SBLV infection. Genetic analysis suggested that the difference in the responses of Col-0 and S96 to SBLV was controlled by a single semidominant locus. We have designated this locus SSB1 (symptom development by SBLV infection). By using genetic markers, SSB1 was mapped to chromosome IV. The patterns of distribution and accumulation of SBLV in sensitive accessions were similar to those in the insensitive accessions. In addition, symptom development in S96 by SBLV infection was critically interrupted by the presence of the NahG gene, which encodes salicylic acid (SA) hydroxylase. These data suggest that symptom development in A. thaliana controlled by SSB1 is independent of the efficiency of SBLV multiplication and is dependent on SA signaling.

  1. Methods and devices for determining quality of services of storage systems

    DOEpatents

    Seelam, Seetharami R [Yorktown Heights, NY; Teller, Patricia J [Las Cruces, NM

    2012-01-17

    Methods and systems for allowing access to computer storage systems. Multiple requests from multiple applications can be received and processed efficiently to allow traffic from multiple customers to access the storage system concurrently.

  2. Mobile multiple access study

    NASA Technical Reports Server (NTRS)

    1977-01-01

    Multiple access techniques (FDMA, CDMA, TDMA) for the mobile user and attempts to identify the current best technique are discussed. Traffic loading is considered as well as voice and data modulation and spacecraft and system design. Emphasis is placed on developing mobile terminal cost estimates for the selected design. In addition, design examples are presented for the alternative techniques of multiple access in order to compare with the selected technique.

  3. What we talk about when we talk about access deficits

    PubMed Central

    Mirman, Daniel; Britt, Allison E.

    2014-01-01

    Semantic impairments have been divided into storage deficits, in which the semantic representations themselves are damaged, and access deficits, in which the representations are intact but access to them is impaired. The behavioural phenomena that have been associated with access deficits include sensitivity to cueing, sensitivity to presentation rate, performance inconsistency, negative serial position effects, sensitivity to number and strength of competitors, semantic blocking effects, disordered selection between strong and weak competitors, correlation between semantic deficits and executive function deficits and reduced word frequency effects. Four general accounts have been proposed for different subsets of these phenomena: abnormal refractoriness, too much activation, impaired competitive selection and deficits of semantic control. A combination of abnormal refractoriness and impaired competitive selection can account for most of the behavioural phenomena, but there remain several open questions. In particular, it remains unclear whether access deficits represent a single syndrome, a syndrome with multiple subtypes or a variable collection of phenomena, whether the underlying deficit is domain-general or domain-specific, whether it is owing to disorders of inhibition, activation or selection, and the nature of the connection (if any) between access phenomena in aphasia and in neurologically intact controls. Computational models offer a promising approach to answering these questions. PMID:24324232

  4. Venous hemostasis postcatheter ablation of atrial fibrillation while under therapeutic levels of oral and intravenous anticoagulation.

    PubMed

    Issa, Ziad F; Amr, Bashar S

    2015-11-01

    Catheter ablation of atrial fibrillation (AF) requires utilizing multiple venous femoral sheaths in conjunction with aggressive periprocedural anticoagulation, which can lead to increased risk of vascular access complications. The objective of this study is to evaluate the safety and efficacy of the "figure-of-eight" ("F-8") suture technique for femoral venous hemostasis while on therapeutic doses of intravenous anticoagulation at the time of sheath removal. In this case-control analysis, 376 consecutive patients underwent AF ablation while on uninterrupted oral anticoagulation and received intraprocedural heparin. In the first 253 patients (the control group), manual pressure was used for femoral venous hemostasis after reversal of heparin effects. The subsequent 123 patients (the F-8 group) had femoral venous hemostasis using the F-8 suture technique and while under therapeutic heparin effects. The F-8 subcutaneous suture technique achieved adequate venous hemostasis in 98.4% of patients. As compared to the control group, there was significantly less frequent utilization of the FemoStop compression assist device (1.2 vs. 16.8%, p < 0.0001) and in a significantly shorter interval (6.8 ± 5.7 vs. 50.7 ± 12.2 min, p < 0.0001). Vascular access complications and thromboembolic events occurred in 9.8% in the F-8 group vs. 13.0% in the control group (p = 0.678). Immediate hemostasis of the femoral venous access sites after insertion of multiple sheaths for AF ablation in the presence of anticoagulation can be safely and effectively achieved using the F-8 suture technique. This technique helps minimize the period of inadequate anticoagulation immediately following ablation and shortens the time required to achieve adequate hemostasis.

  5. Contact-free heart rate measurement using multiple video data

    NASA Astrophysics Data System (ADS)

    Hung, Pang-Chan; Lee, Kual-Zheng; Tsai, Luo-Wei

    2013-10-01

    In this paper, we propose a contact-free heart rate measurement method by analyzing sequential images of multiple video data. In the proposed method, skin-like pixels are firstly detected from multiple video data for extracting the color features. These color features are synchronized and analyzed by independent component analysis. A representative component is finally selected among these independent component candidates to measure the HR, which achieves under 2% deviation on average compared with a pulse oximeter in the controllable environment. The advantages of the proposed method include: 1) it uses low cost and high accessibility camera device; 2) it eases users' discomfort by utilizing contact-free measurement; and 3) it achieves the low error rate and the high stability by integrating multiple video data.

  6. Optimized scheduling technique of null subcarriers for peak power control in 3GPP LTE downlink.

    PubMed

    Cho, Soobum; Park, Sang Kyu

    2014-01-01

    Orthogonal frequency division multiple access (OFDMA) is a key multiple access technique for the long term evolution (LTE) downlink. However, high peak-to-average power ratio (PAPR) can cause the degradation of power efficiency. The well-known PAPR reduction technique, dummy sequence insertion (DSI), can be a realistic solution because of its structural simplicity. However, the large usage of subcarriers for the dummy sequences may decrease the transmitted data rate in the DSI scheme. In this paper, a novel DSI scheme is applied to the LTE system. Firstly, we obtain the null subcarriers in single-input single-output (SISO) and multiple-input multiple-output (MIMO) systems, respectively; then, optimized dummy sequences are inserted into the obtained null subcarrier. Simulation results show that Walsh-Hadamard transform (WHT) sequence is the best for the dummy sequence and the ratio of 16 to 20 for the WHT and randomly generated sequences has the maximum PAPR reduction performance. The number of near optimal iteration is derived to prevent exhausted iterations. It is also shown that there is no bit error rate (BER) degradation with the proposed technique in LTE downlink system.

  7. Optimized Scheduling Technique of Null Subcarriers for Peak Power Control in 3GPP LTE Downlink

    PubMed Central

    Park, Sang Kyu

    2014-01-01

    Orthogonal frequency division multiple access (OFDMA) is a key multiple access technique for the long term evolution (LTE) downlink. However, high peak-to-average power ratio (PAPR) can cause the degradation of power efficiency. The well-known PAPR reduction technique, dummy sequence insertion (DSI), can be a realistic solution because of its structural simplicity. However, the large usage of subcarriers for the dummy sequences may decrease the transmitted data rate in the DSI scheme. In this paper, a novel DSI scheme is applied to the LTE system. Firstly, we obtain the null subcarriers in single-input single-output (SISO) and multiple-input multiple-output (MIMO) systems, respectively; then, optimized dummy sequences are inserted into the obtained null subcarrier. Simulation results show that Walsh-Hadamard transform (WHT) sequence is the best for the dummy sequence and the ratio of 16 to 20 for the WHT and randomly generated sequences has the maximum PAPR reduction performance. The number of near optimal iteration is derived to prevent exhausted iterations. It is also shown that there is no bit error rate (BER) degradation with the proposed technique in LTE downlink system. PMID:24883376

  8. Distributed reservation-based code division multiple access

    NASA Astrophysics Data System (ADS)

    Wieselthier, J. E.; Ephremides, A.

    1984-11-01

    The use of spread spectrum signaling, motivated primarily by its antijamming capabilities in military applications, leads naturally to the use of Code Division Multiple Access (CDMA) techniques that permit the successful simultaneous transmission by a number of users over a wideband channel. In this paper we address some of the major issues that are associated with the design of multiple access protocols for spread spectrum networks. We then propose, analyze, and evaluate a distributed reservation-based multiple access protocol that does in fact exploit CDMA properties. Especially significant is the fact that no acknowledgment or feedback information from the destination is required (thus facilitating communication with a radio-silent mode), nor is any form of coordination among the users necessary.

  9. [The global and national context regarding the challenges involved in ensuring adequate access to water for human consumption].

    PubMed

    Augusto, Lia Giraldo da Silva; Gurgel, Idê Gomes Dantas; Câmara Neto, Henrique Fernandes; de Melo, Carlos Henrique; Costa, André Monteiro

    2012-06-01

    The scope of this article is to analyze the challenges involved in ensuring access to water for human consumption taking the international and national context into consideration. Based on the UN declaration that access to safe and clean drinking water is a fundamental human right, vulnerabilities are identified that can consist in restrictions to access to adequate supplies. The distribution of water and the population across the planet, pollution, inadequate policies and management lead to environmental injustice. The iniquity of access to water constitutes the contemporary water crisis. From the 1980s onwards, the transnational water market emerged for private control that occurs at three main levels: surface and underground water sources; bottled water; and public water supply services. The conflicts of the multiple uses of water resources, the market and environmental problems have contributed to rendering the health of the population and ecosystems vulnerable. Adequate public policies are essential to ensure the basic human right to access to safe and clean drinking water.

  10. E-learning: controlling costs and increasing value.

    PubMed

    Walsh, Kieran

    2015-04-01

    E-learning now accounts for a substantial proportion of medical education provision. This progress has required significant investment and this investment has in turn come under increasing scrutiny so that the costs of e-learning may be controlled and its returns maximised. There are multiple methods by which the costs of e-learning can be controlled and its returns maximised. This short paper reviews some of those methods that are likely to be most effective and that are likely to save costs without compromising quality. Methods might include accessing free or low-cost resources from elsewhere; create short learning resources that will work on multiple devices; using open source platforms to host content; using in-house faculty to create content; sharing resources between institutions; and promoting resources to ensure high usage. Whatever methods are used to control costs or increase value, it is most important to evaluate the impact of these methods.

  11. A System for Distributing Real-Time Customized (NEXRAD-Radar) Geosciences Data

    NASA Astrophysics Data System (ADS)

    Singh, Satpreet; McWhirter, Jeff; Krajewski, Witold; Kruger, Anton; Goska, Radoslaw; Seo, Bongchul; Domaszczynski, Piotr; Weber, Jeff

    2010-05-01

    Hydrometeorologists and hydrologists can benefit from (weather) radar derived rain products, including rain rates and accumulations. The Hydro-NEXRAD system (HNX1) has been in operation since 2006 at IIHR-Hydroscience and Engineering at The University of Iowa. It provides rapid and user-friendly access to such user-customized products, generated using archived Weather Surveillance Doppler Radar (WSR-88D) data from the NEXRAD weather radar network in the United States. HNX1 allows researchers to deal directly with radar-derived rain products, without the burden of the details of radar data collection, quality control, processing, and format conversion. A number of hydrologic applications can benefit from a continuous real-time feed of customized radar-derived rain products. We are currently developing such a system, Hydro-NEXRAD 2 (HNX2). HNX2 collects real-time, unprocessed data from multiple NEXRAD radars as they become available, processes them through a user-configurable pipeline of data-processing modules, and then publishes processed products at regular intervals. Modules in the data processing pipeline encapsulate algorithms such as non-meteorological echo detection, range correction, radar-reflectivity-rain rate (Z-R) conversion, advection correction, merging products from multiple radars, and grid transformations. HNX2's implementation presents significant challenges, including quality-control, error-handling, time-synchronization of data from multiple asynchronous sources, generation of multiple-radar metadata products, distribution of products to a user base with diverse needs and constraints, and scalability. For content management and distribution, HNX2 uses RAMADDA (Repository for Archiving, Managing and Accessing Diverse Data), developed by the UCAR/Unidata Program Center in the Unites States. RAMADDA allows HNX2 to publish products through automation and gives users multiple access methods to the published products, including simple web-browser based access, and OpenDAP access. The latter allows a user to set up automation at his/her end, and fetch new data from HNX2 at regular intervals. HNX2 uses a two-dimensional metadata structure called a mosaic for managing metadata of the rain products. Currently, HNX2 is in pre-production state and is serving near real-time rain-rate map data-products for individual radars and merged data-products from seven radars covering the state of Iowa in the United States. These products then drive a rainfall-runoff model called CUENCAS, which is used as part of the Iowa Flood Center (housed at The University of Iowa) real-time flood forecasting system. We are currently developing a generalized scalable framework that will run on inexpensive hardware and will provide products for basins anywhere in the continental United States.

  12. Challenges in randomized controlled trials and emerging multiple sclerosis therapeutics.

    PubMed

    Huang, DeRen

    2015-12-01

    The remarkable global development of disease-modifying therapies (DMTs) specific for multiple sclerosis (MS) has significantly reduced the frequency of relapse, slowed the progression of disability, and improved the quality of life in patients with MS. With increasing numbers of approved DMTs, neurologists in North America and Europe are able to present multiple treatment options to their patients to achieve a better therapeutic outcome, and in many cases, no evidence of disease activity. MS patients have improved accessibility to various DMTs at no or minimal out-of-pocket cost. The ethical guidelines defined by the Edinburgh revision of the Declaration of Helsinki strongly discourage the use of placebo control groups in modern MS clinical trials. The use of an active comparator control group increases the number of participants in each group that is essential to achieve statistical significance, thus further increasing the difficulty of completing randomized controlled trials (RCTs) for the development of new MS therapies. There is evidence of a high prevalence of MS and a large number of patients in Asia. The belief of the existence of Asian types of MS that are distinct from Western types, and regulatory policies are among the reasons why DMTs are limited in most Asian countries. Lack of access to approved DMTs provides a good opportunity for clinical trials that are designed for the development of new MS therapies. Recently, data from RCTs have demonstrated excellent recruitment of participants and the completion of multi-nation and single-nation MS trials within this region. Recent studies using the McDonald MS diagnostic criteria carefully excluded patients with neuromyelitis optica (NMO) and NMO spectrum disorder, and demonstrated that patients with MS in Asia have clinical characteristics and treatment responses similar to those in Western countries.

  13. Contexts and Control Operations Used in Accessing List-Specific, Generalized, and Semantic Memories

    ERIC Educational Resources Information Center

    Humphreys, Michael S.; Murray, Krista L.; Maguire, Angela M.

    2009-01-01

    The human ability to focus memory retrieval operations on a particular list, episode or memory structure has not been fully appreciated or documented. In Experiment 1-3, we make it increasingly difficult for participants to switch between a less recent list (multiple study opportunities), and a more recent list (single study opportunity). Task…

  14. Association of candidate genes with drought tolerance traits in diverse perennial ryegrass accessions

    Treesearch

    Xiaoqing Yu; Guihua Bai; Shuwei Liu; Na Luo; Ying Wang; Douglas S. Richmond; Paula M. Pijut; Scott A. Jackson; Jianming Yu; Yiwei Jiang

    2013-01-01

    Drought is a major environmental stress limiting growth of perennial grasses in temperate regions. Plant drought tolerance is a complex trait that is controlled by multiple genes. Candidate gene association mapping provides a powerful tool for dissection of complex traits. Candidate gene association mapping of drought tolerance traits was conducted in 192 diverse...

  15. Development of the Average Likelihood Function for Code Division Multiple Access (CDMA) Using BPSK and QPSK Symbols

    DTIC Science & Technology

    2015-01-01

    This research has the purpose to establish a foundation for new classification and estimation of CDMA signals. Keywords: DS / CDMA signals, BPSK, QPSK...DEVELOPMENT OF THE AVERAGE LIKELIHOOD FUNCTION FOR CODE DIVISION MULTIPLE ACCESS ( CDMA ) USING BPSK AND QPSK SYMBOLS JANUARY 2015...To) OCT 2013 – OCT 2014 4. TITLE AND SUBTITLE DEVELOPMENT OF THE AVERAGE LIKELIHOOD FUNCTION FOR CODE DIVISION MULTIPLE ACCESS ( CDMA ) USING BPSK

  16. Providing end-to-end QoS for multimedia applications in 3G wireless networks

    NASA Astrophysics Data System (ADS)

    Guo, Katherine; Rangarajan, Samapth; Siddiqui, M. A.; Paul, Sanjoy

    2003-11-01

    As the usage of wireless packet data services increases, wireless carriers today are faced with the challenge of offering multimedia applications with QoS requirements within current 3G data networks. End-to-end QoS requires support at the application, network, link and medium access control (MAC) layers. We discuss existing CDMA2000 network architecture and show its shortcomings that prevent supporting multiple classes of traffic at the Radio Access Network (RAN). We then propose changes in RAN within the standards framework that enable support for multiple traffic classes. In addition, we discuss how Session Initiation Protocol (SIP) can be augmented with QoS signaling for supporting end-to-end QoS. We also review state of the art scheduling algorithms at the base station and provide possible extensions to these algorithms to support different classes of traffic as well as different classes of users.

  17. Pulse patterning effect in optical pulse division multiplexing for flexible single wavelength multiple access optical network

    NASA Astrophysics Data System (ADS)

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-01

    A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.

  18. HoloHands: games console interface for controlling holographic optical manipulation

    NASA Astrophysics Data System (ADS)

    McDonald, C.; McPherson, M.; McDougall, C.; McGloin, D.

    2013-03-01

    The increasing number of applications for holographic manipulation techniques has sparked the development of more accessible control interfaces. Here, we describe a holographic optical tweezers experiment which is controlled by gestures that are detected by a Microsoft Kinect. We demonstrate that this technique can be used to calibrate the tweezers using the Stokes drag method and compare this to automated calibrations. We also show that multiple particle manipulation can be handled. This is a promising new line of research for gesture-based control which could find applications in a wide variety of experimental situations.

  19. A development framework for distributed artificial intelligence

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.; Cottman, Bruce H.

    1989-01-01

    The authors describe distributed artificial intelligence (DAI) applications in which multiple organizations of agents solve multiple domain problems. They then describe work in progress on a DAI system development environment, called SOCIAL, which consists of three primary language-based components. The Knowledge Object Language defines models of knowledge representation and reasoning. The metaCourier language supplies the underlying functionality for interprocess communication and control access across heterogeneous computing environments. The metaAgents language defines models for agent organization coordination, control, and resource management. Application agents and agent organizations will be constructed by combining metaAgents and metaCourier building blocks with task-specific functionality such as diagnostic or planning reasoning. This architecture hides implementation details of communications, control, and integration in distributed processing environments, enabling application developers to concentrate on the design and functionality of the intelligent agents and agent networks themselves.

  20. Location Based Application Availability

    NASA Astrophysics Data System (ADS)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  1. A development framework for artificial intelligence based distributed operations support systems

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.; Cottman, Bruce H.

    1990-01-01

    Advanced automation is required to reduce costly human operations support requirements for complex space-based and ground control systems. Existing knowledge based technologies have been used successfully to automate individual operations tasks. Considerably less progress has been made in integrating and coordinating multiple operations applications for unified intelligent support systems. To fill this gap, SOCIAL, a tool set for developing Distributed Artificial Intelligence (DAI) systems is being constructed. SOCIAL consists of three primary language based components defining: models of interprocess communication across heterogeneous platforms; models for interprocess coordination, concurrency control, and fault management; and for accessing heterogeneous information resources. DAI applications subsystems, either new or existing, will access these distributed services non-intrusively, via high-level message-based protocols. SOCIAL will reduce the complexity of distributed communications, control, and integration, enabling developers to concentrate on the design and functionality of the target DAI system itself.

  2. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  3. An SSH key management system: easing the pain of managing key/user/account associations

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  4. Effects of sugar solutions on hypothalamic appetite regulation.

    PubMed

    Colley, Danielle L; Castonguay, Thomas W

    2015-02-01

    Several hypotheses for the causes of the obesity epidemic in the US have been proposed. One such hypothesis is that dietary intake patterns have significantly shifted to include unprecedented amounts of refined sugar. We set out to determine if different sugars might promote changes in the hypothalamic mechanisms controlling food intake by measuring several hypothalamic peptides subsequent to overnight access to dilute glucose, sucrose, high fructose corn syrup, or fructose solutions. Rats were given access to food, water and a sugar solution for 24h, after which blood and tissues were collected. Fructose access (as opposed to other sugars that were tested) resulted in a doubling of circulating triglycerides. Glucose consumption resulted in upregulation of 7 satiety-related hypothalamic peptides whereas changes in gene expression were mixed for remaining sugars. Also, following multiple verification assays, 6 satiety related peptides were verified as being affected by sugar intake. These data provide evidence that not all sugars are equally effective in affecting the control of intake. Copyright © 2014. Published by Elsevier Inc.

  5. Accessing the exceptional points of parity-time symmetric acoustics

    PubMed Central

    Shi, Chengzhi; Dubois, Marc; Chen, Yun; Cheng, Lei; Ramezani, Hamidreza; Wang, Yuan; Zhang, Xiang

    2016-01-01

    Parity-time (PT) symmetric systems experience phase transition between PT exact and broken phases at exceptional point. These PT phase transitions contribute significantly to the design of single mode lasers, coherent perfect absorbers, isolators, and diodes. However, such exceptional points are extremely difficult to access in practice because of the dispersive behaviour of most loss and gain materials required in PT symmetric systems. Here we introduce a method to systematically tame these exceptional points and control PT phases. Our experimental demonstration hinges on an active acoustic element that realizes a complex-valued potential and simultaneously controls the multiple interference in the structure. The manipulation of exceptional points offers new routes to broaden applications for PT symmetric physics in acoustics, optics, microwaves and electronics, which are essential for sensing, communication and imaging. PMID:27025443

  6. Mof-Tree: A Spatial Access Method To Manipulate Multiple Overlapping Features.

    ERIC Educational Resources Information Center

    Manolopoulos, Yannis; Nardelli, Enrico; Papadopoulos, Apostolos; Proietti, Guido

    1997-01-01

    Investigates the manipulation of large sets of two-dimensional data representing multiple overlapping features, and presents a new access method, the MOF-tree. Analyzes storage requirements and time with respect to window query operations involving multiple features. Examines both the pointer-based and pointerless MOF-tree representations.…

  7. Universal filtered multi-carrier system for asynchronous uplink transmission in optical access network

    NASA Astrophysics Data System (ADS)

    Kang, Soo-Min; Kim, Chang-Hun; Han, Sang-Kook

    2016-02-01

    In passive optical network (PON), orthogonal frequency division multiplexing (OFDM) has been studied actively due to its advantages such as high spectra efficiency (SE), dynamic resource allocation in time or frequency domain, and dispersion robustness. However, orthogonal frequency division multiple access (OFDMA)-PON requires tight synchronization among multiple access signals. If not, frequency orthogonality could not be maintained. Also its sidelobe causes inter-channel interference (ICI) to adjacent channel. To prevent ICI caused by high sidelobes, guard band (GB) is usually used which degrades SE. Thus, OFDMA-PON is not suitable for asynchronous uplink transmission in optical access network. In this paper, we propose intensity modulation/direct detection (IM/DD) based universal filtered multi-carrier (UFMC) PON for asynchronous multiple access. The UFMC uses subband filtering to subsets of subcarriers. Since it reduces sidelobe of each subband by applying subband filtering, it could achieve better performance compared to OFDM. For the experimental demonstration, different sample delay was applied to subbands to implement asynchronous transmission condition. As a result, time synchronization robustness of UFMC was verified in asynchronous multiple access system.

  8. Odour discrimination and identification are improved in early blindness.

    PubMed

    Cuevas, Isabel; Plaza, Paula; Rombaux, Philippe; De Volder, Anne G; Renier, Laurent

    2009-12-01

    Previous studies showed that early blind humans develop superior abilities in the use of their remaining senses, hypothetically due to a functional reorganization of the deprived visual brain areas. While auditory and tactile functions have been investigated for long, little is known about the effects of early visual deprivation on olfactory processing. However, blind humans make an extensive use of olfactory information in their daily life. Here we investigated olfactory discrimination and identification abilities in early blind subjects and age-matched sighted controls. Three levels of cuing were used in the identification task, i.e., free-identification (no cue), categorization (semantic cues) and multiple choice (semantic and phonological cues). Early blind subjects significantly outperformed the controls in odour discrimination, free-identification and categorization. In addition, the larger group difference was observed in the free-identification as compared to the categorization and the multiple choice conditions. This indicated that a better access to the semantic information from odour perception accounted for part of the improved olfactory performances in odour identification in the blind. We concluded that early blind subjects have both improved perceptual abilities and a better access to the information stored in semantic memory than sighted subjects.

  9. Routes to DNA accessibility: alternative pathways for nucleosome unwinding.

    PubMed

    Schlingman, Daniel J; Mack, Andrew H; Kamenetska, Masha; Mochrie, Simon G J; Regan, Lynne

    2014-07-15

    The dynamic packaging of DNA into chromatin is a key determinant of eukaryotic gene regulation and epigenetic inheritance. Nucleosomes are the basic unit of chromatin, and therefore the accessible states of the nucleosome must be the starting point for mechanistic models regarding these essential processes. Although the existence of different unwound nucleosome states has been hypothesized, there have been few studies of these states. The consequences of multiple states are far reaching. These states will behave differently in all aspects, including their interactions with chromatin remodelers, histone variant exchange, and kinetic properties. Here, we demonstrate the existence of two distinct states of the unwound nucleosome, which are accessible at physiological forces and ionic strengths. Using optical tweezers, we measure the rates of unwinding and rewinding for these two states and show that the rewinding rates from each state are different. In addition, we show that the probability of unwinding into each state is dependent on the applied force and ionic strength. Our results demonstrate not only that multiple unwound states exist but that their accessibility can be differentially perturbed, suggesting possible roles for these states in gene regulation. For example, different histone variants or modifications may facilitate or suppress access to DNA by promoting unwinding into one state or the other. We anticipate that the two unwound states reported here will be the basis for future models of eukaryotic transcriptional control. Copyright © 2014 Biophysical Society. Published by Elsevier Inc. All rights reserved.

  10. Planning assistance for the NASA 30/20 GHz program. Network control architecture study.

    NASA Technical Reports Server (NTRS)

    Inukai, T.; Bonnelycke, B.; Strickland, S.

    1982-01-01

    Network Control Architecture for a 30/20 GHz flight experiment system operating in the Time Division Multiple Access (TDMA) was studied. Architecture development, identification of processing functions, and performance requirements for the Master Control Station (MCS), diversity trunking stations, and Customer Premises Service (CPS) stations are covered. Preliminary hardware and software processing requirements as well as budgetary cost estimates for the network control system are given. For the trunking system control, areas covered include on board SS-TDMA switch organization, frame structure, acquisition and synchronization, channel assignment, fade detection and adaptive power control, on board oscillator control, and terrestrial network timing. For the CPS control, they include on board processing and adaptive forward error correction control.

  11. VERCE: a productive e-Infrastructure and e-Science environment for data-intensive seismology research

    NASA Astrophysics Data System (ADS)

    Vilotte, J. P.; Atkinson, M.; Spinuso, A.; Rietbrock, A.; Michelini, A.; Igel, H.; Frank, A.; Carpené, M.; Schwichtenberg, H.; Casarotti, E.; Filgueira, R.; Garth, T.; Germünd, A.; Klampanos, I.; Krause, A.; Krischer, L.; Leong, S. H.; Magnoni, F.; Matser, J.; Moguilny, G.

    2015-12-01

    Seismology addresses both fundamental problems in understanding the Earth's internal wave sources and structures and augmented societal applications, like earthquake and tsunami hazard assessment and risk mitigation; and puts a premium on open-data accessible by the Federated Digital Seismological Networks. The VERCE project, "Virtual Earthquake and seismology Research Community e-science environment in Europe", has initiated a virtual research environment to support complex orchestrated workflows combining state-of-art wave simulation codes and data analysis tools on distributed computing and data infrastructures (DCIs) along with multiple sources of observational data and new capabilities to combine simulation results with observational data. The VERCE Science Gateway provides a view of all the available resources, supporting collaboration with shared data and methods, with data access controls. The mapping to DCIs handles identity management, authority controls, transformations between representations and controls, and access to resources. The framework for computational science that provides simulation codes, like SPECFEM3D, democratizes their use by getting data from multiple sources, managing Earth models and meshes, distilling them as input data, and capturing results with meta-data. The dispel4py data-intensive framework allows for developing data-analysis applications using Python and the ObsPy library, which can be executed on different DCIs. A set of tools allows coupling with seismology and external data services. Provenance driven tools validate results and show relationships between data to facilitate method improvement. Lessons learned from VERCE training lead us to conclude that solid-Earth scientists could make significant progress by using VERCE e-science environment. VERCE has already contributed to the European Plate Observation System (EPOS), and is part of the EPOS implementation phase. Its cross-disciplinary capabilities are being extended for the EPOS implantation phase.

  12. Potential Benefits of Nintendo Wii Fit Among People with Multiple Sclerosis

    PubMed Central

    Finlayson, Marcia

    2011-01-01

    We examined the potential of Nintendo Wii Fit (Nintendo Co, Ltd, Kyoto, Japan) to increase physical activity (PA) behavior and health among people with multiple sclerosis (MS). The study consisted of a repeated-measures design with a baseline control period and involved 30 people with MS who had the ability to walk 25 feet with or without a cane (26 individuals were included in the analyses). Nintendo Wii was set up in the homes of participants, who were prescribed a Wii Fit exercise program lasting 14 weeks, 3 days a week. The Physical Activity and Disability Survey, Modified Fatigue Impact Scale, and 36-item Short Form Health Status Survey were administered three times before participants gained access to Wii Fit (control period, at 2-week intervals), and three times after they received Wii Fit (posttest 1: immediately after; posttest 2: 7 weeks after; posttest 3: 14 weeks after). Mobility, balance, strength, and weight were assessed at the first pretest, immediately prior to obtaining access to Wii Fit, and 7 weeks after obtaining access to Wii Fit. Results from the questionnaires indicated that PA significantly improved at week 7, but at week 14, PA levels declined relative to week 7 and the difference was no longer significant compared with the control period. Physical assessments indicated that balance and strength significantly improved at week 7. One adverse event was reported (repetitive knee injury). Physical assessments indicated that people with MS may be able to improve their fitness levels by using Wii Fit. Future studies should incorporate behavior change strategies to promote long-term use of Wii Fit, and explore whether individuals with more severe symptoms of MS can safely use Wii Fit. PMID:24453702

  13. Access to and use of health services as factors associated with neonatal mortality in the North, Northeast, and Vale do Jequitinhonha regions, Brazil.

    PubMed

    Batista, Cristiane B; Carvalho, Márcia L de; Vasconcelos, Ana Glória G

    To analyze the factors associated with neonatal mortality related to health services accessibility and use. Case-control study of live births in 2008 in small- and medium-sized municipalities in the North, Northeast, and Vale do Jequitinhonha regions, Brazil. A probabilistic sample stratified by region, population size, and information adequacy was generated for the choice of municipalities. Of these, all municipalities with 20,000 inhabitants or less were included in the study (36 municipalities), whereas the remainder were selected according to the probability method proportional to population size, totaling 20 cities with 20,001-50,000 inhabitants and 19 municipalities with 50,001-200,000 inhabitants. All deaths of live births in these cities were included. Controls were randomly sampled, considered as four times the number of cases. The sample size comprised 412 cases and 1772 controls. Hierarchical multiple logistic regression was used for data analysis. The risk factors for neonatal death were socioeconomic class D and E (OR=1.28), history of child death (OR=1.74), high-risk pregnancy (OR=4.03), peregrination in antepartum (OR=1.46), lack of prenatal care (OR=2.81), absence of professional for the monitoring of labor (OR=3.34), excessive time waiting for delivery (OR=1.97), borderline preterm birth (OR=4.09) and malformation (OR=13.66). These results suggest multiple causes of neonatal mortality, as well as the need to improve access to good quality maternal-child health care services in the assessed places of study. Copyright © 2017 Sociedade Brasileira de Pediatria. Published by Elsevier Editora Ltda. All rights reserved.

  14. Potential benefits of nintendo wii fit among people with multiple sclerosis: a longitudinal pilot study.

    PubMed

    Plow, Matthew; Finlayson, Marcia

    2011-01-01

    We examined the potential of Nintendo Wii Fit (Nintendo Co, Ltd, Kyoto, Japan) to increase physical activity (PA) behavior and health among people with multiple sclerosis (MS). The study consisted of a repeated-measures design with a baseline control period and involved 30 people with MS who had the ability to walk 25 feet with or without a cane (26 individuals were included in the analyses). Nintendo Wii was set up in the homes of participants, who were prescribed a Wii Fit exercise program lasting 14 weeks, 3 days a week. The Physical Activity and Disability Survey, Modified Fatigue Impact Scale, and 36-item Short Form Health Status Survey were administered three times before participants gained access to Wii Fit (control period, at 2-week intervals), and three times after they received Wii Fit (posttest 1: immediately after; posttest 2: 7 weeks after; posttest 3: 14 weeks after). Mobility, balance, strength, and weight were assessed at the first pretest, immediately prior to obtaining access to Wii Fit, and 7 weeks after obtaining access to Wii Fit. Results from the questionnaires indicated that PA significantly improved at week 7, but at week 14, PA levels declined relative to week 7 and the difference was no longer significant compared with the control period. Physical assessments indicated that balance and strength significantly improved at week 7. One adverse event was reported (repetitive knee injury). Physical assessments indicated that people with MS may be able to improve their fitness levels by using Wii Fit. Future studies should incorporate behavior change strategies to promote long-term use of Wii Fit, and explore whether individuals with more severe symptoms of MS can safely use Wii Fit.

  15. SAR processing on the MPP

    NASA Technical Reports Server (NTRS)

    Batcher, K. E.; Eddey, E. E.; Faiss, R. O.; Gilmore, P. A.

    1981-01-01

    The processing of synthetic aperture radar (SAR) signals using the massively parallel processor (MPP) is discussed. The fast Fourier transform convolution procedures employed in the algorithms are described. The MPP architecture comprises an array unit (ARU) which processes arrays of data; an array control unit which controls the operation of the ARU and performs scalar arithmetic; a program and data management unit which controls the flow of data; and a unique staging memory (SM) which buffers and permutes data. The ARU contains a 128 by 128 array of bit-serial processing elements (PE). Two-by-four surarrays of PE's are packaged in a custom VLSI HCMOS chip. The staging memory is a large multidimensional-access memory which buffers and permutes data flowing with the system. Efficient SAR processing is achieved via ARU communication paths and SM data manipulation. Real time processing capability can be realized via a multiple ARU, multiple SM configuration.

  16. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    PubMed

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  17. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    PubMed Central

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  18. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    PubMed

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  19. Decentralized Adaptive Control of Systems with Uncertain Interconnections, Plant-Model Mismatch and Actuator Failures

    NASA Technical Reports Server (NTRS)

    Patre, Parag; Joshi, Suresh M.

    2011-01-01

    Decentralized adaptive control is considered for systems consisting of multiple interconnected subsystems. It is assumed that each subsystem s parameters are uncertain and the interconnection parameters are not known. In addition, mismatch can exist between each subsystem and its reference model. A strictly decentralized adaptive control scheme is developed, wherein each subsystem has access only to its own state but has the knowledge of all reference model states. The mismatch is estimated online for each subsystem and the mismatch estimates are used to adaptively modify the corresponding reference models. The adaptive control scheme is extended to the case with actuator failures in addition to mismatch.

  20. Data Grid Management Systems

    NASA Technical Reports Server (NTRS)

    Moore, Reagan W.; Jagatheesan, Arun; Rajasekar, Arcot; Wan, Michael; Schroeder, Wayne

    2004-01-01

    The "Grid" is an emerging infrastructure for coordinating access across autonomous organizations to distributed, heterogeneous computation and data resources. Data grids are being built around the world as the next generation data handling systems for sharing, publishing, and preserving data residing on storage systems located in multiple administrative domains. A data grid provides logical namespaces for users, digital entities and storage resources to create persistent identifiers for controlling access, enabling discovery, and managing wide area latencies. This paper introduces data grids and describes data grid use cases. The relevance of data grids to digital libraries and persistent archives is demonstrated, and research issues in data grids and grid dataflow management systems are discussed.

  1. Performance, implementation and network management techniques for a European CDMA-based land-mobile satellite system

    NASA Astrophysics Data System (ADS)

    Arenaccio, S.; Vernucci, A.; Padovani, R.; Arcidiacono, A.

    Results of a detailed comparative performance assessment between two candidate access solutions for the provision of land-mobile services, i.e., FDMA and CDMA, for the European Land-Mobile Satellite Services (LMSS) provision are presented. The design of the CDMA access system and the network architecture, system procedures, network control, operation in fading environments, and implementation aspects of the system are described. The CDMA system is shown to yield superior traffic capability, despite the absence of polarization reuse due to payload design, especially in the second-generation era (multiple spot-beams). In this case, the advantage was found to be largely dependent on the traffic distribution across spot beams. Power control techniques are proposed to cope with the geographical disadvantage suffered by mobile stations located at the beam borders to compensate for fadings.

  2. Opportunistic Access in Frequency Hopping Cognitive Radio Networks

    DTIC Science & Technology

    2014-03-27

    thresholding MA multiple access MFSK M-ary frequency shift keying MIMO multiple-input/multiple-output OFDM orthogonal frequency-division multiplexing x...adaptive BER performance as a function of ISR with orthogonal frequency-division multiplexing ( OFDM ) interference present. . . . . . . . . . 41 4.15 Non...adaptive BER performance as a function of EB/N0 with OFDM interfer- ence present

  3. Consistent, high-level ethanol consumption in pig-tailed macaques via a multiple-session, limited-intake, oral self-dosing procedure.

    PubMed

    Weed, Michael R; Wilcox, Kristin M; Ator, Nancy A; Hienz, Robert D

    2008-06-01

    Alcohol abuse is a major public health burden that can lead to many adverse health effects such as impaired hepatic, gastrointestinal, central nervous system and immune system function. Preclinical animal models of alcohol abuse allow for experimental control over variables often difficult to control in human clinical studies (e.g., ethanol exposure before or during the study, history of other drug use, access to medical care, nutritional status, etc). Nonhuman primate models in particular provide increased genetic, anatomic and physiologic similarity to humans, relative to rodent models. A small percentage of macaques will spontaneously consume large quantities of ethanol; however, most nonhuman primate models of "voluntary" ethanol intake produce relatively low daily ethanol intake in the majority of monkeys. To facilitate study of chronic exposure to high levels of ethanol intake, a macaque model has been developed that induces consistent, daily high-level ethanol consumption. This multiple-session procedure employed 4 drinking sessions per day, with sessions occurring once every 6 hours. The group average alcohol consumption was 4.6 g/kg/d (SEM 0.4), roughly twice the group average consumption of previous reports. Ethanol drinking sessions produced group mean blood ethanol levels of 95 mg/dl after 60 minutes, and fine motor control was impaired up to 90 minutes after a drinking session. This model of multiple-session, limited access, oral ethanol self-dosing produced consistent, high-level ethanol consumption with each session qualifying as a "binge" drinking session using the definition of "binge" provided by the NIAAA (>80 mg/dl/session). This model of ethanol drinking in macaques will be of great utility in the study of immunological, physiological and behavioral effects of ethanol in nonhuman primates.

  4. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    PubMed

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  5. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    NASA Technical Reports Server (NTRS)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  6. Frequency comb-based multiple-access ultrastable frequency dissemination with 7 × 10(-17) instability.

    PubMed

    Zhang, Shuangyou; Zhao, Jianye

    2015-01-01

    In this letter, we demonstrate frequency-comb-based multiple-access ultrastable frequency dissemination over a 10-km single-mode fiber link. First, we synchronize optical pulse trains from an Er-fiber frequency comb to the remote site by using a simple and robust phase-conjugate stabilization method. The fractional frequency-transfer instability at the remote site is 2.6×10(-14) and 4.9×10(-17) for averaging times of 1 and 10,000 s, respectively. Then, we reproduce the harmonic of the repetition rate from the disseminated optical pulse trains at an arbitrary point along the fiber link to test comb-based multiple-access performance, and demonstrate frequency instability of 4×10(-14) and 7×10(-17) at 1 and 10,000 s averaging time, respectively. The proposed comb-based multiple-access frequency dissemination can easily achieve highly stable wideband microwave extraction along the whole link.

  7. Uncoordinated MAC for Adaptive Multi Beam Directional Networks: Analysis and Evaluation

    DTIC Science & Technology

    2016-08-01

    control (MAC) policies for emerging systems that are equipped with fully digital antenna arrays which are capable of adaptive multi-beam directional...Adaptive Beam- forming, Multibeam, Directional Networking, Random Access, Smart Antennas I. INTRODUCTION Fully digital beamforming antenna arrays that...are capable of adaptive multi-beam communications are quickly becoming a reality. These antenna arrays allow users to form multiple simultaneous

  8. Querying and Computing with BioCyc Databases

    PubMed Central

    Krummenacker, Markus; Paley, Suzanne; Mueller, Lukas; Yan, Thomas; Karp, Peter D.

    2006-01-01

    Summary We describe multiple methods for accessing and querying the complex and integrated cellular data in the BioCyc family of databases: access through multiple file formats, access through Application Program Interfaces (APIs) for LISP, Perl and Java, and SQL access through the BioWarehouse relational database. Availability The Pathway Tools software and 20 BioCyc DBs in Tiers 1 and 2 are freely available to academic users; fees apply to some types of commercial use. For download instructions see http://BioCyc.org/download.shtml PMID:15961440

  9. A trade-off between precopulatory and postcopulatory trait investment in male cetaceans.

    PubMed

    Dines, James P; Mesnick, Sarah L; Ralls, Katherine; May-Collado, Laura; Agnarsson, Ingi; Dean, Matthew D

    2015-06-01

    Mating with multiple partners is common across species, and understanding how individual males secure fertilization in the face of competition remains a fundamental goal of evolutionary biology. Game theory stipulates that males have a fixed budget for reproduction that can lead to a trade-off between investment in precopulatory traits such as body size, armaments, and ornaments, and postcopulatory traits such as testis size and spermatogenic efficiency. Recent theoretical and empirical studies have shown that if males can monopolize access to multiple females, they will invest disproportionately in precopulatory traits and less in postcopulatory traits. Using phylogenetically controlled comparative methods, we demonstrate that across 58 cetacean species with the most prominent sexual dimorphism in size, shape, teeth, tusks, and singing invest significantly less in relative testes mass. In support of theoretical predictions, these species tend to show evidence of male contests, suggesting there is opportunity for winners to monopolize access to multiple females. Our approach provides a robust dataset with which to make predictions about male mating strategies for the many cetacean species for which adequate behavioral observations do not exist. © 2015 The Author(s). Evolution © 2015 The Society for the Study of Evolution.

  10. A Wideband Satcom Based Avionics Network with CDMA Uplink and TDM Downlink

    NASA Technical Reports Server (NTRS)

    Agrawal, D.; Johnson, B. S.; Madhow, U.; Ramchandran, K.; Chun, K. S.

    2000-01-01

    The purpose of this paper is to describe some key technical ideas behind our vision of a future satcom based digital communication network for avionics applications The key features of our design are as follows: (a) Packetized transmission to permit efficient use of system resources for multimedia traffic; (b) A time division multiplexed (TDM) satellite downlink whose physical layer is designed to operate the satellite link at maximum power efficiency. We show how powerful turbo codes (invented originally for linear modulation) can be used with nonlinear constant envelope modulation, thus permitting the satellite amplifier to operate in a power efficient nonlinear regime; (c) A code division multiple access (CDMA) satellite uplink, which permits efficient access to the satellite from multiple asynchronous users. Closed loop power control is difficult for bursty packetized traffic, especially given the large round trip delay to the satellite. We show how adaptive interference suppression techniques can be used to deal with the ensuing near-far problem; (d) Joint source-channel coding techniques are required both at the physical and the data transport layer to optimize the end-to-end performance. We describe a novel approach to multiple description image encoding at the data transport layer in this paper.

  11. Tactical resource allocation and elective patient admission planning in care processes.

    PubMed

    Hulshof, Peter J H; Boucherie, Richard J; Hans, Erwin W; Hurink, Johann L

    2013-06-01

    Tactical planning of resources in hospitals concerns elective patient admission planning and the intermediate term allocation of resource capacities. Its main objectives are to achieve equitable access for patients, to meet production targets/to serve the strategically agreed number of patients, and to use resources efficiently. This paper proposes a method to develop a tactical resource allocation and elective patient admission plan. These tactical plans allocate available resources to various care processes and determine the selection of patients to be served that are at a particular stage of their care process. Our method is developed in a Mixed Integer Linear Programming (MILP) framework and copes with multiple resources, multiple time periods and multiple patient groups with various uncertain treatment paths through the hospital, thereby integrating decision making for a chain of hospital resources. Computational results indicate that our method leads to a more equitable distribution of resources and provides control of patient access times, the number of patients served and the fraction of allocated resource capacity. Our approach is generic, as the base MILP and the solution approach allow for including various extensions to both the objective criteria and the constraints. Consequently, the proposed method is applicable in various settings of tactical hospital management.

  12. The relationship between employment and health and health care among working-age adults with and without disabilities in the United States.

    PubMed

    Reichard, Amanda; Stransky, Michelle; Brucker, Debra; Houtenville, Andrew

    2018-05-20

    To better understand the relationship between employment and health and health care for people with disabilities in the United States (US). We pooled US Medical Expenditure Panel Survey (2004-2010) data to examine health status, and access to health care among working-age adults, comparing people with physical disabilities or multiple disabilities to people without disabilities, based on their employment status. Logistic regression and least squares regression were conducted, controlling for sociodemographics, health insurance (when not the outcome), multiple chronic conditions, and need for assistance. Employment was inversely related to access to care, insurance, and obesity. Yet, people with disabilities employed in the past year reported better general and mental health than their peers with the same disabilities who were not employed. Those who were employed were more likely to have delayed/forgone necessary care, across disability groups. Part-time employment, especially for people with multiple limitations, was associated with better health and health care outcomes than full-time employment. Findings highlight the importance of addressing employment-related causes of delayed or foregone receipt of necessary care (e.g., flex-time for attending appointments) that exist for all workers, especially those with physical or multiple disabilities. Implications for rehabilitation These findings demonstrate that rehabilitation professionals who are seeking to support employment for persons with physical limitations need to ensure that overall health concerns are adequately addressed, both for those seeking employment and for those who are currently employed. Assisting clients in prioritizing health equally with employment can ensure that both areas receive sufficient attention. Engaging with employers to develop innovative practices to improve health, health behaviors and access to care for employees with disabilities can decrease turnover, increase productivity, and ensure longer job tenure.

  13. Controlling the joint local false discovery rate is more powerful than meta-analysis methods in joint analysis of summary statistics from multiple genome-wide association studies.

    PubMed

    Jiang, Wei; Yu, Weichuan

    2017-02-15

    In genome-wide association studies (GWASs) of common diseases/traits, we often analyze multiple GWASs with the same phenotype together to discover associated genetic variants with higher power. Since it is difficult to access data with detailed individual measurements, summary-statistics-based meta-analysis methods have become popular to jointly analyze datasets from multiple GWASs. In this paper, we propose a novel summary-statistics-based joint analysis method based on controlling the joint local false discovery rate (Jlfdr). We prove that our method is the most powerful summary-statistics-based joint analysis method when controlling the false discovery rate at a certain level. In particular, the Jlfdr-based method achieves higher power than commonly used meta-analysis methods when analyzing heterogeneous datasets from multiple GWASs. Simulation experiments demonstrate the superior power of our method over meta-analysis methods. Also, our method discovers more associations than meta-analysis methods from empirical datasets of four phenotypes. The R-package is available at: http://bioinformatics.ust.hk/Jlfdr.html . eeyu@ust.hk. Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  14. Electrophoretic-like gating used to control metal-insulator transitions in electronically phase separated manganite wires.

    PubMed

    Guo, Hangwen; Noh, Joo H; Dong, Shuai; Rack, Philip D; Gai, Zheng; Xu, Xiaoshan; Dagotto, Elbio; Shen, Jian; Ward, T Zac

    2013-08-14

    Electronically phase separated manganite wires are found to exhibit controllable metal-insulator transitions under local electric fields. The switching characteristics are shown to be fully reversible, polarity independent, and highly resistant to thermal breakdown caused by repeated cycling. It is further demonstrated that multiple discrete resistive states can be accessed in a single wire. The results conform to a phenomenological model in which the inherent nanoscale insulating and metallic domains are rearranged through electrophoretic-like processes to open and close percolation channels.

  15. Post-Coma Persons with Extensive Multiple Disabilities Use Microswitch Technology to Access Selected Stimulus Events or Operate a Radio Device

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II…

  16. Dose- and time-dependent benefits of iPad technology in an undergraduate human anatomy course.

    PubMed

    Raney, Marcella A

    2016-07-08

    This study examined the impact of iPad integration on performance in an undergraduate gross anatomy course. Two out of six course sections were assigned to one of the following conditions: control (no iPad, n = 61); limited access (laboratory iPads, n = 58); and unlimited access (personal iPads, n = 47). Student knowledge was assessed over time during the semester with two practical examinations in laboratory and four multiple choice/essay examinations in lecture. The same PowerPoint presentations and examinations were utilized for all conditions. Mixed ANOVA analysis identified an interaction effect between time and condition for both laboratory (F2,153  = 16.12; P < 0.05) and lecture (F6,462  = 5.47; P < 0.05) performance. Between laboratory examinations, student performance was lower by 4.2% and higher by 3.0% in control and unlimited access conditions, respectively. Unlimited access students scored higher than control and limited access (82.8 ± 2.2 vs 71.5 ± 2.6 and 74.3 ± 1.7%; P < 0.05) and higher than control students (78.7 ± 2.1 vs 70.6 ± 2.0%; P < 0.05) on the third and fourth lecture examination, respectively. Postsemester surveys completed by experimental students (89.5% response rate) indicated that a greater percentage of unlimited vs limited access students agreed that laboratory (84.8 vs 56.3%, P < 0.05) and lecture (58.7 vs 14.6%, P < 0.05) performance was enhanced with the iPad. Results suggest that if students are given the opportunity to overcome the technology learning curve, tablet devices and relevant applications can be useful tools in human anatomy courses. Anat Sci Educ 9: 367-377. © 2015 American Association of Anatomists. © 2015 American Association of Anatomists.

  17. Distributed multiport memory architecture

    NASA Technical Reports Server (NTRS)

    Kohl, W. H. (Inventor)

    1983-01-01

    A multiport memory architecture is diclosed for each of a plurality of task centers connected to a command and data bus. Each task center, includes a memory and a plurality of devices which request direct memory access as needed. The memory includes an internal data bus and an internal address bus to which the devices are connected, and direct timing and control logic comprised of a 10-state ring counter for allocating memory devices by enabling AND gates connected to the request signal lines of the devices. The outputs of AND gates connected to the same device are combined by OR gates to form an acknowledgement signal that enables the devices to address the memory during the next clock period. The length of the ring counter may be effectively lengthened to any multiple of ten to allow for more direct memory access intervals in one repetitive sequence. One device is a network bus adapter which serially shifts onto the command and data bus, a data word (8 bits plus control and parity bits) during the next ten direct memory access intervals after it has been granted access. The NBA is therefore allocated only one access in every ten intervals, which is a predetermined interval for all centers. The ring counters of all centers are periodically synchronized by DMA SYNC signal to assure that all NBAs be able to function in synchronism for data transfer from one center to another.

  18. Quantum internet using code division multiple access

    PubMed Central

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  19. OASIS: A Data Fusion System Optimized for Access to Distributed Archives

    NASA Astrophysics Data System (ADS)

    Berriman, G. B.; Kong, M.; Good, J. C.

    2002-05-01

    The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.

  20. Open-Phylo: a customizable crowd-computing platform for multiple sequence alignment

    PubMed Central

    2013-01-01

    Citizen science games such as Galaxy Zoo, Foldit, and Phylo aim to harness the intelligence and processing power generated by crowds of online gamers to solve scientific problems. However, the selection of the data to be analyzed through these games is under the exclusive control of the game designers, and so are the results produced by gamers. Here, we introduce Open-Phylo, a freely accessible crowd-computing platform that enables any scientist to enter our system and use crowds of gamers to assist computer programs in solving one of the most fundamental problems in genomics: the multiple sequence alignment problem. PMID:24148814

  1. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.

  2. Frequency Hopping, Multiple Frequency-Shift Keying, Coding, and Optimal Partial-Band Jamming.

    DTIC Science & Technology

    1982-08-01

    receivers appropriate for these two strategies. Each receiver is noncoherent (a coherent receiver is generally impractical) and implements hard...Advances in Coding and Modulation for Noncoherent Channels Affected by Fading, Partial Band, and Multiple- . Access Interference, in A. J. Viterbi...Modulation for Noncoherent Channels Affected by Fading, Partial Band, and Multiple-Access interference, in A. J. Viterbi, ed., Advances in Coumunication

  3. Use of CDMA access technology in mobile satellite systems

    NASA Technical Reports Server (NTRS)

    Ramasastry, Jay; Wiedeman, Bob

    1995-01-01

    Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.

  4. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

    PubMed

    Wang, Shangping; Zhao, Duqiao; Zhang, Yaling

    2017-01-01

    Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.

  5. Clandestine Transmissions and Operations of Embedded Software on Cellular Mobile Devices

    DTIC Science & Technology

    2011-09-01

    Register EMS Enhanced Message Service FDMA Frequency Division Multiple Access GMT Greenwich Mean Time GMSC Gateway Mobile Switching Center...Message Switching Center SMS-IWMSC SMS-Interworking Mobile-Service Switching Center TCH Traffic Channels TDMA Time Division Multiple Access TP...assume the user will not attempt to re-program the device. Finally, we assume that the owner and user do not have root access and cannot disable any

  6. An Architecture for Enabling Migration of Tactical Networks to Future Flexible Ad Hoc WBWF

    DTIC Science & Technology

    2010-09-01

    Requirements Several multiple access schemes TDMA OFDMA SC-OFDMA, FH- CDMA , DS - CDMA , hybrid access schemes, transitions between them Dynamic...parameters algorithms depend on the multiple access scheme If DS - CDMA : handling of macro-diversity (linked to cooperative routing) TDMA and/of OFDMA...Transport format Ciphering @MAC/RLC level : SCM Physical layer (PHY) : signal processing (mod, FEC, etc) CDMA : macro-diversity CDMA , OFDMA

  7. LEOPACK The integrated services communications system based on LEO satellites

    NASA Astrophysics Data System (ADS)

    Negoda, A.; Bunin, S.; Bushuev, E.; Dranovsky, V.

    LEOPACK is yet another LEO satellite project which provides global integrated services for 'business' communications. It utilizes packet rather then circuit switching in both terrestrial and satellite chains as well as cellular approach for frequencies use. Original multiple access protocols and decentralized network control make it possible to organize regionally or logically independent and world-wide networks. Relatively small number of satellites (28) provides virtually global network coverage.

  8. A novel online didactic curriculum helps improve knowledge acquisition among non-emergency medicine rotating residents.

    PubMed

    Branzetti, Jeremy B; Aldeen, Amer Z; Foster, Andrew W; Courtney, D Mark

    2011-01-01

    Rotating residents represent a significant proportion of housestaff in academic emergency departments (EDs), yet they rarely receive targeted didactic education during their emergency medicine (EM) rotations. The goals of this study were: 1) to determine the effectiveness of an online didactic curriculum in improving EM knowledge among rotating residents and 2) to assess rotating resident satisfaction with this curriculum. The authors created an online lecture series of six EM subject areas targeted to rotating residents called the Northwestern University Rotating Resident Curriculum (NURRC). All rotating residents at the study site were eligible, written consent was obtained, and the study was approved by the institutional review board. Consenting participants were pretested with a 42-question multiple-choice examination and then randomized to two groups: one with access to the NURRC during the first 2 weeks of the rotation (experimental) and one without (control). Halfway through the rotation, all participants were post-tested with a different multiple-choice examination, and the controls were then granted NURRC access. The primary outcome was the difference between pretest and posttest scores (score delta). The t-test was used to compare mean scores, and a linear regression model was used to determine the association of NURRC access on score delta after adjustment for pretest type and resident type. A postintervention survey was administered at the end of the rotation to assess satisfaction with the NURRC and collect suggestions for improvement. Fifty-four rotating residents were enrolled: 29 in the experimental group and 25 in the control group. There was no significant difference in pretest scores between the two groups. Mean score delta was 17.3% in the experimental group and 1.6% in the control group, an absolute difference of 15.7% (95% confidence interval [CI]=10% to 22%). After adjustment for resident type and pretest type, the only variable positively associated with the primary outcome was NURRC access. Third-year and preliminary-year internal medicine (IM) residents demonstrated the greatest absolute improvement in score delta when granted NURRC access. Eighty percent of the participants responded to the satisfaction survey. Over 80% of the survey respondents approved of each component lecture and of the NURRC overall. After exposure to an online didactic curriculum, rotating residents demonstrated a significant increase in EM knowledge and reported a high level of satisfaction with the didactic program. © 2010 by the Society for Academic Emergency Medicine.

  9. Flexible services for the support of research.

    PubMed

    Turilli, Matteo; Wallom, David; Williams, Chris; Gough, Steve; Curran, Neal; Tarrant, Richard; Bretherton, Dan; Powell, Andy; Johnson, Matt; Harmer, Terry; Wright, Peter; Gordon, John

    2013-01-28

    Cloud computing has been increasingly adopted by users and providers to promote a flexible, scalable and tailored access to computing resources. Nonetheless, the consolidation of this paradigm has uncovered some of its limitations. Initially devised by corporations with direct control over large amounts of computational resources, cloud computing is now being endorsed by organizations with limited resources or with a more articulated, less direct control over these resources. The challenge for these organizations is to leverage the benefits of cloud computing while dealing with limited and often widely distributed computing resources. This study focuses on the adoption of cloud computing by higher education institutions and addresses two main issues: flexible and on-demand access to a large amount of storage resources, and scalability across a heterogeneous set of cloud infrastructures. The proposed solutions leverage a federated approach to cloud resources in which users access multiple and largely independent cloud infrastructures through a highly customizable broker layer. This approach allows for a uniform authentication and authorization infrastructure, a fine-grained policy specification and the aggregation of accounting and monitoring. Within a loosely coupled federation of cloud infrastructures, users can access vast amount of data without copying them across cloud infrastructures and can scale their resource provisions when the local cloud resources become insufficient.

  10. Full Duplex, Spread Spectrum Radio System

    NASA Technical Reports Server (NTRS)

    Harvey, Bruce A.

    2000-01-01

    The goal of this project was to support the development of a full duplex, spread spectrum voice communications system. The assembly and testing of a prototype system consisting of a Harris PRISM spread spectrum radio, a TMS320C54x signal processing development board and a Zilog Z80180 microprocessor was underway at the start of this project. The efforts under this project were the development of multiple access schemes, analysis of full duplex voice feedback delays, and the development and analysis of forward error correction (FEC) algorithms. The multiple access analysis involved the selection between code division multiple access (CDMA), frequency division multiple access (FDMA) and time division multiple access (TDMA). Full duplex voice feedback analysis involved the analysis of packet size and delays associated with full loop voice feedback for confirmation of radio system performance. FEC analysis included studies of the performance under the expected burst error scenario with the relatively short packet lengths, and analysis of implementation in the TMS320C54x digital signal processor. When the capabilities and the limitations of the components used were considered, the multiple access scheme chosen was a combination TDMA/FDMA scheme that will provide up to eight users on each of three separate frequencies. Packets to and from each user will consist of 16 samples at a rate of 8,000 samples per second for a total of 2 ms of voice information. The resulting voice feedback delay will therefore be 4 - 6 ms. The most practical FEC algorithm for implementation was a convolutional code with a Viterbi decoder. Interleaving of the bits of each packet will be required to offset the effects of burst errors.

  11. GSFC network operations with Tracking and Data Relay Satellites

    NASA Astrophysics Data System (ADS)

    Spearing, R.; Perreten, D. E.

    The Tracking and Data Relay Satellite System (TDRSS) Network (TN) has been developed to provide services to all NASA User spacecraft in near-earth orbits. Three inter-relating entities will provide these services. The TN has been transformed from a network continuously changing to meet User specific requirements to a network which is flexible to meet future needs without significant changes in operational concepts. Attention is given to the evolution of the TN network, the TN capabilities-space segment, forward link services, tracking services, return link services, the three basic capabilities, single access services, multiple access services, simulation services, the White Sands Ground Terminal, the NASA communications network, and the network control center.

  12. GSFC network operations with Tracking and Data Relay Satellites

    NASA Technical Reports Server (NTRS)

    Spearing, R.; Perreten, D. E.

    1984-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Network (TN) has been developed to provide services to all NASA User spacecraft in near-earth orbits. Three inter-relating entities will provide these services. The TN has been transformed from a network continuously changing to meet User specific requirements to a network which is flexible to meet future needs without significant changes in operational concepts. Attention is given to the evolution of the TN network, the TN capabilities-space segment, forward link services, tracking services, return link services, the three basic capabilities, single access services, multiple access services, simulation services, the White Sands Ground Terminal, the NASA communications network, and the network control center.

  13. Adaptive receiver structures for asynchronous CDMA systems

    NASA Astrophysics Data System (ADS)

    Rapajic, Predrag B.; Vucetic, Branka S.

    1994-05-01

    Adaptive linear and decision feedback receiver structures for coherent demodulation in asynchronous code division multiple access (CDMA) systems are considered. It is assumed that the adaptive receiver has no knowledge of the signature waveforms and timing of other users. The receiver is trained by a known training sequence prior to data transmission and continuously adjusted by an adaptive algorithm during data transmission. The proposed linear receiver is as simple as a standard single-user detector receiver consisting of a matched filter with constant coefficients, but achieves essential advantages with respect to timing recovery, multiple access interference elimination, near/far effect, narrowband and frequency-selective fading interference suppression, and user privacy. An adaptive centralized decision feedback receiver has the same advantages of the linear receiver but, in addition, achieves a further improvement in multiple access interference cancellation at the expense of higher complexity. The proposed receiver structures are tested by simulation over a channel with multipath propagation, multiple access interference, narrowband interference, and additive white Gaussian noise.

  14. A comparison of Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) approaches to satellite service for low data rate Earth stations

    NASA Technical Reports Server (NTRS)

    Stevens, G.

    1983-01-01

    A technological and economic assessment is made of providing low data rate service to small earth stations by satellite at Ka-band. Various Frequency Domain Multiple Access (FDMA) and Time Domain Multiple Access (TDMA) scenarios are examined and compared on the basis of cost to the end user. Very small stations (1 to 2 meters in diameter) are found not to be viable alternatives to available terrestrial services. However, medium size (3 to 5 meters) earth stations appear to be very competitive if a minimum throughput of about 1.5 Mbs is maintained. This constrains the use of such terminals to large users and shared use by smaller users. No advantage was found to the use of FDMA. TDMA had a slight advantage from a total system viewpoint and a very significant advantage in the space segment (about 1/3 the required payload weight for an equivalent capacity).

  15. Real-Time Data Filtering and Compression in Wide Area Simulation Networks

    DTIC Science & Technology

    1992-10-02

    Area Simulation Networks Achieving the real-time linkage among multiple , geographically-distant, local area networks that support distributed...November 1989, pp. 52-61. [IEEE85] IEEE/ANSI Standard 8802/3 "Carrier sense multiple access with collision detection (CSMA/CD) access method and...decoding/encoding of multiple bits. The hardware is programmable, easily adaptable and yields a high compression rate. A prototype 2-micron VLSI chip

  16. Evaluation of CDMA system capacity for mobile satellite system applications

    NASA Technical Reports Server (NTRS)

    Smith, Partrick O.; Geraniotis, Evaggelos A.

    1988-01-01

    A specific Direct-Sequence/Pseudo-Noise (DS/PN) Code-Division Multiple-Access (CDMA) mobile satellite system (MSAT) architecture is discussed. The performance of this system is evaluated in terms of the maximum number of active MSAT subscribers that can be supported at a given uncoded bit-error probability. The evaluation decouples the analysis of the multiple-access capability (i.e., the number of instantaneous user signals) from the analysis of the multiple-access mutliplier effect allowed by the use of CDMA with burst-modem operation. We combine the results of these two analyses and present numerical results for scenarios of interest to the mobile satellite system community.

  17. Security Implications of OPC, OLE, DCOM, and RPC in Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2006-01-01

    OPC is a collection of software programming standards and interfaces used in the process control industry. It is intended to provide open connectivity and vendor equipment interoperability. The use of OPC technology simplifies the development of control systems that integrate components from multiple vendors and support multiple control protocols. OPC-compliant products are available from most control system vendors, and are widely used in the process control industry. OPC was originally known as OLE for Process Control; the first standards for OPC were based on underlying services in the Microsoft Windows computing environment. These underlying services (OLE [Object Linking and Embedding],more » DCOM [Distributed Component Object Model], and RPC [Remote Procedure Call]) have been the source of many severe security vulnerabilities. It is not feasible to automatically apply vendor patches and service packs to mitigate these vulnerabilities in a control systems environment. Control systems using the original OPC data access technology can thus inherit the vulnerabilities associated with these services. Current OPC standardization efforts are moving away from the original focus on Microsoft protocols, with a distinct trend toward web-based protocols that are independent of any particular operating system. However, the installed base of OPC equipment consists mainly of legacy implementations of the OLE for Process Control protocols.« less

  18. Wide-area-distributed storage system for a multimedia database

    NASA Astrophysics Data System (ADS)

    Ueno, Masahiro; Kinoshita, Shigechika; Kuriki, Makato; Murata, Setsuko; Iwatsu, Shigetaro

    1998-12-01

    We have developed a wide-area-distribution storage system for multimedia databases, which minimizes the possibility of simultaneous failure of multiple disks in the event of a major disaster. It features a RAID system, whose member disks are spatially distributed over a wide area. Each node has a device, which includes the controller of the RAID and the controller of the member disks controlled by other nodes. The devices in the node are connected to a computer, using fiber optic cables and communicate using fiber-channel technology. Any computer at a node can utilize multiple devices connected by optical fibers as a single 'virtual disk.' The advantage of this system structure is that devices and fiber optic cables are shared by the computers. In this report, we first described our proposed system, and a prototype was used for testing. We then discussed its performance; i.e., how to read and write throughputs are affected by data-access delay, the RAID level, and queuing.

  19. Production of potato minitubers using advanced environmental control technologies developed for growing plants in space

    NASA Astrophysics Data System (ADS)

    Britt, Robert G.

    1998-01-01

    Development of plant growth systems for use in outer space have been modified for use on earth as the backbone of a new system for rapid growth of potato minitubers. The automation of this new biotechnology provides for a fully controllable method of producing pathogen-free nuclear stock potato minitubers from tissue cultured clones of varieties of potato in a biomanufacturing facility. These minitubers are the beginning stage of seed potato production. Because the new system provides for pathogen-free minitubers by the tens-of-millions, rather than by the thousands which are currently produced in advanced seed potato systems, a new-dimension in seed potato development, breeding and multiplication has been achieved. The net advantage to earth-borne agricultural farming systems will be the elimination of several years of seed multiplication from the current system, higher quality potato production, and access to new potato varieties resistant to diseases and insects which will eliminate the need for chemical controls.

  20. Software Support during a Control Room Upgrade

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michele Joyce; Michael Spata; Thomas Oren

    2005-09-21

    In 2004, after 14 years of accelerator operations and commissioning, Jefferson Lab renovated its main control room. Changes in technology and lessons learned during those 14 years drove the control room redesign in a new direction, one that optimizes workflow and makes critical information and controls available to everyone in the control room. Fundamental changes in a variety of software applications were required to facilitate the new operating paradigm. A critical component of the new control room design is a large-format video wall that is used to make a variety of operating information available to everyone in the room. Analogmore » devices such as oscilloscopes and function generators are now displayed on the video wall through two crosspoint switchers: one for analog signals and another for video signals. A new software GUI replaces manual configuration of the oscilloscopes and function generators and helps automate setup. Monitoring screens, customized for the video wall, now make important operating information visible to everyone, not just a single operator. New alarm handler software gives any operator, on any workstation, access to all alarm handler functionality, and multiple users can now contribute to a single electronic logbook entry. To further support the shift to distributed access and control, many applications have been redesigned to run on servers instead of on individual workstations.« less

  1. Compilation of Abstracts of Theses Submitted by Candidates for Degrees

    DTIC Science & Technology

    1987-09-30

    Paral- lel, Multiple Backend Database Systems Feudo, C.V. Modern Hardware Tochnololies 88 MAJ , USA 8nd. Sof ware Techniques for Online uatabase Storage...and itsApplication in the War- gaming , Reseamth and Analysis (W.A.R.) Lab Waltens erger, G.M. On Limited War, Escalation 524 CPT,, USRF Control, and...TECHNIQIUES FOR ONLINE DATABASE ,TORAGE AND ACCESS Christopher V. Feudo Ma or, United States Army B.S., United States Military Academy# 1972

  2. Binary Sequences for Spread-Spectrum Multiple-Access Communication

    DTIC Science & Technology

    1977-08-01

    Massey, J. L., and Uhran, J. J., Jr., "Sub-baud coding," Proceedings of the Thirteenth Annual Allerton Conference on Circuit and System Theory, pp. 539...sequences in a multipl.e access environment," Proceedings of the Thirteenth Annual AIlerton Conference on Circuit and System Theory, pp. 21-27, October...34 Proceedings of the Thirteenth Annual Allertcn Conference on Circuit and System Theory, pp. 548-559, October 1975. Yao, K., *Performance bounds on

  3. Computerized procedures system

    DOEpatents

    Lipner, Melvin H.; Mundy, Roger A.; Franusich, Michael D.

    2010-10-12

    An online data driven computerized procedures system that guides an operator through a complex process facility's operating procedures. The system monitors plant data, processes the data and then, based upon this processing, presents the status of the current procedure step and/or substep to the operator. The system supports multiple users and a single procedure definition supports several interface formats that can be tailored to the individual user. Layered security controls access privileges and revisions are version controlled. The procedures run on a server that is platform independent of the user workstations that the server interfaces with and the user interface supports diverse procedural views.

  4. Evaluation of 19,460 Wheat Accessions Conserved in the Indian National Genebank to Identify New Sources of Resistance to Rust and Spot Blotch Diseases.

    PubMed

    Kumar, Sundeep; Archak, Sunil; Tyagi, R K; Kumar, Jagdish; Vk, Vikas; Jacob, Sherry R; Srinivasan, Kalyani; Radhamani, J; Parimalan, R; Sivaswamy, M; Tyagi, Sandhya; Yadav, Mamata; Kumari, Jyotisna; Deepali; Sharma, Sandeep; Bhagat, Indoo; Meeta, Madhu; Bains, N S; Chowdhury, A K; Saha, B C; Bhattacharya, P M; Kumari, Jyoti; Singh, M C; Gangwar, O P; Prasad, P; Bharadwaj, S C; Gogoi, Robin; Sharma, J B; Gm, Sandeep Kumar; Saharan, M S; Bag, Manas; Roy, Anirban; Prasad, T V; Sharma, R K; Dutta, M; Sharma, Indu; Bansal, K C

    2016-01-01

    A comprehensive germplasm evaluation study of wheat accessions conserved in the Indian National Genebank was conducted to identify sources of rust and spot blotch resistance. Genebank accessions comprising three species of wheat-Triticum aestivum, T. durum and T. dicoccum were screened sequentially at multiple disease hotspots, during the 2011-14 crop seasons, carrying only resistant accessions to the next step of evaluation. Wheat accessions which were found to be resistant in the field were then assayed for seedling resistance and profiled using molecular markers. In the primary evaluation, 19,460 accessions were screened at Wellington (Tamil Nadu), a hotspot for wheat rusts. We identified 4925 accessions to be resistant and these were further evaluated at Gurdaspur (Punjab), a hotspot for stripe rust and at Cooch Behar (West Bengal), a hotspot for spot blotch. The second round evaluation identified 498 accessions potentially resistant to multiple rusts and 868 accessions potentially resistant to spot blotch. Evaluation of rust resistant accessions for seedling resistance against seven virulent pathotypes of three rusts under artificial epiphytotic conditions identified 137 accessions potentially resistant to multiple rusts. Molecular analysis to identify different combinations of genetic loci imparting resistance to leaf rust, stem rust, stripe rust and spot blotch using linked molecular markers, identified 45 wheat accessions containing known resistance genes against all three rusts as well as a QTL for spot blotch resistance. The resistant germplasm accessions, particularly against stripe rust, identified in this study can be excellent potential candidates to be employed for breeding resistance into the background of high yielding wheat cultivars through conventional or molecular breeding approaches, and are expected to contribute toward food security at national and global levels.

  5. Evaluation of 19,460 Wheat Accessions Conserved in the Indian National Genebank to Identify New Sources of Resistance to Rust and Spot Blotch Diseases

    PubMed Central

    Jacob, Sherry R.; Srinivasan, Kalyani; Radhamani, J.; Parimalan, R.; Sivaswamy, M.; Tyagi, Sandhya; Yadav, Mamata; Kumari, Jyotisna; Deepali; Sharma, Sandeep; Bhagat, Indoo; Meeta, Madhu; Bains, N. S.; Chowdhury, A. K.; Saha, B. C.; Bhattacharya, P. M.; Kumari, Jyoti; Singh, M. C.; Gangwar, O. P.; Prasad, P.; Bharadwaj, S. C.; Gogoi, Robin; Sharma, J. B.; GM, Sandeep Kumar; Saharan, M. S.; Bag, Manas; Roy, Anirban; Prasad, T. V.; Sharma, R. K.; Dutta, M.; Sharma, Indu; Bansal, K. C.

    2016-01-01

    A comprehensive germplasm evaluation study of wheat accessions conserved in the Indian National Genebank was conducted to identify sources of rust and spot blotch resistance. Genebank accessions comprising three species of wheat–Triticum aestivum, T. durum and T. dicoccum were screened sequentially at multiple disease hotspots, during the 2011–14 crop seasons, carrying only resistant accessions to the next step of evaluation. Wheat accessions which were found to be resistant in the field were then assayed for seedling resistance and profiled using molecular markers. In the primary evaluation, 19,460 accessions were screened at Wellington (Tamil Nadu), a hotspot for wheat rusts. We identified 4925 accessions to be resistant and these were further evaluated at Gurdaspur (Punjab), a hotspot for stripe rust and at Cooch Behar (West Bengal), a hotspot for spot blotch. The second round evaluation identified 498 accessions potentially resistant to multiple rusts and 868 accessions potentially resistant to spot blotch. Evaluation of rust resistant accessions for seedling resistance against seven virulent pathotypes of three rusts under artificial epiphytotic conditions identified 137 accessions potentially resistant to multiple rusts. Molecular analysis to identify different combinations of genetic loci imparting resistance to leaf rust, stem rust, stripe rust and spot blotch using linked molecular markers, identified 45 wheat accessions containing known resistance genes against all three rusts as well as a QTL for spot blotch resistance. The resistant germplasm accessions, particularly against stripe rust, identified in this study can be excellent potential candidates to be employed for breeding resistance into the background of high yielding wheat cultivars through conventional or molecular breeding approaches, and are expected to contribute toward food security at national and global levels. PMID:27942031

  6. Reviewing the literature on access to prompt and effective malaria treatment in Kenya: implications for meeting the Abuja targets

    PubMed Central

    Chuma, Jane; Abuya, Timothy; Memusi, Dorothy; Juma, Elizabeth; Akhwale, Willis; Ntwiga, Janet; Nyandigisi, Andrew; Tetteh, Gladys; Shretta, Rima; Amin, Abdinasir

    2009-01-01

    Background Effective case management is central to reducing malaria mortality and morbidity worldwide, but only a minority of those affected by malaria, have access to prompt effective treatment. In Kenya, the Division of Malaria Control is committed to ensuring that 80 percent of childhood fevers are treated with effective anti-malarial medicines within 24 hours of fever onset, but this target is largely unmet. This review aimed to document evidence on access to effective malaria treatment in Kenya, identify factors that influence access, and make recommendations on how to improve prompt access to effective malaria treatment. Since treatment-seeking patterns for malaria are similar in many settings in sub-Saharan Africa, the findings presented in this review have important lessons for other malaria endemic countries. Methods Internet searches were conducted in PUBMED (MEDLINE) and HINARI databases using specific search terms and strategies. Grey literature was obtained by soliciting reports from individual researchers working in the treatment-seeking field, from websites of major organizations involved in malaria control and from international reports. Results The review indicated that malaria treatment-seeking occurs mostly in the informal sector; that most fevers are treated, but treatment is often ineffective. Irrational drug use was identified as a problem in most studies, but determinants of this behaviour were not documented. Availability of non-recommended medicines over-the-counter and the presence of substandard anti-malarials in the market are well documented. Demand side determinants of access include perception of illness causes, severity and timing of treatment, perceptions of treatment efficacy, simplicity of regimens and ability to pay. Supply side determinants include distance to health facilities, availability of medicines, prescribing and dispensing practices and quality of medicines. Policy level factors are around the complexity and unclear messages regarding drug policy changes. Conclusion Kenya, like many other African countries, is still far from achieving the Abuja targets. The government, with support from donors, should invest adequately in mechanisms that promote access to effective treatment. Such approaches should focus on factors influencing multiple dimensions of access and will require the cooperation of all stakeholders working in malaria control. PMID:19863788

  7. Analysis of DNA replication associated chromatin decondensation: in vivo assay for understanding chromatin remodeling mechanisms of selected proteins.

    PubMed

    Borysov, Sergiy; Bryant, Victoria L; Alexandrow, Mark G

    2015-01-01

    Of critical importance to many of the events underlying transcriptional control of gene expression are modifications to core and linker histones that regulate the accessibility of trans-acting factors to the DNA substrate within the context of chromatin. Likewise, control over the initiation of DNA replication, as well as the ability of the replication machinery to proceed during elongation through the multiple levels of chromatin condensation that are likely to be encountered, is known to involve the creation of chromatin accessibility. In the latter case, chromatin access will likely need to be a transient event so as to prevent total genomic unraveling of the chromatin that would be deleterious to cells. While there are many molecular and biochemical approaches in use to study histone changes and their relationship to transcription and chromatin accessibility, few techniques exist that allow a molecular dissection of the events underlying DNA replication control as it pertains to chromatin changes and accessibility. Here, we outline a novel experimental strategy for addressing the ability of specific proteins to induce large-scale chromatin unfolding (decondensation) in vivo upon site-specific targeting to an engineered locus. Our laboratory has used this powerful system in novel ways to directly address the ability of DNA replication proteins to create chromatin accessibility, and have incorporated modifications to the basic approach that allow for a molecular genetic analysis of the mechanisms and associated factors involved in causing chromatin decondensation by a protein of interest. Alternative approaches involving co-expression of other proteins (competitors or stimulators), concurrent drug treatments, and analysis of co-localizing histone modifications are also addressed, all of which are illustrative of the utility of this experimental system for extending basic findings to physiologically relevant mechanisms. Although used by our group to analyze mechanisms underlying DNA replication associated chromatin accessibility, this unique and powerful experimental system has the propensity to be a valuable tool for understanding chromatin remodeling mechanisms orchestrated by other cellular processes such as DNA repair, recombination, mitotic chromosome condensation, or other chromosome dynamics involving chromatin alterations and accessibility.

  8. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    PubMed

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, P<0.001 for both). Education and sex-related differences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  9. An Efficient Downlink Scheduling Strategy Using Normal Graphs for Multiuser MIMO Wireless Systems

    NASA Astrophysics Data System (ADS)

    Chen, Jung-Chieh; Wu, Cheng-Hsuan; Lee, Yao-Nan; Wen, Chao-Kai

    Inspired by the success of the low-density parity-check (LDPC) codes in the field of error-control coding, in this paper we propose transforming the downlink multiuser multiple-input multiple-output scheduling problem into an LDPC-like problem using the normal graph. Based on the normal graph framework, soft information, which indicates the probability that each user will be scheduled to transmit packets at the access point through a specified angle-frequency sub-channel, is exchanged among the local processors to iteratively optimize the multiuser transmission schedule. Computer simulations show that the proposed algorithm can efficiently schedule simultaneous multiuser transmission which then increases the overall channel utilization and reduces the average packet delay.

  10. Heterodyne detection using spectral line pairing for spectral phase encoding optical code division multiple access and dynamic dispersion compensation.

    PubMed

    Yang, Yi; Foster, Mark; Khurgin, Jacob B; Cooper, A Brinton

    2012-07-30

    A novel coherent optical code-division multiple access (OCDMA) scheme is proposed that uses spectral line pairing to generate signals suitable for heterodyne decoding. Both signal and local reference are transmitted via a single optical fiber and a simple balanced receiver performs sourceless heterodyne detection, canceling speckle noise and multiple-access interference (MAI). To validate the idea, a 16 user fully loaded phase encoded system is simulated. Effects of fiber dispersion on system performance are studied as well. Both second and third order dispersion management is achieved by using a spectral phase encoder to adjust phase shifts of spectral components at the optical network unit (ONU).

  11. Outbreak of vancomycin-resistant enterococcus colonization among pediatric oncology patients.

    PubMed

    Nolan, Sheila M; Gerber, Jeffrey S; Zaoutis, Theoklis; Prasad, Priya; Rettig, Susan; Gross, Kimberly; McGowan, Karin L; Reilly, Anne F; Coffin, Susan E

    2009-04-01

    To detect the burden of vancomycin-resistant Enterococcus (VRE) colonization among pediatric oncology patients and to determine risk factors for VRE acquisition. Retrospective case-control study. The Children's Hospital of Philadelphia. Pediatric oncology patients hospitalized from June 2006 through December 2007. Prevalence surveys revealed an increased VRE burden among pediatric oncology patients. For the case-control study, the 16 case patients were pediatric oncology patients who had 1 stool sample negative for VRE at screening before having a stool sample positive for VRE at screening; the 62 control patients had 2 consecutive screenings in which stool samples were negative for VRE. Case and control patients were matched on the duration of the interval between screens. Analyses were performed to determine the association between multiple exposures and VRE acquisition. The prevalence survey revealed that 5 (9.6%) of 52 patients had unsuspected VRE colonization at the time of hospitalization. Multivariate analysis identified a lack of empirical contact precautions (odds ratio [OR], 17.16 [95% confidence interval {CI}, 1.49-198.21]; P= .02) and the presence of a gastrointestinal device (OR, 4.03 [95% CI, 1.04-15.56]; P= .04) as significant risk factors for acquisition of VRE. Observations in the interventional radiology department revealed that staff could not access the portions of the electronic medical record in which isolation precautions were documented. Simple interventions that granted access and that trained interventional radiology staff to review the need for precautions, coupled with enhanced infection control practices, interrupted ongoing transmission and reduced the proportion of VRE screens that were positive to 15 (1.2%) of 1,270. Inadequate communication with regard to infection control precautions can increase the risk of transmission of epidemiologically important organisms, particularly when patients receive care at multiple clinic locations. Adherence to infection control practices across the spectrum of care may limit the spread of resistant organisms.

  12. Outbreak of Vancomycin-Resistant Enterococcus Colonization Among Pediatric Oncology Patients

    PubMed Central

    Nolan, Sheila M.; Gerber, Jeffrey S.; Zaoutis, Theoklis; Prasad, Priya; Rettig, Susan; Gross, Kimberly; McGowan, Karin L.; Reilly, Anne F.; Coffin, Susan E.

    2010-01-01

    OBJECTIVE To detect the burden of vancomycin-resistant Enterococcus (VRE) colonization among pediatric oncology patients and to determine risk factors for VRE acquisition. DESIGN Retrospective case-control study. SETTING The Children’s Hospital of Philadelphia. PATIENTS Pediatric oncology patients hospitalized from June 2006 through December 2007. METHODS Prevalence surveys revealed an increased VRE burden among pediatric oncology patients. For the case-control study, the 16 case patients were pediatric oncology patients who had 1 stool sample negative for VRE at screening before having a stool sample positive for VRE at screening; the 62 control patients had 2 consecutive screenings in which stool samples were negative for VRE. Case and control patients were matched on the duration of the interval between screens. Analyses were performed to determine the association between multiple exposures and VRE acquisition. RESULTS The prevalence survey revealed that 5 (9.6%) of 52 patients had unsuspected VRE colonization at the time of hospitalization. Multivariate analysis identified a lack of empirical contact precautions (odds ratio [OR], 17.16 [95% confidence interval {CI}, 1.49–198.21]; P = .02) and the presence of a gastrointestinal device (OR, 4.03 [95% CI, 1.04–15.56]; P = .04) as significant risk factors for acquisition of VRE. Observations in the interventional radiology department revealed that staff could not access the portions of the electronic medical record in which isolation precautions were documented. Simple interventions that granted access and that trained interventional radiology staff to review the need for precautions, coupled with enhanced infection control practices, interrupted ongoing transmission and reduced the proportion of VRE screens that were positive to 15 (1.2%) of 1,270. CONCLUSIONS Inadequate communication with regard to infection control precautions can increase the risk of transmission of epidemiologically important organisms, particularly when patients receive care at multiple clinic locations. Adherence to infection control practices across the spectrum of care may limit the spread of resistant organisms. PMID:19239375

  13. Design and FPGA implementation for MAC layer of Ethernet PON

    NASA Astrophysics Data System (ADS)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  14. Adjacency Matrix-Based Transmit Power Allocation Strategies in Wireless Sensor Networks

    PubMed Central

    Consolini, Luca; Medagliani, Paolo; Ferrari, Gianluigi

    2009-01-01

    In this paper, we present an innovative transmit power control scheme, based on optimization theory, for wireless sensor networks (WSNs) which use carrier sense multiple access (CSMA) with collision avoidance (CA) as medium access control (MAC) protocol. In particular, we focus on schemes where several remote nodes send data directly to a common access point (AP). Under the assumption of finite overall network transmit power and low traffic load, we derive the optimal transmit power allocation strategy that minimizes the packet error rate (PER) at the AP. This approach is based on modeling the CSMA/CA MAC protocol through a finite state machine and takes into account the network adjacency matrix, depending on the transmit power distribution and determining the network connectivity. It will be then shown that the transmit power allocation problem reduces to a convex constrained minimization problem. Our results show that, under the assumption of low traffic load, the power allocation strategy, which guarantees minimal delay, requires the maximization of network connectivity, which can be equivalently interpreted as the maximization of the number of non-zero entries of the adjacency matrix. The obtained theoretical results are confirmed by simulations for unslotted Zigbee WSNs. PMID:22346705

  15. Financial management systems under decentralization and their effect on malaria control in Uganda.

    PubMed

    Kivumbi, George W; Nangendo, Florence; Ndyabahika, Boniface Rutagira

    2004-01-01

    A descriptive case study with multiple sites and a single level of analysis was carried out in four purposefully selected administrative districts of Uganda to investigate the effect of financial management systems under decentralization on malaria control. Data were primarily collected from 36 interviews with district managers, staff at health units and local leaders. A review of records and documents related to decentralization at the central and district level was also used to generate data for the study. We found that a long, tedious, and bureaucratic process combined with lack of knowledge in working with new financial systems by several actors characterized financial flow under decentralization. This affected the timely use of financial resources for malaria control in that there were funds in the system that could not be accessed for use. We were also told that sometimes these funds were returned to the central government because of non-use due to difficulties in accessing them and/or stringent conditions not to divert them to other uses. Our data showed that a cocktail of bureaucratic control systems, corruption and incompetence make the financial management system under decentralization counter-productive for malaria control. The main conclusion is that good governance through appropriate and efficient financial management systems is very important for effective malaria control under decentralization.

  16. Comparison of CDMA and FDMA for the MobileStar(sm) system

    NASA Technical Reports Server (NTRS)

    Jacobs, I. M.; Gilhousen, K. S.; Weaver, L. A.; Renshaw, K.; Murphy, T.

    1988-01-01

    Spread-spectrum code division multiple access (CDMA) and single channel per carrier frequency division multiple access (FDMA) systems are compared for spectrum efficiency. CDMA is shown to have greater maximum throughput than FDMA for the MobileStar(sm) system which uses digital voice activated carriers and directive circularly polarized satellite antennas.

  17. Wireless Computing Architecture III

    DTIC Science & Technology

    2013-09-01

    MIMO Multiple-Input and Multiple-Output MIMO /CON MIMO with concurrent hannel access and estimation MU- MIMO Multiuser MIMO OFDM Orthogonal...compressive sensing \\; a design for concurrent channel estimation in scalable multiuser MIMO networking; and novel networking protocols based on machine...Network, Antenna Arrays, UAV networking, Angle of Arrival, Localization MIMO , Access Point, Channel State Information, Compressive Sensing 16

  18. Virtual collaborative environments: programming and controlling robotic devices remotely

    NASA Astrophysics Data System (ADS)

    Davies, Brady R.; McDonald, Michael J., Jr.; Harrigan, Raymond W.

    1995-12-01

    This paper describes a technology for remote sharing of intelligent electro-mechanical devices. An architecture and actual system have been developed and tested, based on the proposed National Information Infrastructure (NII) or Information Highway, to facilitate programming and control of intelligent programmable machines (like robots, machine tools, etc.). Using appropriate geometric models, integrated sensors, video systems, and computing hardware; computer controlled resources owned and operated by different (in a geographic sense as well as legal sense) entities can be individually or simultaneously programmed and controlled from one or more remote locations. Remote programming and control of intelligent machines will create significant opportunities for sharing of expensive capital equipment. Using the technology described in this paper, university researchers, manufacturing entities, automation consultants, design entities, and others can directly access robotic and machining facilities located across the country. Disparate electro-mechanical resources will be shared in a manner similar to the way supercomputers are accessed by multiple users. Using this technology, it will be possible for researchers developing new robot control algorithms to validate models and algorithms right from their university labs without ever owning a robot. Manufacturers will be able to model, simulate, and measure the performance of prospective robots before selecting robot hardware optimally suited for their intended application. Designers will be able to access CNC machining centers across the country to fabricate prototypic parts during product design validation. An existing prototype architecture and system has been developed and proven. Programming and control of a large gantry robot located at Sandia National Laboratories in Albuquerque, New Mexico, was demonstrated from such remote locations as Washington D.C., Washington State, and Southern California.

  19. Multiple Intimate Partner Violence Experiences: Knowledge, Access, Utilization and Barriers to Utilization of Resources by Women of the African Diaspora.

    PubMed

    Sabri, Bushra; Huerta, Julia; Alexander, Kamila A; St Vil, Noelle M; Campbell, Jacquelyn C; Callwood, Gloria B

    2015-11-01

    This study examined knowledge, access, utilization, and barriers to use of resources among Black women exposed to multiple types of intimate partner violence in Baltimore, Maryland and the U.S. Virgin Islands (USVI). We analyzed quantitative survey data collected by 163 women recruited from primary care, prenatal or family planning clinics in Baltimore and the USVI. In addition we analyzed qualitative data from in-depth interviews with 11 women. Quantitative data were analyzed using descriptive statistics and qualitative data were analyzed using thematic analysis. A substantial proportion of Black women with multiple types of violence experiences lacked knowledge of, did not have access to, and did not use resources. Barriers to resource use were identified at the individual, relationship, and community levels. There is need for programs to develop awareness, promote access and utilization of resources, and eliminate barriers to resource use among abused Black women.

  20. On-board processing satellite network architecture and control study

    NASA Technical Reports Server (NTRS)

    Campanella, S. Joseph; Pontano, Benjamin A.; Chalmers, Harvey

    1987-01-01

    The market for telecommunications services needs to be segmented into user classes having similar transmission requirements and hence similar network architectures. Use of the following transmission architecture was considered: satellite switched TDMA; TDMA up, TDM down; scanning (hopping) beam TDMA; FDMA up, TDM down; satellite switched MF/TDMA; and switching Hub earth stations with double hop transmission. A candidate network architecture will be selected that: comprises multiple access subnetworks optimized for each user; interconnects the subnetworks by means of a baseband processor; and optimizes the marriage of interconnection and access techniques. An overall network control architecture will be provided that will serve the needs of the baseband and satellite switched RF interconnected subnetworks. The results of the studies shall be used to identify elements of network architecture and control that require the greatest degree of technology development to realize an operational system. This will be specified in terms of: requirements of the enabling technology; difference from the current available technology; and estimate of the development requirements needed to achieve an operational system. The results obtained for each of these tasks are presented.

  1. Multiple-choice tests stabilize access to marginal knowledge.

    PubMed

    Cantor, Allison D; Eslick, Andrea N; Marsh, Elizabeth J; Bjork, Robert A; Bjork, Elizabeth Ligon

    2015-02-01

    Marginal knowledge refers to knowledge that is stored in memory, but is not accessible at a given moment. For example, one might struggle to remember who wrote The Call of the Wild, even if that knowledge is stored in memory. Knowing how best to stabilize access to marginal knowledge is important, given that new learning often requires accessing and building on prior knowledge. While even a single opportunity to restudy marginal knowledge boosts its later accessibility (Berger, Hall, & Bahrick, 1999), in many situations explicit relearning opportunities are not available. Our question is whether multiple-choice tests (which by definition expose the learner to the correct answers) can also serve this function and, if so, how testing compares to restudying given that tests can be particularly powerful learning devices (Roediger & Karpicke, 2006). In four experiments, we found that multiple-choice testing had the power to stabilize access to marginal knowledge, and to do so for at least up to a week. Importantly, such tests did not need to be paired with feedback, although testing was no more powerful than studying. Overall, the results support the idea that one's knowledge base is unstable, with individual pieces of information coming in and out of reach. The present findings have implications for a key educational challenge: ensuring that students have continuing access to information they have learned.

  2. Performance Analysis of a New Coded TH-CDMA Scheme in Dispersive Infrared Channel with Additive Gaussian Noise

    NASA Astrophysics Data System (ADS)

    Hamdi, Mazda; Kenari, Masoumeh Nasiri

    2013-06-01

    We consider a time-hopping based multiple access scheme introduced in [1] for communication over dispersive infrared links, and evaluate its performance for correlator and matched filter receivers. In the investigated time-hopping code division multiple access (TH-CDMA) method, the transmitter benefits a low rate convolutional encoder. In this method, the bit interval is divided into Nc chips and the output of the encoder along with a PN sequence assigned to the user determines the position of the chip in which the optical pulse is transmitted. We evaluate the multiple access performance of the system for correlation receiver considering background noise which is modeled as White Gaussian noise due to its large intensity. For the correlation receiver, the results show that for a fixed processing gain, at high transmit power, where the multiple access interference has the dominant effect, the performance improves by the coding gain. But at low transmit power, in which the increase of coding gain leads to the decrease of the chip time, and consequently, to more corruption due to the channel dispersion, there exists an optimum value for the coding gain. However, for the matched filter, the performance always improves by the coding gain. The results show that the matched filter receiver outperforms the correlation receiver in the considered cases. Our results show that, for the same bandwidth and bit rate, the proposed system excels other multiple access techniques, like conventional CDMA and time hopping scheme.

  3. Full-band TDM-OPDMA for OBI-reduced simultaneous multiple access in a single-wavelength optical access network.

    PubMed

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-14

    Simultaneous multiple access (MA) within a single wavelength can increase the data rate and split ratio in a passive optical network while optical beat interference (OBI) becomes serious in the uplink. Previous techniques to reduce OBI were limited by their complexity and lack of extendibility; as well, bandwidth allocation among MA signals is needed for single photo diode (PD) detection. We proposed and experimentally demonstrated full-band optical pulse division multiplexing-based MA (OPDMA) in an optical access network, which can effectively reduce OBI with extendibility and fully utilize frequency resources of optical modulator without bandwidth allocation in a single-wavelength MA.

  4. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    NASA Technical Reports Server (NTRS)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  5. System Administrator for LCS Development Sets

    NASA Technical Reports Server (NTRS)

    Garcia, Aaron

    2013-01-01

    The Spaceport Command and Control System Project is creating a Checkout and Control System that will eventually launch the next generation of vehicles from Kennedy Space Center. KSC has a large set of Development and Operational equipment already deployed in several facilities, including the Launch Control Center, which requires support. The position of System Administrator will complete tasks across multiple platforms (Linux/Windows), many of them virtual. The Hardware Branch of the Control and Data Systems Division at the Kennedy Space Center uses system administrators for a variety of tasks. The position of system administrator comes with many responsibilities which include maintaining computer systems, repair or set up hardware, install software, create backups and recover drive images are a sample of jobs which one must complete. Other duties may include working with clients in person or over the phone and resolving their computer system needs. Training is a major part of learning how an organization functions and operates. Taking that into consideration, NASA is no exception. Training on how to better protect the NASA computer infrastructure will be a topic to learn, followed by NASA work polices. Attending meetings and discussing progress will be expected. A system administrator will have an account with root access. Root access gives a user full access to a computer system and or network. System admins can remove critical system files and recover files using a tape backup. Problem solving will be an important skill to develop in order to complete the many tasks.

  6. Methods for Determining Aircraft Surface State at Lesser-Equipped Airports

    NASA Technical Reports Server (NTRS)

    Roach, Keenan; Null, Jody

    2016-01-01

    Tactical departure scheduling within a terminal airspace must accommodate a wide spectrum of surveillance and communication capabilities at multiple airports. The success of such a scheduler is highly dependent upon the knowledge of a departure's state while it is still on the surface. Airports within a common Terminal RAdar CONtrol (TRACON) airspace possess varying levels of surface surveillance infrastructure which directly impacts uncertainties in wheels-off times. Large airports have access to surface surveillance data, which is shared with the TRACON, while lesser-equipped airports still rely solely on controllers in Air Traffic Control Towers (Towers). Coordination between TRACON and Towers can be greatly enhanced when the TRACON controller has access to the surface surveillance and the associated decision-support tools at well-equipped airports. Similar coordination at lesser-equipped airports is still based on verbal communications. This paper investigates possible methods to reduce the uncertainty in wheels-off time predictions at the lesser-equipped airports through the novel use of Over-the-Air (OTA) data transmissions. We also discuss the methods and equipment used to collect sample data at lesser-equipped airports within a large US TRACON, as well as the data evaluation to determine if meaningful information can be extracted from it.

  7. Virtual memory support for distributed computing environments using a shared data object model

    NASA Astrophysics Data System (ADS)

    Huang, F.; Bacon, J.; Mapp, G.

    1995-12-01

    Conventional storage management systems provide one interface for accessing memory segments and another for accessing secondary storage objects. This hinders application programming and affects overall system performance due to mandatory data copying and user/kernel boundary crossings, which in the microkernel case may involve context switches. Memory-mapping techniques may be used to provide programmers with a unified view of the storage system. This paper extends such techniques to support a shared data object model for distributed computing environments in which good support for coherence and synchronization is essential. The approach is based on a microkernel, typed memory objects, and integrated coherence control. A microkernel architecture is used to support multiple coherence protocols and the addition of new protocols. Memory objects are typed and applications can choose the most suitable protocols for different types of object to avoid protocol mismatch. Low-level coherence control is integrated with high-level concurrency control so that the number of messages required to maintain memory coherence is reduced and system-wide synchronization is realized without severely impacting the system performance. These features together contribute a novel approach to the support for flexible coherence under application control.

  8. Mobile and Accessible Learning for MOOCs

    ERIC Educational Resources Information Center

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  9. Packet Radio Temporary Note Index.

    DTIC Science & Technology

    1984-05-07

    Dynamic Control in Carrier Sense Multiple Access 180 Cross-Radio Debugger Beeler 06/76 BBN 179 New Capabilities of the PR Gitman 05/76 NAC Simulation...Program 178 An Approximate Analytical Model for Gitman 05/76 NAC Initialization of Single Hop PRNETs 177 SPP Definition Beeler 04/76 BBN 176 PR Protocol...Sussman 03/79 BBN Labeling Process (Revision 7) 173 Interfacing Terminals to the PRN Fralick 04/76 BBN 172 Connectivity Issues in Mobile PR Gitman 03/76

  10. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1989-01-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  11. Mass prophylaxis dispensing concerns: traffic and public access to PODs.

    PubMed

    Baccam, Prasith; Willauer, David; Krometis, Justin; Ma, Yongchang; Sen, Atri; Boechler, Michael

    2011-06-01

    The ability to quickly dispense postexposure prophylaxis (PEP) using multiple points of dispensing (PODs) following a bioterrorism event could potentially save a large proportion of those who were exposed, while failure in PEP dispensing could have dire public health consequences. A Monte Carlo simulation was developed to explore the traffic flow and parking around PODs under different arrival rates and how these factors might affect the utilization rate of POD workers. The results demonstrate that the public can reasonably access the PODs under ideal conditions assuming a stationary (uniform) arrival rate. For the 5 nonstationary arrival rates tested, however, the available parking spaces quickly become filled, causing long traffic queues and resulting in total processing times that range from 1 hour to over 6 hours. Basic planning considerations should include the use of physical barriers, signage, and traffic control officers to help direct vehicular and pedestrian access to the PODs. Furthermore, the parking and traffic surrounding PODs creates long queues of people waiting to access the PODs. Thus, POD staff are fully used approximately 90% of the time, which can lead to worker fatigue and burn out.

  12. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  13. Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing

    NASA Astrophysics Data System (ADS)

    Matsumoto, Ryutaroh

    The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.

  14. Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code

    NASA Astrophysics Data System (ADS)

    Sikder, Somali; Ghosh, Shila

    2018-02-01

    This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.

  15. Comparative transcriptome analysis provides new insights into erect and prostrate growth in bermudagrass (Cynodon dactylon L.).

    PubMed

    Zhang, Bing; Xiao, Xiaolin; Zong, Junqin; Chen, Jingbo; Li, Jianjian; Guo, Hailin; Liu, Jianxiu

    2017-12-01

    Bermudagrass (Cynodon dactylon L.) is a prominent warm-season turf and forage grass species with multiple applications. In most C. dactylon cultivars and accessions, erect-growing stems (shoot) and prostrate-growing stems (stolon) often coexist. These two types of stems are both formed through tillering but grow in two directions with different tiller angles. Elucidating the mechanism of tiller angle regulation in bermudagrass could provide important clues to breed cultivars with different plant architectural features for diverse usage. In this study, we compared the stem internode transcriptome of two bermudagrass wild accessions with extremely different tiller angles and stem growth directions. A total of 2088 and 12,141 unigenes were preferentially expressed in prostrate-growing wild accession C792 and erect-growing wild accession C793, respectively. Kyoto Encyclopedia of Genes and Genomes (KEGG) Orthology-based Annotation System (KOBAS) analyses further indicated that light- and gravity-responsive genes were enriched in accession C792, whereas lignin synthesis-related genes were enriched in accession C793, which well explains the difference in lignification of vascular bundles and mechanical tissues in the two accessions. These results not only expand our understanding of the genetic control of tiller angle and stem growth direction in bermudagrass but also provide insight for future molecular breeding of C. dactylon and other turfgrass species with different plant architectures. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  16. A novel PON-based mobile distributed cluster of antennas approach to provide impartial and broadband services to end users

    NASA Astrophysics Data System (ADS)

    Sana, Ajaz; Saddawi, Samir; Moghaddassi, Jalil; Hussain, Shahab; Zaidi, Syed R.

    2010-01-01

    In this research paper we propose a novel Passive Optical Network (PON) based Mobile Worldwide Interoperability for Microwave Access (WiMAX) access network architecture to provide high capacity and performance multimedia services to mobile WiMAX users. Passive Optical Networks (PON) networks do not require powered equipment; hence they cost lower and need less network management. WiMAX technology emerges as a viable candidate for the last mile solution. In the conventional WiMAX access networks, the base stations and Multiple Input Multiple Output (MIMO) antennas are connected by point to point lines. Ideally in theory, the Maximum WiMAX bandwidth is assumed to be 70 Mbit/s over 31 miles. In reality, WiMAX can only provide one or the other as when operating over maximum range, bit error rate increases and therefore it is required to use lower bit rate. Lowering the range allows a device to operate at higher bit rates. Our focus in this research paper is to increase both range and bit rate by utilizing distributed cluster of MIMO antennas connected to WiMAX base stations with PON based topologies. A novel quality of service (QoS) algorithm is also proposed to provide admission control and scheduling to serve classified traffic. The proposed architecture presents flexible and scalable system design with different performance requirements and complexity.

  17. Economist intelligence unit democracy index in relation to health services accessibility: a regression analysis.

    PubMed

    Walker, Mary Ellen; Anonson, June; Szafron, Michael

    2015-01-01

    The relationship between political environment and health services accessibility (HSA) has not been the focus of any specific studies. The purpose of this study was to address this gap in the literature by examining the relationship between political environment and HSA. This relationship that HSA indicators (physicians, nurses and hospital beds per 10 000 people) has with political environment was analyzed with multiple least-squares regression using the components of democracy (electoral processes and pluralism, functioning of government, political participation, political culture, and civil liberties). The components of democracy were represented by the 2011 Economist Intelligence Unit Democracy Index (EIUDI) sub-scores. The EIUDI sub-scores and the HSA indicators were evaluated for significant relationships with multiple least-squares regression. While controlling for a country's geographic location and level of democracy, we found that two components of a nation's political environment: functioning of government and political participation, and their interaction had significant relationships with the three HSA indicators. These study findings are of significance to health professionals because they examine the political contexts in which citizens access health services, they come from research that is the first of its kind, and they help explain the effect political environment has on health. © The Author 2014. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  18. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility.

    PubMed

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I; Hantschel, Oliver

    2014-11-17

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  19. The SH2 domain of Abl kinases regulates kinase autophosphorylation by controlling activation loop accessibility

    NASA Astrophysics Data System (ADS)

    Lamontanara, Allan Joaquim; Georgeon, Sandrine; Tria, Giancarlo; Svergun, Dmitri I.; Hantschel, Oliver

    2014-11-01

    The activity of protein kinases is regulated by multiple molecular mechanisms, and their disruption is a common driver of oncogenesis. A central and almost universal control element of protein kinase activity is the activation loop that utilizes both conformation and phosphorylation status to determine substrate access. In this study, we use recombinant Abl tyrosine kinases and conformation-specific kinase inhibitors to quantitatively analyse structural changes that occur after Abl activation. Allosteric SH2-kinase domain interactions were previously shown to be essential for the leukemogenesis caused by the Bcr-Abl oncoprotein. We find that these allosteric interactions switch the Abl activation loop from a closed to a fully open conformation. This enables the trans-autophosphorylation of the activation loop and requires prior phosphorylation of the SH2-kinase linker. Disruption of the SH2-kinase interaction abolishes activation loop phosphorylation. Our analysis provides a molecular mechanism for the SH2 domain-dependent activation of Abl that may also regulate other tyrosine kinases.

  20. An access technology delivery protocol for children with severe and multiple disabilities: a case demonstration.

    PubMed

    Mumford, Leslie; Lam, Rachel; Wright, Virginia; Chau, Tom

    2014-08-01

    This study applied response efficiency theory to create the Access Technology Delivery Protocol (ATDP), a child and family-centred collaborative approach to the implementation of access technologies. We conducted a descriptive, mixed methods case study to demonstrate the ATDP method with a 12-year-old boy with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with a custom smile-based access technology. At the 16 week mark, the new access technology offered better response quality; teacher satisfaction was high; average technology usage was 3-4 times per week for up to 1 h each time; switch sensitivity and specificity reached 78% and 64%, respectively, and participation scores increased by 38%. This case supports further development and testing of the ATDP with additional children with multiple or severe disabilities.

  1. A subjective scheduler for subjective dedicated networks

    NASA Astrophysics Data System (ADS)

    Suherman; Fakhrizal, Said Reza; Al-Akaidi, Marwan

    2017-09-01

    Multiple access technique is one of important techniques within medium access layer in TCP/IP protocol stack. Each network technology implements the selected access method. Priority can be implemented in those methods to differentiate services. Some internet networks are dedicated for specific purpose. Education browsing or tutorial video accesses are preferred in a library hotspot, while entertainment and sport contents could be subjects of limitation. Current solution may use IP address filter or access list. This paper proposes subjective properties of users or applications are used for priority determination in multiple access techniques. The NS-2 simulator is employed to evaluate the method. A video surveillance network using WiMAX is chosen as the object. Subjective priority is implemented on WiMAX scheduler based on traffic properties. Three different traffic sources from monitoring video: palace, park, and market are evaluated. The proposed subjective scheduler prioritizes palace monitoring video that results better quality, xx dB than the later monitoring spots.

  2. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  3. Link Scheduling Algorithm with Interference Prediction for Multiple Mobile WBANs

    PubMed Central

    Le, Thien T. T.

    2017-01-01

    As wireless body area networks (WBANs) become a key element in electronic healthcare (e-healthcare) systems, the coexistence of multiple mobile WBANs is becoming an issue. The network performance is negatively affected by the unpredictable movement of the human body. In such an environment, inter-WBAN interference can be caused by the overlapping transmission range of nearby WBANs. We propose a link scheduling algorithm with interference prediction (LSIP) for multiple mobile WBANs, which allows multiple mobile WBANs to transmit at the same time without causing inter-WBAN interference. In the LSIP, a superframe includes the contention access phase using carrier sense multiple access with collision avoidance (CSMA/CA) and the scheduled phase using time division multiple access (TDMA) for non-interfering nodes and interfering nodes, respectively. For interference prediction, we define a parameter called interference duration as the duration during which disparate WBANs interfere with each other. The Bayesian model is used to estimate and classify the interference using a signal to interference plus noise ratio (SINR) and the number of neighboring WBANs. The simulation results show that the proposed LSIP algorithm improves the packet delivery ratio and throughput significantly with acceptable delay. PMID:28956827

  4. Parent Perception of Two Eye-Gaze Control Technology Systems in Young Children with Cerebral Palsy: Pilot Study.

    PubMed

    Karlsson, Petra; Wallen, Margaret

    2017-01-01

    Eye-gaze control technology enables people with significant physical disability to access computers for communication, play, learning and environmental control. This pilot study used a multiple case study design with repeated baseline assessment and parents' evaluations to compare two eye-gaze control technology systems to identify any differences in factors such as ease of use and impact of the systems for their young children. Five children, aged 3 to 5 years, with dyskinetic cerebral palsy, and their families participated. Overall, families were satisfied with both the Tobii PCEye Go and myGaze® eye tracker, found them easy to position and use, and children learned to operate them quickly. This technology provides young children with important opportunities for learning, play, leisure, and developing communication.

  5. TEAMS (Tele-Exercise and Multiple Sclerosis), a Tailored Telerehabilitation mHealth App: Participant-Centered Development and Usability Study

    PubMed Central

    Rimmer, James H; Johnson, George; Wilroy, Jereme; Young, Hui-Ju; Mehta, Tapan; Lai, Byron

    2018-01-01

    Background People with multiple sclerosis face varying levels of disability and symptoms, thus requiring highly trained therapists and/or exercise trainers to design personalized exercise programs. However, for people living in geographically isolated communities, access to such trained professionals can be challenging due to a number of barriers associated with cost, access to transportation, and travel distance. Generic mobile health exercise apps often fall short of what people with multiple sclerosis need to become physically active (ie, exercise content that has been adapted to accommodate a wide range of functional limitations). Objective This usability study describes the development process of the TEAMS (Tele-Exercise and Multiple Sclerosis) app, which is being used by people with multiple sclerosis in a large randomized controlled trial to engage in home-based telerehabilitation. Methods Twenty-one participants with disabilities (10 people with multiple sclerosis) were involved in the double iterative design, which included the simultaneous development of the app features and exercise content (exercise videos and articles). Framed within a user-centered design approach, the development process included 2 stages: ground-level creation (focus group followed by early stage evaluations and developments), and proof of concept through 2 usability tests. Usability (effectiveness, usefulness, and satisfaction) was evaluated using a mixed-methods approach. Results During testing of the app’s effectiveness, the second usability test resulted in an average of 1 problem per participant, a decrease of 53% compared to the initial usability test. Five themes were constructed from the qualitative data that related to app usefulness and satisfaction, namely: high perceived confidence for app usability, positive perceptions of exercise videos, viable exercise option at home, orientation and familiarity required for successful participation, and app issues. Participants acknowledged that the final app was ready to be delivered to the public after minor revisions. After including these revisions, the project team released the final app that is being used in the randomized controlled trial. Conclusions A multi-level user-centered development process resulted in the development of an inclusive exercise program for people with multiple sclerosis operated through an easy-to-use app. The promotion of exercise through self-regulated mHealth programs requires a stakeholder-driven approach to app development. This ensures that app and content match the preferences and functional abilities of the end user (ie, people with varying levels of multiple sclerosis). PMID:29798832

  6. TEAMS (Tele-Exercise and Multiple Sclerosis), a Tailored Telerehabilitation mHealth App: Participant-Centered Development and Usability Study.

    PubMed

    Thirumalai, Mohanraj; Rimmer, James H; Johnson, George; Wilroy, Jereme; Young, Hui-Ju; Mehta, Tapan; Lai, Byron

    2018-05-24

    People with multiple sclerosis face varying levels of disability and symptoms, thus requiring highly trained therapists and/or exercise trainers to design personalized exercise programs. However, for people living in geographically isolated communities, access to such trained professionals can be challenging due to a number of barriers associated with cost, access to transportation, and travel distance. Generic mobile health exercise apps often fall short of what people with multiple sclerosis need to become physically active (ie, exercise content that has been adapted to accommodate a wide range of functional limitations). This usability study describes the development process of the TEAMS (Tele-Exercise and Multiple Sclerosis) app, which is being used by people with multiple sclerosis in a large randomized controlled trial to engage in home-based telerehabilitation. Twenty-one participants with disabilities (10 people with multiple sclerosis) were involved in the double iterative design, which included the simultaneous development of the app features and exercise content (exercise videos and articles). Framed within a user-centered design approach, the development process included 2 stages: ground-level creation (focus group followed by early stage evaluations and developments), and proof of concept through 2 usability tests. Usability (effectiveness, usefulness, and satisfaction) was evaluated using a mixed-methods approach. During testing of the app's effectiveness, the second usability test resulted in an average of 1 problem per participant, a decrease of 53% compared to the initial usability test. Five themes were constructed from the qualitative data that related to app usefulness and satisfaction, namely: high perceived confidence for app usability, positive perceptions of exercise videos, viable exercise option at home, orientation and familiarity required for successful participation, and app issues. Participants acknowledged that the final app was ready to be delivered to the public after minor revisions. After including these revisions, the project team released the final app that is being used in the randomized controlled trial. A multi-level user-centered development process resulted in the development of an inclusive exercise program for people with multiple sclerosis operated through an easy-to-use app. The promotion of exercise through self-regulated mHealth programs requires a stakeholder-driven approach to app development. This ensures that app and content match the preferences and functional abilities of the end user (ie, people with varying levels of multiple sclerosis). ©Mohanraj Thirumalai, James H Rimmer, George Johnson, Jereme Wilroy, Hui-Ju Young, Tapan Mehta, Byron Lai. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 24.05.2018.

  7. Barriers to the Accessibility and Continuity of Health-Care Services in People with Multiple Sclerosis

    PubMed Central

    Bishop, Malachy; Pionke, J.J.; Strauser, David; Santens, Ryan L.

    2017-01-01

    Background: Individuals with multiple sclerosis (MS) face a range of barriers to accessing and using health-care services. The aim of this review was to identify specific barriers to accessing and using health-care services based on a continuum of the health-care delivery system. Methods: Literature searches were conducted in the PubMed, PsycINFO, CINAHL, and Web of Science databases. The following terms were searched as subject headings, key words, or abstracts: health care, access, barriers, physical disability, and multiple sclerosis. The literature search produced 361 potentially relevant citations. After screening titles, abstracts, and citations, eight citations were selected for full-text review. Results: Health-care barriers were divided into three continuous phases of receiving health care. In the before-visit phase, the most commonly identified barrier was transportation. In the during-visit phase, communication quality was the major concern. In the after-visit phase, discontinued referral was the major barrier encountered. Conclusions: There are multiple interrelated barriers to accessing and using health-care services along the health-care delivery continuum for people with MS and its associated physical disabilities, ranging from complex and long-recognized barriers that will likely require extended advocacy to create policy changes to issues that can and should be addressed through relatively minor changes in health-care delivery practices, improved care coordination, and increased provider awareness, education, and responsiveness to patients' needs. PMID:29270089

  8. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  9. System and Method for Detecting Unauthorized Device Access by Comparing Multiple Independent Spatial-Time Data Sets from Other Devices

    NASA Technical Reports Server (NTRS)

    Westmeyer, Paul A. (Inventor); Wertenberg, Russell F. (Inventor); Krage, Frederick J. (Inventor); Riegel, Jack F. (Inventor)

    2017-01-01

    An authentication procedure utilizes multiple independent sources of data to determine whether usage of a device, such as a desktop computer, is authorized. When a comparison indicates an anomaly from the base-line usage data, the system, provides a notice that access of the first device is not authorized.

  10. Persons with Multiple Disabilities Use Forehead and Smile Responses to Access or Choose among Technology-Aided Stimulation Events

    ERIC Educational Resources Information Center

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Alberti, Gloria; Bellini, Domencio; Oliva, Doretta; Boccasini, Adele; La Martire, Maria L.; Signorino, Mario

    2013-01-01

    A variety of technology-aided programs have been developed to help persons with congenital or acquired multiple disabilities access preferred stimuli or choose among stimulus options. The application of those programs may pose problems when the participants have very limited behavior repertoires and are unable to use conventional responses and…

  11. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    NASA Astrophysics Data System (ADS)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  12. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    NASA Astrophysics Data System (ADS)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  13. A Framework for Managing Inter-Site Storage Area Networks using Grid Technologies

    NASA Technical Reports Server (NTRS)

    Kobler, Ben; McCall, Fritz; Smorul, Mike

    2006-01-01

    The NASA Goddard Space Flight Center and the University of Maryland Institute for Advanced Computer Studies are studying mechanisms for installing and managing Storage Area Networks (SANs) that span multiple independent collaborating institutions using Storage Area Network Routers (SAN Routers). We present a framework for managing inter-site distributed SANs that uses Grid Technologies to balance the competing needs to control local resources, share information, delegate administrative access, and manage the complex trust relationships between the participating sites.

  14. Operating room integration and telehealth.

    PubMed

    Bucholz, Richard D; Laycock, Keith A; McDurmont, Leslie

    2011-01-01

    The increasing use of advanced automated and computer-controlled systems and devices in surgical procedures has resulted in problems arising from the crowding of the operating room with equipment and the incompatible control and communication standards associated with each system. This lack of compatibility between systems and centralized control means that the surgeon is frequently required to interact with multiple computer interfaces in order to obtain updates and exert control over the various devices at his disposal. To reduce this complexity and provide the surgeon with more complete and precise control of the operating room systems, a unified interface and communication network has been developed. In addition to improving efficiency, this network also allows the surgeon to grant remote access to consultants and observers at other institutions, enabling experts to participate in the procedure without having to travel to the site.

  15. iSERVO: Implementing the International Solid Earth Research Virtual Observatory by Integrating Computational Grid and Geographical Information Web Services

    NASA Astrophysics Data System (ADS)

    Aktas, Mehmet; Aydin, Galip; Donnellan, Andrea; Fox, Geoffrey; Granat, Robert; Grant, Lisa; Lyzenga, Greg; McLeod, Dennis; Pallickara, Shrideep; Parker, Jay; Pierce, Marlon; Rundle, John; Sayar, Ahmet; Tullis, Terry

    2006-12-01

    We describe the goals and initial implementation of the International Solid Earth Virtual Observatory (iSERVO). This system is built using a Web Services approach to Grid computing infrastructure and is accessed via a component-based Web portal user interface. We describe our implementations of services used by this system, including Geographical Information System (GIS)-based data grid services for accessing remote data repositories and job management services for controlling multiple execution steps. iSERVO is an example of a larger trend to build globally scalable scientific computing infrastructures using the Service Oriented Architecture approach. Adoption of this approach raises a number of research challenges in millisecond-latency message systems suitable for internet-enabled scientific applications. We review our research in these areas.

  16. A Review on Spectral Amplitude Coding Optical Code Division Multiple Access

    NASA Astrophysics Data System (ADS)

    Kaur, Navpreet; Goyal, Rakesh; Rani, Monika

    2017-06-01

    This manuscript deals with analysis of Spectral Amplitude Coding Optical Code Division Multiple Access (SACOCDMA) system. The major noise source in optical CDMA is co-channel interference from other users known as multiple access interference (MAI). The system performance in terms of bit error rate (BER) degrades as a result of increased MAI. It is perceived that number of users and type of codes used for optical system directly decide the performance of system. MAI can be restricted by efficient designing of optical codes and implementing them with unique architecture to accommodate more number of users. Hence, it is a necessity to design a technique like spectral direct detection (SDD) technique with modified double weight code, which can provide better cardinality and good correlation property.

  17. Multiple Access Schemes for Lunar Missions

    NASA Technical Reports Server (NTRS)

    Deutsch, Leslie; Hamkins, Jon; Stocklin, Frank J.

    2010-01-01

    Two years ago, the NASA Coding, Modulation, and Link Protocol (CMLP) study was completed. The study, led by the authors of this paper, recommended codes, modulation schemes, and desired attributes of link protocols for all space communication links in NASA's future space architecture. Portions of the NASA CMLP team were reassembled to resolve one open issue: the use of multiple access (MA) communication from the lunar surface. The CMLP-MA team analyzed and simulated two candidate multiple access schemes that were identified in the original CMLP study: Code Division MA (CDMA) and Frequency Division MA (FDMA) based on a bandwidth-efficient Continuous Phase Modulation (CPM) with a superimposed Pseudo-Noise (PN) ranging signal (CPM/PN). This paper summarizes the results of the analysis and simulation of the CMLP-MA study and describes the final recommendations.

  18. High data rate modem simulation for the space station multiple-access communications system

    NASA Technical Reports Server (NTRS)

    Horan, Stephen

    1987-01-01

    The communications system for the space station will require a space based multiple access component to provide communications between the space based program elements and the station. A study was undertaken to investigate two of the concerns of this multiple access system, namely, the issues related to the frequency spectrum utilization and the possibilities for higher order (than QPSK) modulation schemes for use in possible modulators and demodulators (modems). As a result of the investigation, many key questions about the frequency spectrum utilization were raised. At this point, frequency spectrum utilization is seen as an area requiring further work. Simulations were conducted using a computer aided communications system design package to provide a straw man modem structure to be used for both QPSK and 8-PSK channels.

  19. Multiple Intimate Partner Violence Experiences: Knowledge, Access, Utilization and Barriers to Utilization of Resources by Women of the African Diaspora

    PubMed Central

    Sabri, Bushra; Huerta, Julia; Alexander, Kamila A.; St.Vil, Noelle M.; Campbell, Jacquelyn C.; Callwood, Gloria B.

    2016-01-01

    Objective This study examined knowledge, access, utilization, and barriers to use of resources among Black women exposed to multiple types of intimate partner violence in Baltimore, Maryland and the U.S. Virgin Islands (USVI). Methods We analyzed quantitative survey data collected by 163 women recruited from primary care, prenatal or family planning clinics in Baltimore and the USVI. In addition we analyzed qualitative data from in-depth interviews with 11 women. Quantitative data were analyzed using descriptive statistics and qualitative data were analyzed using thematic analysis. Results A substantial proportion of Black women with multiple types of violence experiences lacked knowledge of, did not have access to, and did not use resources. Barriers to resource use were identified at the individual, relationship, and community levels. Conclusion There is need for programs to develop awareness, promote access and utilization of resources, and eliminate barriers to resource use among abused Black women. PMID:26548679

  20. Population structure and its effect on haplotype diversity and linkage disequilibrium surrounding the xa5 locus of rice (Oryza sativa L.).

    PubMed Central

    Garris, Amanda J; McCouch, Susan R; Kresovich, Stephen

    2003-01-01

    To assess the usefulness of linkage disequilibrium mapping in an autogamous, domesticated species, we have characterized linkage disequilibrium in the candidate region for xa5, a recessive gene conferring race-specific resistance to bacterial blight in rice. This trait and locus have good mapping information, a tractable phenotype, and available sequence data, but no cloned gene. We sampled 13 short segments from the 70-kb candidate region in 114 accessions of Oryza sativa. Five additional segments were sequenced from the adjacent 45-kb region in resistant accessions to estimate the distance at which linkage disequilibrium decays. The data show significant linkage disequilibrium between sites 100 kb apart. The presence of the xa5 resistant reaction in two ecotypes and in accessions with different haplotypes in the candidate region may indicate multiple origins or genetic heterogeneity for resistance. In addition, genetic differentiation between ecotypes emphasizes the need for controlling for population structure in the design of linkage disequilibrium studies in rice. PMID:14573486

  1. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    PubMed

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  2. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    NASA Astrophysics Data System (ADS)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol outperformed the wired counterparts and several other wireless architectures proposed in literature in terms of bandwidth and packet energy dissipation. Significant gains were observed in packet energy dissipation and bandwidth even with scaling the system to higher number of cores. Non-uniform traffic simulations showed that the proposed CDMA-WiNoC was consistent in bandwidth across all traffic patterns. It is also shown that the CDMA based MAC scheme does not introduce additional reliability concerns in data transfer over the on-chip wireless interconnects.

  3. Adaptive Transmission and Channel Modeling for Frequency Hopping Communications

    DTIC Science & Technology

    2009-09-21

    proposed adaptive transmission method has much greater system capacity than conventional non-adaptive MC direct- sequence ( DS )- CDMA system. • We...several mobile radio systems. First, a new improved allocation algorithm was proposed for multicarrier code-division multiple access (MC- CDMA ) system...Multicarrier code-division multiple access (MC- CDMA ) system with adaptive frequency hopping (AFH) has attracted attention of researchers due to its

  4. Fracture Strength of Endodontically Treated Teeth with Different Access Cavity Designs.

    PubMed

    Plotino, Gianluca; Grande, Nicola Maria; Isufi, Almira; Ioppolo, Pietro; Pedullà, Eugenio; Bedini, Rossella; Gambarini, Gianluca; Testarelli, Luca

    2017-06-01

    The purpose of this study was to compare in vitro the fracture strength of root-filled and restored teeth with traditional endodontic cavity (TEC), conservative endodontic cavity (CEC), or ultraconservative "ninja" endodontic cavity (NEC) access. Extracted human intact maxillary and mandibular premolars and molars were selected and assigned to control (intact teeth), TEC, CEC, or NEC groups (n = 10/group/type). Teeth in the TEC group were prepared following the principles of traditional endodontic cavities. Minimal CECs and NECs were plotted on cone-beam computed tomographic images. Then, teeth were endodontically treated and restored. The 160 specimens were then loaded to fracture in a mechanical material testing machine (LR30 K; Lloyd Instruments Ltd, Fareham, UK). The maximum load at fracture and fracture pattern (restorable or unrestorable) were recorded. Fracture loads were compared statistically, and the data were examined with analysis of variance and the Student-Newman-Keuls test for multiple comparisons. The mean load at fracture for TEC was significantly lower than the one for the CEC, NEC, and control groups for all types of teeth (P < .05), whereas no difference was observed among CEC, NEC, and intact teeth (P > .05). Unrestorable fractures were significantly more frequent in the TEC, CEC, and NEC groups than in the control group in each tooth type (P < .05). Teeth with TEC access showed lower fracture strength than the ones prepared with CEC or NEC. Ultraconservative "ninja" endodontic cavity access did not increase the fracture strength of teeth compared with the ones prepared with CEC. Intact teeth showed more restorable fractures than all the prepared ones. Copyright © 2017 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  5. Next generation communications satellites: Multiple access and network studies

    NASA Technical Reports Server (NTRS)

    Stern, T. E.; Schwartz, M.; Meadows, H. E.; Ahmadi, H. K.; Gadre, J. G.; Gopal, I. S.; Matsmo, K.

    1980-01-01

    Following an overview of issues involved in the choice of promising system architectures for efficient communication with multiple small inexpensive Earth stations serving hetergeneous user populations, performance evaluation via analysis and simulation for six SS/TDMA (satellite-switched/time-division multiple access) system architectures is discussed. These configurations are chosen to exemplify the essential alternatives available in system design. Although the performance evaluation analyses are of fairly general applicability, whenever possible they are considered in the context of NASA's 30/20 GHz studies. Packet switched systems are considered, with the assumption that only a part of transponder capacit is devoted to packets, the integration of circuit and packet switched traffic being reserved for further study. Three types of station access are distinguished: fixed (FA), demand (DA), and random access (RA). Similarly, switching in the satellite can be assigned on a fixed (FS) or demand (DS) basis, or replaced by a buffered store-and-forward system (SF) onboard the satellite. Since not all access/switching combinations are practical, six systems are analyzed in detail: three FS SYSTEMS, FA/FS, DA/ES, RA/FS; one DS system, DA/DS; and two SF systems, FA/SF, DA/SF. Results are presented primarily in terms of delay-throughput characteristics.

  6. The power of integration: radiotherapy and global palliative care.

    PubMed

    Rodin, Danielle; Grover, Surbhi; Elmore, Shekinah N; Knaul, Felicia M; Atun, Rifat; Caulley, Lisa; Herrera, Cristian A; Jones, Joshua A; Price, Aryeh J; Munshi, Anusheel; Gandhi, Ajeet K; Shah, Chiman; Gospodarowicz, Mary

    2016-07-01

    Radiotherapy (RT) is a powerful tool for the palliation of the symptoms of advanced cancer, although access to it is limited or absent in many low- and middle-income countries (LMICs). There are multiple factors contributing to this, including assumptions about the economic feasibility of RT in LMICs, the logical challenges of building capacity to deliver it in those regions, and the lack of political support to drive change of this kind. It is encouraging that the problem of RT access has begun to be included in the global discourse on cancer control and that palliative care and RT have been incorporated into national cancer control plans in some LMICs. Further, RT twinning programs involving high- and low-resource settings have been established to improve knowledge transfer and exchange. However, without large-scale action, the consequences of limited access to RT in LMICs will become dire. The number of new cancer cases around the world is expected to double by 2030, with twice as many deaths occurring in LMICs as in high-income countries (HICs). A sustained and coordinated effort involving research, education, and advocacy is required to engage global institutions, universities, health care providers, policymakers, and private industry in the urgent need to build RT capacity and delivery in LMICs.

  7. Socioeconomic disparities in head and neck cancer patients' access to cancer treatment centers.

    PubMed

    Walker, Blake Byron; Schuurman, Nadine; Auluck, Ajit; Lear, Scott A; Rosin, Miriam

    2017-01-01

    Both socioeconomic status and travel time to cancer treatment have been associated with treatment choice and patient outcomes. An improved understanding of the relationship between these two dimensions of access may enable cancer control experts to better target patients with poor access, particularly in isolated suburban and rural communities. Using geographical information systems, head and neck cancer patients across British Columbia, Canada from 1981 to 2009, were mapped and their travel times to the nearest treatment center at their time of diagnosis were modelled. Patients' travel times were analysed by urban, suburban, and rural neighborhood types and an index of multiple socioeconomic deprivation was used to assess the role of socioeconomic status in patients' spatial access. Significant associations between socioeconomic deprivation and spatial access to treatment were identified, with the most deprived quintiles of patients experiencing nearly twice the travel time as the least deprived quintile. The sharpest disparities were observed among the most deprived patient populations in suburban and rural areas. However, the establishment of new treatment centers has decreased overall travel times by 28% in recent decades. Residence in a neighborhood with high socioeconomic deprivation is strongly associated with head and neck cancer patients' spatial access to cancer treatment centers. Patients residing in the most socioeconomically deprived neighborhoods consistently have longer travel times in urban, suburban, and rural communities in the study area.

  8. A review of promoting access to medicines in China - problems and recommendations.

    PubMed

    Sun, Jing; Hu, Cecile Jia; Stuntz, Mark; Hogerzeil, Hans; Liu, Yuanli

    2018-02-20

    Despite recent reforms, distorting funding mechanisms and over-prescribing still maintain severe financial barriers to medicines access in China. Complicated and interrelated problems in the pharmaceutical sector require a common framework to be resolved as fragmented solutions do not work. We present a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and propose policy recommendations for promoting universal access to medicines in China. Drawing on multiple sources of information, including a review of published literatures and official national data, field investigations in six provinces and interviews with key opinion leaders, this paper presents a preliminary assessment of the impact of the national healthcare reforms on access to medicines, and proposes policy recommendations for promoting universal access to medicines in China. Public expenditure on medicines has been strictly controlled since the national healthcare reforms of 2009. Yet total pharmaceutical expenditure (TPE) and total health expenditure growth rates continuously outpaced the growth of gross domestic product (GDP). With 2.4% of GDP, TPE now exceeds that of most high income countries. The distorted provider and consumer incentives in the Chinese health system have not fundamentally changed. Price-setting and reimbursement mechanisms do not promote cost-effective use of medicines. Inappropriate price controls and perverse financial incentives are the un-resolved root causes of preference of originator brands for some major diseases and shortages of low-cost and low-consumption medicines. In addition, access to expensive life-saving medicines is yet systematically addressed. The complicated and interdependent problems interact in a way that leads to significant system problems in China, which create dual challenges that both the developing country and the developed countries are facing. To further promote access to medicines, China should speed up the re-assessment of the quality and efficacy of domestically produced generic medicines; coordinate various reforms of price determination, insurance payments, and procurement policies; address medicine shortages through comprehensive policies and legislation; establish specific mechanisms to achieve sustainable equitable access to expensive essential medicines with health technology assessment as a tool to ensure that policy and priority setting are created in a coherent and evidence-based way.

  9. Multimode drug inducible CRISPR/Cas9 devices for transcriptional activation and genome editing

    PubMed Central

    Lu, Jia; Zhao, Chen; Zhao, Yingze; Zhang, Jingfang; Zhang, Yue; Chen, Li; Han, Qiyuan; Ying, Yue; Peng, Shuai; Ai, Runna; Wang, Yu

    2018-01-01

    Abstract Precise investigation and manipulation of dynamic biological processes often requires molecular modulation in a controlled inducible manner. The clustered, regularly interspaced, short palindromic repeats (CRISPR)/CRISPR associated protein 9 (Cas9) has emerged as a versatile tool for targeted gene editing and transcriptional programming. Here, we designed and vigorously optimized a series of Hybrid drug Inducible CRISPR/Cas9 Technologies (HIT) for transcriptional activation by grafting a mutated human estrogen receptor (ERT2) to multiple CRISPR/Cas9 systems, which renders them 4-hydroxytamoxifen (4-OHT) inducible for the access of genome. Further, extra functionality of simultaneous genome editing was achieved with one device we named HIT2. Optimized terminal devices herein delivered advantageous performances in comparison with several existing designs. They exerted selective, titratable, rapid and reversible response to drug induction. In addition, these designs were successfully adapted to an orthogonal Cas9. HIT systems developed in this study can be applied for controlled modulation of potentially any genomic loci in multiple modes. PMID:29237052

  10. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  11. Improving User Access to the Integrated Multi-Satellite Retrievals for GPM (IMERG) Products

    NASA Astrophysics Data System (ADS)

    Huffman, George; Bolvin, David; Nelkin, Eric; Kidd, Christopher

    2016-04-01

    The U.S. Global Precipitation Measurement mission (GPM) team has developed the Integrated Multi-satellitE Retrievals for GPM (IMERG) algorithm to take advantage of the international constellation of precipitation-relevant satellites and the Global Precipitation Climatology Centre surface precipitation gauge analysis. The goal is to provide a long record of homogeneous, high-resolution quasi-global estimates of precipitation. While expert scientific researchers are major users of the IMERG products, it is clear that many other user communities and disciplines also desire access to the data for wide-ranging applications. Lessons learned during the Tropical Rainfall Measuring Mission, the predecessor to GPM, led to some basic design choices that provided the framework for supporting multiple user bases. For example, two near-real-time "runs" are computed, the Early and Late (currently 5 and 15 hours after observation time, respectively), then the Final Run about 3 months later. The datasets contain multiple fields that provide insight into the computation of the complete precipitation data field, as well as diagnostic (currently) estimates of the precipitation's phase. In parallel with this, the archive sites are working to provide the IMERG data in a variety of formats, and with subsetting and simple interactive analysis to make the data more easily available to non-expert users. The various options for accessing the data are summarized under the pmm.nasa.gov data access page. The talk will end by considering the feasibility of major user requests, including polar coverage, a simplified Data Quality Index, and reduced data latency for the Early Run. In brief, the first two are challenging, but under the team's control. The last requires significant action by some of the satellite data providers.

  12. First confirmation and characterization of target and non-target site resistance to glyphosate in Palmer amaranth (Amaranthus palmeri) from Mexico.

    PubMed

    Dominguez-Valenzuela, Jose Alfredo; Gherekhloo, Javid; Fernández-Moreno, Pablo Tomás; Cruz-Hipolito, Hugo Enrique; Alcántara-de la Cruz, Ricardo; Sánchez-González, Eduardo; De Prado, Rafael

    2017-06-01

    Following the introduction of glyphosate-resistant (GR)-cotton crops in Mexico, farmers have relied upon glyphosate as being the only herbicide for in-season weed control. Continuous use of glyphosate within the same year and over multiple successive years has resulted in the selection of glyphosate resistance in Palmer amaranth (Amarantus palmeri). Dose-response assays confirmed resistance in seven different accessions. The resistance ratio based on GR 50 values (50% growth reduction) varied between 12 and 83. At 1000 μM glyphosate, shikimic acid accumulation in the S-accession was 30- to 2-fold higher at compared to R-accessions. At 96 h after treatment, 35-44% and 61% of applied 14 C-glyphosate was taken up by leaves of plants from R- and S-accessions, respectively. At this time, a significantly higher proportion of the glyphosate absorbed remained in the treated leaf of R-plants (55-69%) compared to S-plants (36%). Glyphosate metabolism was low and did not differ between resistant and susceptible plants. Glyphosate was differentially metabolized to AMPA and glyoxylate in plants of R- and S-accessions, although it was low in both accessions (<10%). There were differences in 5-enolpyruvylshikimate-3-phosphate synthase (EPSPS) enzyme activity by 50% (I 50 ) between R- and S-accessions. However, no significant differences were found in the basal EPSPS activity (μmol inorganic phosphate μg -1 total soluble protein min -1 ) between R- and S-accessions. A point mutation Pro-106-Ser was evidenced in three accessions. The results confirmed the resistance of Palmer amaranth accessions to glyphosate collected from GR-cotton crops from Mexico. This is the first study demonstrating glyphosate-resistance in Palmer amaranth from Mexico. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  13. Is physician-patient concordance associated with greater trust for women of low socioeconomic status?

    PubMed

    Scheid, Teresa L; Smith, Galen H

    2017-07-01

    The authors examined the association between physician-patient concordance and patient trust for low socio-economic status women who were enrolled in Medicaid case management. The data were collected from October 2006 through March 2007 from a stratified random sample of 2,815 adult beneficiaries enrolled in North Carolina Medicaid's primary care case management delivery system. We limited our analyses to women enrolled in primary care, hence controlling for gender and social class as well as access to care. We were also able to control for the availability of minority providers. The findings revealed that the enrollee's race, education, and experiences seeking help with their health providers were significantly related to patient's trust of their physicians. Neither race concordance nor gender concordance improved trust. This may be because relatively few minority providers were included in the sample. These results extend research on physician-patient concordance by examining the relationship of both racial and gender concordance with patient trust while controlling for access and social class. Research on physician-patient concordance needs to account for multiple measures of social status, as well as differences in culture and communication styles between physicians and their patients.

  14. Distributed magnetic field positioning system using code division multiple access

    NASA Technical Reports Server (NTRS)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  15. The design of an m-Health monitoring system based on a cloud computing platform

    NASA Astrophysics Data System (ADS)

    Xu, Boyi; Xu, Lida; Cai, Hongming; Jiang, Lihong; Luo, Yang; Gu, Yizhi

    2017-01-01

    Compared to traditional medical services provided within hospitals, m-Health monitoring systems (MHMSs) face more challenges in personalised health data processing. To achieve personalised and high-quality health monitoring by means of new technologies, such as mobile network and cloud computing, in this paper, a framework of an m-Health monitoring system based on a cloud computing platform (Cloud-MHMS) is designed to implement pervasive health monitoring. Furthermore, the modules of the framework, which are Cloud Storage and Multiple Tenants Access Control Layer, Healthcare Data Annotation Layer, and Healthcare Data Analysis Layer, are discussed. In the data storage layer, a multiple tenant access method is designed to protect patient privacy. In the data annotation layer, linked open data are adopted to augment health data interoperability semantically. In the data analysis layer, the process mining algorithm and similarity calculating method are implemented to support personalised treatment plan selection. These three modules cooperate to implement the core functions in the process of health monitoring, which are data storage, data processing, and data analysis. Finally, we study the application of our architecture in the monitoring of antimicrobial drug usage to demonstrate the usability of our method in personal healthcare analysis.

  16. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  17. The effects of hands-free communication device systems: communication changes in hospital organizations.

    PubMed

    Richardson, Joshua E; Ash, Joan S

    2010-01-01

    To analyze the effects that hands-free communication device (HCD) systems have on healthcare organizations from multiple user perspectives. This exploratory qualitative study recruited 26 subjects from multiple departments in two research sites located in Portland, Oregon: an academic medical center and a community hospital. Interview and observation data were gathered January through March, 2007. Data were analyzed using a grounded theory approach. Because this study was exploratory, data were coded and patterns identified until overall themes 'emerged'. Five themes arose: (1) Communication access-the perception that HCD systems provide fast and efficient communication that supports workflow; (2) Control-social and technical considerations associated with use of an HCD system; (3) Training-processes that should be used to improve use of the HCD system; (4) Organizational change-changes to organizational design and behavior caused by HCD system implementation; and (5) Environment and infrastructure-HCD system use within the context of physical workspaces. HCD systems improve communication access but users experience challenges integrating the system into workflow. Effective HCD use depends on how well organizations train users, adapt to changes brought about by HCD systems, and integrate HCD systems into physical surroundings.

  18. A Federated Network for Translational Cancer Research Using Clinical Data and Biospecimens

    PubMed Central

    Becich, Michael J.; Bollag, Roni J.; Chavan, Girish; Corrigan, Julia; Dhir, Rajiv; Feldman, Michael D.; Gaudioso, Carmelo; Legowski, Elizabeth; Maihle, Nita J.; Mitchell, Kevin; Murphy, Monica; Sakthivel, Mayur; Tseytlin, Eugene; Weaver, JoEllen

    2015-01-01

    Advances in cancer research and personalized medicine will require significant new bridging infrastructures, including more robust biorepositories that link human tissue to clinical phenotypes and outcomes. In order to meet that challenge, four cancer centers formed the TIES Cancer Research Network, a federated network that facilitates data and biospecimen sharing among member institutions. Member sites can access pathology data that is de-identified and processed with the TIES natural language processing system, which creates a repository of rich phenotype data linked to clinical biospecimens. TIES incorporates multiple security and privacy best practices that, combined with legal agreements, network policies and procedures, enable regulatory compliance. The TIES Cancer Research Network now provides integrated access to investigators at all member institutions, where multiple investigator-driven pilot projects are underway. Examples of federated search across the network illustrate the potential impact on translational research, particularly for studies involving rare cancers, rare phenotypes, and specific biologic behaviors. The network satisfies several key desiderata including local control of data and credentialing, inclusion of rich phenotype information, and applicability to diverse research objectives. The TIES Cancer Research Network presents a model for a national data and biospecimen network. PMID:26670560

  19. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  20. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  1. A Study of the Seastar Underwater Acoustic Local Area Network Concept

    DTIC Science & Technology

    2007-12-01

    sense multiple access (CSMA) and multiple access with collision avoidance ( MACA ) are reviewed in [19, 22, 23, 34]. Peripheral nodes using ALOHA and...transmissions until the channel is clear. However, the long propagation time limits the effectiveness of CSMA for acoustic communications. MACA [22] uses... MACA protocol, if no ACK message is received after the transmission is completed, the full packet will be retransmitted until reception is

  2. Space-Time Processing for Tactical Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-05-01

    Spatial Diversity and Imperfect Channel Estimation on Wideband MC- DS - CDMA and MC- CDMA " IEEE Transactions on Communications, Vol. 57, No. 10, pp. 2988...include direct sequence code division multiple access ( DS - CDMA ), Frequency Hopped (FH) CDMA and Orthogonal Frequency Division Multiple Access (OFDMA...capability, LPD/LPI, and operability in non-continuous spectrum. In addition, FH- CDMA is robust to the near-far problem, while DS - CDMA requires

  3. ABSENTEE COMPUTATIONS IN A MULTIPLE-ACCESS COMPUTER SYSTEM.

    DTIC Science & Technology

    require user interaction, and the user may therefore want to run these computations ’ absentee ’ (or, user not present). A mechanism is presented which...provides for the handling of absentee computations in a multiple-access computer system. The design is intended to be implementation-independent...Some novel features of the system’s design are: a user can switch computations from interactive to absentee (and vice versa), the system can

  4. Parallel Object Activation and Attentional Gating of Information: Evidence from Eye Movements in the Multiple Object Naming Paradigm

    ERIC Educational Resources Information Center

    Schotter, Elizabeth R.; Ferreira, Victor S.; Rayner, Keith

    2013-01-01

    Do we access information from any object we can see, or do we access information only from objects that we intend to name? In 3 experiments using a modified multiple object naming paradigm, subjects were required to name several objects in succession when previews appeared briefly and simultaneously in the same location as the target as well as at…

  5. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    PubMed

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  6. High capacity low delay packet broadcasting multiaccess schemes for satellite repeater systems

    NASA Astrophysics Data System (ADS)

    Bose, S. K.

    1980-12-01

    Demand assigned packet radio schemes using satellite repeaters can achieve high capacities but often exhibit relatively large delays under low traffic conditions when compared to random access. Several schemes which improve delay performance at low traffic but which have high capacity are presented and analyzed. These schemes allow random acess attempts by users, who are waiting for channel assignments. The performance of these are considered in the context of a multiple point communication system carrying fixed length messages between geographically distributed (ground) user terminals which are linked via a satellite repeater. Channel assignments are done following a BCC queueing discipline by a (ground) central controller on the basis of requests correctly received over a collision type access channel. In TBACR Scheme A, some of the forward message channels are set aside for random access transmissions; the rest are used in a demand assigned mode. Schemes B and C operate all their forward message channels in a demand assignment mode but, by means of appropriate algorithms for trailer channel selection, allow random access attempts on unassigned channels. The latter scheme also introduces framing and slotting of the time axis to implement a more efficient algorithm for trailer channel selection than the former.

  7. A pilot study of telephone cognitive-behavioural therapy for obsessive-compulsive disorder in young people.

    PubMed

    Turner, Cynthia; Heyman, Isobel; Futh, Annabel; Lovell, Karina

    2009-07-01

    Cognitive-behaviour therapy (CBT) is the recommended psychological treatment for obsessive compulsive disorder (OCD) in young people. Access to CBT may be limited by a number of factors, including lack of trained therapists, and geographic or financial factors preventing access to a specialized service. Telephone delivery of CBT represents one way of overcoming some of these accessibility issues. This pilot study describes outcomes for a telephone-based cognitive-behavioural treatment for obsessive-compulsive disorder (OCD) in young people. Ten participants, aged 13 to 17 years, and their parents received up to 16 sessions of telephone CBT (TCBT). Measures of OCD symptoms were obtained using multiple informants and a repeated measures design. Assessments were conducted at pre-treatment, post-treatment, and at 6- and 12-month follow-up. Improvements were found for OCD symptoms across all informants. Family satisfaction with treatment over the telephone was high. The findings suggest that TCBT is a clinically effective, feasible and acceptable means of service delivery that offers the potential to make CBT a more accessible treatment for young people. TCBT requires further evaluation in randomized, controlled trials to compare effectiveness with face-to-face CBT, which currently represents the usual care model.

  8. A Hybrid Lifetime Extended Directional Approach for WBANs

    PubMed Central

    Li, Changle; Yuan, Xiaoming; Yang, Li; Song, Yueyang

    2015-01-01

    Wireless Body Area Networks (WBANs) can provide real-time and reliable health monitoring, attributing to the human-centered and sensor interoperability properties. WBANs have become a key component of the ubiquitous eHealth (electronic health) revolution that prospers on the basis of information and communication technologies. The prime consideration in WBAN is how to maximize the network lifetime with battery-powered sensor nodes in energy constraint. Novel solutions in Medium Access Control (MAC) protocols are imperative to satisfy the particular BAN scenario and the need of excellent energy efficiency in healthcare applications. In this paper, we propose a hybrid Lifetime Extended Directional Approach (LEDA) MAC protocol based on IEEE 802.15.6 to reduce energy consumption and prolong network lifetime. The LEDA MAC protocol takes full advantages of directional superiority in energy saving that employs multi-beam directional mode in Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) and single-beam directional mode in Time Division Multiple Access (TDMA) for alternative in data reservation and transmission according to the traffic varieties. Moreover, the impacts of some inherent problems of directional antennas such as deafness and hidden terminal problem can be decreased owing to that all nodes generate individual beam according to user priorities designated. Furthermore, LEDA MAC employs a Dynamic Polled Allocation Period (DPAP) for burst data transmissions to increase the network reliability and adaptability. Extensive analysis and simulation results show that the proposed LEDA MAC protocol achieves extended network lifetime with improved performance compared with IEEE 802.15.6. PMID:26556357

  9. Reduced representation approaches to interrogate genome diversity in large repetitive plant genomes.

    PubMed

    Hirsch, Cory D; Evans, Joseph; Buell, C Robin; Hirsch, Candice N

    2014-07-01

    Technology and software improvements in the last decade now provide methodologies to access the genome sequence of not only a single accession, but also multiple accessions of plant species. This provides a means to interrogate species diversity at the genome level. Ample diversity among accessions in a collection of species can be found, including single-nucleotide polymorphisms, insertions and deletions, copy number variation and presence/absence variation. For species with small, non-repetitive rich genomes, re-sequencing of query accessions is robust, highly informative, and economically feasible. However, for species with moderate to large sized repetitive-rich genomes, technical and economic barriers prevent en masse genome re-sequencing of accessions. Multiple approaches to access a focused subset of loci in species with larger genomes have been developed, including reduced representation sequencing, exome capture and transcriptome sequencing. Collectively, these approaches have enabled interrogation of diversity on a genome scale for large plant genomes, including crop species important to worldwide food security. © The Author 2014. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  10. Multiple-access phased array antenna simulator for a digital beam-forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  11. Multiple-access phased array antenna simulator for a digital beam forming system investigation

    NASA Technical Reports Server (NTRS)

    Kerczewski, Robert J.; Yu, John; Walton, Joanne C.; Perl, Thomas D.; Andro, Monty; Alexovich, Robert E.

    1992-01-01

    Future versions of data relay satellite systems are currently being planned by NASA. Being given consideration for implementation are on-board digital beamforming techniques which will allow multiple users to simultaneously access a single S-band phased array antenna system. To investigate the potential performance of such a system, a laboratory simulator has been developed at NASA's Lewis Research Center. This paper describes the system simulator, and in particular, the requirements, design, and performance of a key subsystem, the phased array antenna simulator, which provides realistic inputs to the digital processor including multiple signals, noise, and nonlinearities.

  12. Disparities in chronic conditions and health status by type of disability

    PubMed Central

    Horner-Johnson, Willi; Dobbertin, Konrad; Lee, Jae Chul; Andresen, Elena M.

    2013-01-01

    Background Prior research has established health disparities between people with and without disabilities. However, disparities within the disability population, such as those related to type of disability, have been much less studied. Objective To examine differences in chronic conditions and health status between subgroups of people with different types of disability. Methods We analyzed Medical Expenditure Panel Survey annual data files from 2002-2008. Logistic regression analyses considered disparity from three perspectives: 1) basic differences, unadjusted for other factors; 2) controlling for key demographic and health covariates; and 3) controlling for a larger set of demographic variables and socioeconomic status as well as health and access to healthcare. Results Individuals with vision, physical, cognitive, or multiple disability types fared worse than people with hearing impairment on most health outcomes. This was most consistently true for people with multiple disabilities. Even when all covariates were accounted for, people with multiple types of disability were significantly more likely (p < 0.05) than those with hearing impairment (reference group) to report every poor health outcome with the exception of BMI ≥ 25 and lung disease. Conclusions While many of the differences between disability types were reduced when controlling for other factors, some differences remained significant. This argues for a more individualized approach to understanding and preventing chronic conditions and poor health in specific disability groups. PMID:24060250

  13. Fabrication of Defined Polydopamine Nanostructures by DNA Origami-Templated Polymerization.

    PubMed

    Tokura, Yu; Harvey, Sean; Chen, Chaojian; Wu, Yuzhou; Ng, David Y W; Weil, Tanja

    2018-02-05

    A versatile, bottom-up approach allows the controlled fabrication of polydopamine (PD) nanostructures on DNA origami. PD is a biosynthetic polymer that has been investigated as an adhesive and promising surface coating material. However, the control of dopamine polymerization is challenged by the multistage-mediated reaction mechanism and diverse chemical structures in PD. DNA origami decorated with multiple horseradish peroxidase-mimicking DNAzyme motifs was used to control the shape and size of PD formation with nanometer resolution. These fabricated PD nanostructures can serve as "supramolecular glue" for controlling DNA origami conformations. Facile liberation of the PD nanostructures from the DNA origami templates has been achieved in acidic medium. This presented DNA origami-controlled polymerization of a highly crosslinked polymer provides a unique access towards anisotropic PD architectures with distinct shapes that were retained even in the absence of the DNA origami template. © 2018 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  14. A controlled, before-and-after trial of an urban sanitation intervention to reduce enteric infections in children: research protocol for the Maputo Sanitation (MapSan) study, Mozambique

    PubMed Central

    Brown, Joe; Cumming, Oliver; Bartram, Jamie; Cairncross, Sandy; Ensink, Jeroen; Holcomb, David; Knee, Jackie; Kolsky, Peter; Liang, Kaida; Liang, Song; Nala, Rassul; Norman, Guy; Rheingans, Richard; Stewart, Jill; Zavale, Olimpio; Zuin, Valentina; Schmidt, Wolf-Peter

    2015-01-01

    Introduction Access to safe sanitation in low-income, informal settlements of Sub-Saharan Africa has not significantly improved since 1990. The combination of a high faecal-related disease burden and inadequate infrastructure suggests that investment in expanding sanitation access in densely populated urban slums can yield important public health gains. No rigorous, controlled intervention studies have evaluated the health effects of decentralised (non-sewerage) sanitation in an informal urban setting, despite the role that such technologies will likely play in scaling up access. Methods and analysis We have designed a controlled, before-and-after (CBA) trial to estimate the health impacts of an urban sanitation intervention in informal neighbourhoods of Maputo, Mozambique, including an assessment of whether exposures and health outcomes vary by localised population density. The intervention consists of private pour-flush latrines (to septic tank) shared by multiple households in compounds or household clusters. We will measure objective health outcomes in approximately 760 children (380 children with household access to interventions, 380 matched controls using existing shared private latrines in poor sanitary conditions), at 2 time points: immediately before the intervention and at follow-up after 12 months. The primary outcome is combined prevalence of selected enteric infections among children under 5 years of age. Secondary outcome measures include soil-transmitted helminth (STH) reinfection in children following baseline deworming and prevalence of reported diarrhoeal disease. We will use exposure assessment, faecal source tracking, and microbial transmission modelling to examine whether and how routes of exposure for diarrhoeagenic pathogens and STHs change following introduction of effective sanitation. Ethics Study protocols have been reviewed and approved by human subjects review boards at the London School of Hygiene and Tropical Medicine, the Georgia Institute of Technology, the University of North Carolina at Chapel Hill, and the Ministry of Health, Republic of Mozambique. Trial registration number NCT02362932. PMID:26088809

  15. Design and implementation of a software package to control a network of robotic observatories

    NASA Astrophysics Data System (ADS)

    Tuparev, G.; Nicolova, I.; Zlatanov, B.; Mihova, D.; Popova, I.; Hessman, F. V.

    2006-09-01

    We present a description of a reusable software package able to control a large, heterogeneous network of fully and semi-robotic observatories initially developed to run the MONET network of two 1.2 m telescopes. Special attention is given to the design of a robust, long-term observation scheduler which also allows the trading of observation time and facilities within various networks. The handling of the ``Phase I&II" project-development process, the time-accounting between complex organizational structures, and usability issues for making the package accessible not only to professional astronomers, but also to amateurs and high-school students is discussed. A simple RTML-based solution to link multiple networks is demonstrated.

  16. Testing and Performance Analysis of the Multichannel Error Correction Code Decoder

    NASA Technical Reports Server (NTRS)

    Soni, Nitin J.

    1996-01-01

    This report provides the test results and performance analysis of the multichannel error correction code decoder (MED) system for a regenerative satellite with asynchronous, frequency-division multiple access (FDMA) uplink channels. It discusses the system performance relative to various critical parameters: the coding length, data pattern, unique word value, unique word threshold, and adjacent-channel interference. Testing was performed under laboratory conditions and used a computer control interface with specifically developed control software to vary these parameters. Needed technologies - the high-speed Bose Chaudhuri-Hocquenghem (BCH) codec from Harris Corporation and the TRW multichannel demultiplexer/demodulator (MCDD) - were fully integrated into the mesh very small aperture terminal (VSAT) onboard processing architecture and were demonstrated.

  17. Structure for common access and support of fuel cell stacks

    DOEpatents

    Walsh, Michael M.

    2000-01-01

    A structure provides common support and access to multiple fuel cells externally mounted thereto. The structure has openings leading to passages defined therein for providing the access. Various other fuel cell power system components are connected at the openings, such as reactant and coolant sources.

  18. Teaching Individuals with Profound Multiple Disabilities to Access Preferred Stimuli with Multiple Microswitches

    ERIC Educational Resources Information Center

    Tam, Gee May; Phillips, Katrina J.; Mudford, Oliver C.

    2011-01-01

    We replicated and extended previous research on microswitch facilitated choice making by individuals with profound multiple disabilities. Following an assessment of stimulus preferences, we taught 6 adults with profound multiple disabilities to emit 2 different responses to activate highly preferred stimuli. All participants learnt to activate…

  19. Network control processor for a TDMA system

    NASA Astrophysics Data System (ADS)

    Suryadevara, Omkarmurthy; Debettencourt, Thomas J.; Shulman, R. B.

    Two unique aspects of designing a network control processor (NCP) to monitor and control a demand-assigned, time-division multiple-access (TDMA) network are described. The first involves the implementation of redundancy by synchronizing the databases of two geographically remote NCPs. The two sets of databases are kept in synchronization by collecting data on both systems, transferring databases, sending incremental updates, and the parallel updating of databases. A periodic audit compares the checksums of the databases to ensure synchronization. The second aspect involves the use of a tracking algorithm to dynamically reallocate TDMA frame space. This algorithm detects and tracks current and long-term load changes in the network. When some portions of the network are overloaded while others have excess capacity, the algorithm automatically calculates and implements a new burst time plan.

  20. A DTN-Based Multiple Access Fast Forward Service for the NASA Space Network

    NASA Technical Reports Server (NTRS)

    Israel, David; Davis, Faith; Marquart. Jane

    2011-01-01

    The NASA Space Network provides a demand access return link service capable of providing users a space link "on demand". An equivalent service in the forward link direction is not possible due to Tracking and Data Relay Spacecraft (TDRS) constraints. A Disruption Tolerant Networking (DTN)-based Multiple Access Fast Forward (MAFF) service has been proposed to provide a forward link to a user as soon as possible. Previous concept studies have identified a basic architecture and implementation approach. This paper reviews the user scenarios and benefits of an MAFF service and proposes an implementation approach based on the use of DTN protocols.

  1. Case Study in Modeling Accessibility for Online Instruction

    ERIC Educational Resources Information Center

    Conway, Thomas Hayes

    2017-01-01

    The purpose of this qualitative multiple case study was to explore how accessibility standards are adapted to create online learning environments that are accessible to people who use assistive technology, or have navigational challenges due to physical or intellectual disabilities. Rogers diffusion of innovation was used as the contextual…

  2. Identity and Access Management: Technological Implementation of Policy

    ERIC Educational Resources Information Center

    von Munkwitz-Smith, Jeff; West, Ann

    2004-01-01

    Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…

  3. Study of optoelectronic switch for satellite-switched time-division multiple access

    NASA Technical Reports Server (NTRS)

    Su, Shing-Fong; Jou, Liz; Lenart, Joe

    1987-01-01

    The use of optoelectronic switching for satellite switched time division multiple access will improve the isolation and reduce the crosstalk of an IF switch matrix. The results are presented of a study on optoelectronic switching. Tasks include literature search, system requirements study, candidate switching architecture analysis, and switch model optimization. The results show that the power divided and crossbar switching architectures are good candidates for an IF switch matrix.

  4. MCNP6 Fission Multiplicity with FMULT Card

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilcox, Trevor; Fensin, Michael Lorne; Hendricks, John S.

    With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

  5. Maritime Analytics Prototype: Final Development Report

    DTIC Science & Technology

    2014-04-01

    access management platform OpenAM , support for multiple instances of the same type of widget and support for installation specific configuration files to...et de la gestion de l’accès OpenAM , le support pour plusieurs instances du même type de widget et le support des fichiers d’installation de...open source authentication and access management platform OpenAM , support for multiple instances of the same type of widget and support for

  6. Coherent direct sequence optical code multiple access encoding-decoding efficiency versus wavelength detuning.

    PubMed

    Pastor, D; Amaya, W; García-Olcina, R; Sales, S

    2007-07-01

    We present a simple theoretical model of and the experimental verification for vanishing of the autocorrelation peak due to wavelength detuning on the coding-decoding process of coherent direct sequence optical code multiple access systems based on a superstructured fiber Bragg grating. Moreover, the detuning vanishing effect has been explored to take advantage of this effect and to provide an additional degree of multiplexing and/or optical code tuning.

  7. On the performance of a code division multiple access scheme with transmit/receive conflicts

    NASA Astrophysics Data System (ADS)

    Silvester, J. A.

    One of the benefits of spread spectrum is that by assigning each user a different orthogonal signal set, multiple transmissions can occur simultaneously. This possibility is utilized in new access schemes called Code Division Multiple Access (CDMA). The present investigation is concerned with a particular CDMA implementation in which the transmit times for each symbol are exactly determined in a distributed manner such that both sender and receiver know them. In connection with a decision whether to transmit or receive, the loss of a symbol in one of the channels results. The system employs thus a coding technique which permits correct decoding of a codeword even if some constituent symbols are missing or in error. The technique used is Reed Solomon coding. The performance of this system is analyzed, and attention is given to the optimum strategy which should be used in deciding whether to receive or transmit.

  8. Heuristic query optimization for query multiple table and multiple clausa on mobile finance application

    NASA Astrophysics Data System (ADS)

    Indrayana, I. N. E.; P, N. M. Wirasyanti D.; Sudiartha, I. KG

    2018-01-01

    Mobile application allow many users to access data from the application without being limited to space, space and time. Over time the data population of this application will increase. Data access time will cause problems if the data record has reached tens of thousands to millions of records.The objective of this research is to maintain the performance of data execution for large data records. One effort to maintain data access time performance is to apply query optimization method. The optimization used in this research is query heuristic optimization method. The built application is a mobile-based financial application using MySQL database with stored procedure therein. This application is used by more than one business entity in one database, thus enabling rapid data growth. In this stored procedure there is an optimized query using heuristic method. Query optimization is performed on a “Select” query that involves more than one table with multiple clausa. Evaluation is done by calculating the average access time using optimized and unoptimized queries. Access time calculation is also performed on the increase of population data in the database. The evaluation results shown the time of data execution with query heuristic optimization relatively faster than data execution time without using query optimization.

  9. Information Switching Processor (ISP) contention analysis and control

    NASA Technical Reports Server (NTRS)

    Shyy, D.; Inukai, T.

    1993-01-01

    Future satellite communications, as a viable means of communications and an alternative to terrestrial networks, demand flexibility and low end-user cost. On-board switching/processing satellites potentially provide these features, allowing flexible interconnection among multiple spot beams, direct to the user communications services using very small aperture terminals (VSAT's), independent uplink and downlink access/transmission system designs optimized to user's traffic requirements, efficient TDM downlink transmission, and better link performance. A flexible switching system on the satellite in conjunction with low-cost user terminals will likely benefit future satellite network users.

  10. Multi-carrier mobile TDMA system with active array antenna

    NASA Technical Reports Server (NTRS)

    Suzuki, Ryutaro; Matsumoto, Yasushi; Hamamoto, Naokazu

    1990-01-01

    A multi-carrier time division multiple access (TDMA) is proposed for the future mobile satellite communications systems that include a multi-satellite system. This TDMA system employs the active array antenna in which the digital beam forming technique is adopted to control the antenna beam direction. The antenna beam forming is carried out at the base band frequency by using the digital signal processing technique. The time division duplex technique is applied for the TDM/TDMA burst format, in order not to overlap transmit and receive timing.

  11. Standardised Embedded Data framework for Drones [SEDD

    NASA Astrophysics Data System (ADS)

    Wyngaard, J.; Barbieri, L.; Peterson, F. S.

    2015-12-01

    A number of barriers to entry remain for UAS use in science. One in particular is that of implementing an experiment and UAS specific software stack. Currently this stack is most often developed in-house and customised for a particular UAS-sensor pairing - limiting its reuse. Alternatively, when adaptable a suitable commercial package may be used, but such systems are both costly and usually suboptimal.In order to address this challenge the Standardised Embedded Data framework for Drones [SEDD] is being developed in μpython. SEDD provides an open source, reusable, and scientist-accessible drop in solution for drone data capture and triage. Targeted at embedded hardware, and offering easy access to standard I/O interfaces, SEDD provides an easy solution for simply capturing data from a sensor. However, the intention is rather to enable more complex systems of multiple sensors, computer hardware, and feedback loops, via 3 primary components.A data asset manager ensures data assets are associated with appropriate metadata as they are captured. Thereafter, the asset is easily archived or otherwise redirected, possibly to - onboard storage, onboard compute resource for processing, an interface for transmission, another sensor control system, remote storage and processing (such as EarthCube's CHORDS), or to any combination of the above.A service workflow managerenables easy implementation of complex onboard systems via dedicated control of multiple continuous and periodic services. Such services will include the housekeeping chores of operating a UAS and multiple sensors, but will also permit a scientist to drop in an initial scientific data processing code utilising on-board compute resources beyond the autopilot. Having such capabilities firstly enables easy creation of real-time feedback, to the human- or auto- pilot, or other sensors, on data quality or needed flight path changes. Secondly, compute hardware provides the opportunity to carry out real-time data triage, for the purposes of conserving on-board storage space or transmission bandwidth in inherently poor connectivity environments.A compute manager is finally included. Depending on system complexity, and given the need for power efficient parallelism, it can quickly become necessary to provide a scheduling service for multiple workflows.

  12. Stabilized single-injection inactivated polio vaccine elicits a strong neutralizing immune response.

    PubMed

    Tzeng, Stephany Y; McHugh, Kevin J; Behrens, Adam M; Rose, Sviatlana; Sugarman, James L; Ferber, Shiran; Langer, Robert; Jaklenec, Ana

    2018-05-21

    Vaccination in the developing world is hampered by limited patient access, which prevents individuals from receiving the multiple injections necessary for protective immunity. Here, we developed an injectable microparticle formulation of the inactivated polio vaccine (IPV) that releases multiple pulses of stable antigen over time. To accomplish this, we established an IPV stabilization strategy using cationic polymers for pH modulation to enhance traditional small-molecule-based stabilization methods. We investigated the mechanism of this strategy and showed that it was broadly applicable to all three antigens in IPV. Our lead formulations released two bursts of IPV 1 month apart, mimicking a typical vaccination schedule in the developing world. One injection of the controlled-release formulations elicited a similar or better neutralizing response in rats, considered the correlate of protection in humans, than multiple injections of liquid vaccine. This single-administration vaccine strategy has the potential to improve vaccine coverage in the developing world. Copyright © 2018 the Author(s). Published by PNAS.

  13. Stabilized single-injection inactivated polio vaccine elicits a strong neutralizing immune response

    PubMed Central

    Tzeng, Stephany Y.; McHugh, Kevin J.; Behrens, Adam M.; Rose, Sviatlana; Sugarman, James L.; Ferber, Shiran; Jaklenec, Ana

    2018-01-01

    Vaccination in the developing world is hampered by limited patient access, which prevents individuals from receiving the multiple injections necessary for protective immunity. Here, we developed an injectable microparticle formulation of the inactivated polio vaccine (IPV) that releases multiple pulses of stable antigen over time. To accomplish this, we established an IPV stabilization strategy using cationic polymers for pH modulation to enhance traditional small-molecule–based stabilization methods. We investigated the mechanism of this strategy and showed that it was broadly applicable to all three antigens in IPV. Our lead formulations released two bursts of IPV 1 month apart, mimicking a typical vaccination schedule in the developing world. One injection of the controlled-release formulations elicited a similar or better neutralizing response in rats, considered the correlate of protection in humans, than multiple injections of liquid vaccine. This single-administration vaccine strategy has the potential to improve vaccine coverage in the developing world. PMID:29784798

  14. Architecture for distributed actuation and sensing using smart piezoelectric elements

    NASA Astrophysics Data System (ADS)

    Etienne-Cummings, Ralph; Pourboghrat, Farzad; Maruboyina, Hari K.; Abrate, Serge; Dhali, Shirshak K.

    1998-07-01

    We discuss vibration control of a cantilevered plate with multiple sensors and actuators. An architecture is chosen to minimize the number of control and sensing wires required. A custom VLSI chip, integrated with the sensor/actuator elements, controls the local behavior of the plate. All the actuators are addressed in parallel; local decode logic selects which actuator is stimulated. Downloaded binary data controls the applied voltage and modulation frequency for each actuator, and High Voltage MOSFETs are used to activate them. The sensors, which are independent adjacent piezoelectric ceramic elements, can be accessed in a random or sequential manner. An A/D card and GPIB interconnected test equipment allow a PC to read the sensors' outputs and dictate the actuation procedure. A visual programming environment is used to integrate the sensors, controller and actuators. Based on the constitutive relations for the piezoelectric material, simple models for the sensors and actuators are derived. A two level hierarchical robust controller is derived for motion control and for damping of vibrations.

  15. Fourth Annual International Acquisitions Workshop: Access to Multiple Media Worldwide

    NASA Technical Reports Server (NTRS)

    1994-01-01

    Topics discussed during the workshop include: (1) Multinational-Multiple media collections and activities spanning many countries; (2) Multiple media in North American trade and commerce; (3) African spotlight; (4) Europe-Multiple media in national libraries and services; (5) Scandinavian spotlight; (6) Internet update; (7) Multiple media in US federal agencies; (8) Open-source multiple media in US federal agencies; and (9) Multiple media at US federal technical agencies-NIST and NOAA.

  16. [Health threats and health system crises. An approach to early warning and response. 2008 SESPAS Report].

    PubMed

    Simón Soria, Fernando; Guillén Enríquez, Francisco Javier

    2008-04-01

    The world is changing more and faster than ever before. New diseases are coming to light each year, controlled diseases are reemerging as potential threats, and natural or man-made disasters are increasingly affecting human health. The "International Health Regulations (2005)" reflect the changes in the response of public health to this new situation. Surveillance of specific diseases and predefined control measures have been replaced by surveillance of public health events of international concern and control measures adapted to each situation. The public health events of international interest are characterized by their seriousness, predictability, the risk of international spread and potential for travel or trade restrictions. The development of the European Early Warning and Response System in 1998 and the creation of the European Center for Disease Prevention and Control in 2005 demonstrate political commitment in Europe, with early detection of and response to public health threats. However, timely risk evaluation and response at a national level requires improved data digitalization and accessibility, automatic notification processes, data analysis and dissemination of information, the combination of information from multiple sources and adaptation of public health services. The autonomous regions in Spain are initiating this adaptation process, but interoperability between systems and the development of guidelines for a coordinated response should be steered by the National Interregional Health Council and coordinated by the Ministry of Health. Efficient early warning systems of health threats that allow for a timely response and reduce uncertainty about information would help to minimize the risk of public health crises. The profile of public health threats is nonspecific. Early detection of threats requires access to information from multiple sources and efficient risk assessment. Key factors for improving the response to public health threats are the development of surveillance methods and operational research in public health.

  17. Evaluation of Renal Function after Percutaneous Nephrolithotomy-Does the Number of Percutaneous Access Tracts Matter?

    PubMed

    Gorbachinsky, Ilya; Wood, Kyle; Colaco, Marc; Hemal, Sij; Mettu, Jayadev; Mirzazadeh, Majid; Assimos, Dean G; Gutierrez-Aćeves, Jorge

    2016-07-01

    Renal function following percutaneous nephrolithotomy has long been a concern to urologists, especially in the setting of multi-tract access. We determined whether the risk of renal injury after multi-tract percutaneous nephrolithotomy was greater than after a single access approach. We retrospectively reviewed the records of 307 consecutive patients treated with percutaneous nephrolithotomy from 2011 to 2012 at Wake Forest Health. Perioperative (99m)Tc-mercaptoacetyltriglycine nuclear renogram parameters along with serum creatinine values were assessed within 1 year of the procedure. Patients were stratified by single access vs multi-access (2 or more). We identified 110 cases in which renography was done before and after percutaneous nephrolithotomy. A total of 74 patients (67.3%) underwent single access percutaneous nephrolithotomy while 36 (32.7%) underwent multi-access percutaneous nephrolithotomy. Serum creatinine did not significantly differ between the 2 cohorts postoperatively (p = 0.09). There was a significant 2.28% decrease in renal function based on mercaptoacetyltriglycine nuclear renogram results after percutaneous nephrolithotomy of the affected kidney in patients with multiple accesses (p <0.01). This relationship was not observed when patients were stratified by multiple comorbidities associated with nephrolithiasis. Multi-access percutaneous nephrolithotomy is associated with a small reduction in the function of the targeted kidney compared to a single access approach. Copyright © 2016 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  18. SMC Message Browser Projects

    NASA Technical Reports Server (NTRS)

    Wichmann, Benjamin C.

    2013-01-01

    I work directly with the System Monitoring and Control (SMC) software engineers who develop, test and release custom and commercial software in support of the Kennedy Space Center Spaceport Command and Control System. (SCCS). SMC uses Commercial Off-The-Shelf (COTS) Enterprise Management Systems (EMS) software which provides a centralized subsystem for configuring, monitoring, and controlling SCCS hardware and software used in the Control Rooms. There are multiple projects being worked on using the COTS EMS software. I am currently working with the HP Operations Manager for UNIX (OMU) software which allows Master Console Operators (MCO) to access, view and interpret messages regarding the status of the SCCS hardware and software. The OMU message browser gets cluttered with messages which can make it difficult for the MCO to manage. My main project involves determining ways to reduce the number of messages being displayed in the OMU message browser. I plan to accomplish this task in two different ways: (1) by correlating multiple messages into one single message being displayed and (2) to create policies that will determine the significance of each message and whether or not it needs to be displayed to the MCO. The core idea is to lessen the number of messages being sent to the OMU message browser so the MCO can more effectively use it.

  19. Community Digital Library Requirements for the Southern California Earthquake Center Community Modeling Environment (SCEC/CME)

    NASA Astrophysics Data System (ADS)

    Moore, R.; Faerman, M.; Minster, J.; Day, S. M.; Ely, G.

    2003-12-01

    A community digital library provides support for ingestion, organization, description, preservation, and access of digital entities. The technologies that traditionally provide these capabilities are digital libraries (ingestion, organization, description), persistent archives (preservation) and data grids (access). We present a design for the SCEC community digital library that incorporates aspects of all three systems. Multiple groups have created integrated environments that sustain large-scale scientific data collections. By examining these projects, the following stages of implementation can be identified: \\begin{itemize} Definition of semantic terms to associate with relevant information. This includes definition of uniform content descriptors to describe physical quantities relevant to the scientific discipline, and creation of concept spaces to define how the uniform content descriptors are logically related. Organization of digital entities into logical collections that make it simple to browse and manage related material. Definition of services that are used to access and manipulate material in the collection. Creation of a preservation environment for the long-term management of the collection. Each community is faced with heterogeneity that is introduced when data is distributed across multiple sites, or when multiple sets of collection semantics are used, and or when multiple scientific sub-disciplines are federated. We will present the relevant standards that simplify the implementation of the SCEC community library, the resource requirements for different types of data sets that drive the implementation, and the digital library processes that the SCEC community library will support. The SCEC community library can be viewed as the set of processing steps that are required to build the appropriate SCEC reference data sets (SCEC approved encoding format, SCEC approved descriptive metadata, SCEC approved collection organization, and SCEC managed storage location). Each digital entity that is ingested into the SCEC community library is processed and validated for conformance to SCEC standards. These steps generate provenance, descriptive, administrative, structural, and behavioral metadata. Using data grid technology, the descriptive metadata can be registered onto a logical name space that is controlled and managed by the SCEC digital library. A version of the SCEC community digital library is being implemented in the Storage Resource Broker. The SRB system provides almost all the features enumerated above. The peer-to-peer federation of metadata catalogs is planned for release in September, 2003. The SRB system is in production use in multiple projects, from high-energy physics, to astronomy, to earth systems science, to bio-informatics. The SCEC community library will be based on the definition of standard metadata attributes, the creation of logical collections within the SRB, the creation of access services, and the demonstration of a preservation environment. The use of the SRB for the SCEC digital library will sustain the expected collection size and collection capabilities.

  20. Accessing and visualizing scientific spatiotemporal data

    NASA Technical Reports Server (NTRS)

    Katz, Daniel S.; Bergou, Attila; Berriman, G. Bruce; Block, Gary L.; Collier, Jim; Curkendall, David W.; Good, John; Husman, Laura; Jacob, Joseph C.; Laity, Anastasia; hide

    2004-01-01

    This paper discusses work done by JPL's Parallel Applications Technologies Group in helping scientists access and visualize very large data sets through the use of multiple computing resources, such as parallel supercomputers, clusters, and grids.

  1. Combining data from multiple sources using the CUAHSI Hydrologic Information System

    NASA Astrophysics Data System (ADS)

    Tarboton, D. G.; Ames, D. P.; Horsburgh, J. S.; Goodall, J. L.

    2012-12-01

    The Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) has developed a Hydrologic Information System (HIS) to provide better access to data by enabling the publication, cataloging, discovery, retrieval, and analysis of hydrologic data using web services. The CUAHSI HIS is an Internet based system comprised of hydrologic databases and servers connected through web services as well as software for data publication, discovery and access. The HIS metadata catalog lists close to 100 web services registered to provide data through this system, ranging from large federal agency data sets to experimental watersheds managed by University investigators. The system's flexibility in storing and enabling public access to similarly formatted data and metadata has created a community data resource from governmental and academic data that might otherwise remain private or analyzed only in isolation. Comprehensive understanding of hydrology requires integration of this information from multiple sources. HydroDesktop is the client application developed as part of HIS to support data discovery and access through this system. HydroDesktop is founded on an open source GIS client and has a plug-in architecture that has enabled the integration of modeling and analysis capability with the functionality for data discovery and access. Model integration is possible through a plug-in built on the OpenMI standard and data visualization and analysis is supported by an R plug-in. This presentation will demonstrate HydroDesktop, showing how it provides an analysis environment within which data from multiple sources can be discovered, accessed and integrated.

  2. Latin American algorithm for treatment of relapsing-remitting multiple sclerosis using disease-modifying agents.

    PubMed

    Finkelsztejn, Alessandro; Gabbai, Alberto Alain; Fragoso, Yara Dadalti; Carrá, Adriana; Macías-Islas, Miguel Angel; Arcega-Revilla, Raul; García-Bonitto, Juan; Oehninger-Gatti, Carlos Luis; Orozco-Escobar, Geraldine; Tarulla, Adriana; Vergara, Fernando; Vizcarra, Darwin

    2012-10-01

    It is estimated that circa 50,000 individuals have relapsing-remitting multiple sclerosis in Latin America. European and North-American algorithms for the treatment of multiple sclerosis do not foresee our regional difficulties and the access of patients to treatment. The Latin American Multiple Sclerosis Forum is an independent and supra-institutional group of experts that has assessed the latest scientific evidence regarding efficacy and safety of disease-modifying treatments. Accesses to treatment and pharmacovigilance programs for each of the eight countries represented at the Forum were also analyzed. A specific set of guidelines based upon evidence-based recommendations was designed for Latin America. Future perspectives of multiple sclerosis treatment were also discussed. The present paper translated an effort from representatives of eight countries discussing a matter that cannot be adapted to our region directly from purely European and North-American guidelines for treatment.

  3. Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories

    ERIC Educational Resources Information Center

    Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher

    2009-01-01

    Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…

  4. The introduction and evaluation of mobile devices to improve access to patient records: a catalyst for innovation and collaboration at BCCA.

    PubMed

    Wu, Jonn; Waldron, John; Hood, Shaina; Kahnamelli, Adam; Khan, Mohamed; Barnett, Jeff; French, John; Slager, Stacey; Melhem, Shadi; Shabestari, Omid

    2013-01-01

    Prompt and efficient access to patient records is vital in providing optimal patient care. The Cancer Agency Information System (CAIS) is the primary patient record repository for the British Columbia Cancer Agency (BCCA) but is only accessible on traditional computer workstations. The BCCA clinics have significant space limitations resulting in multiple health care professionals sharing each workstation. Furthermore, workstations are not available in examination rooms. A novel and cost efficient solution is necessary to improve clinician access to CAIS. This prompted the BCCA and IMITS to embark on an innovative provincial collaboration to introduce and evaluate the impact of a mobile device to improve access to CAIS. The project consisted of 2 phases with over 50 participants from multiple clinical disciplines across BCCA sites. Phase I evaluated the adoptability, effectiveness and costs associated with providing access to CAIS using a generic viewer (Citrix). Phase II incorporated the feedback and findings from Phase I to make available a customized mobile device-specific application. Phase II also addressed privacy and security requirements.

  5. Advance reservation access control using software-defined networking and tokens

    DOE PAGES

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; ...

    2017-03-09

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less

  6. Advance reservation access control using software-defined networking and tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less

  7. Advance reservation access control using software-defined networking and tokens

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We usemore » SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.« less

  8. A universal data access and protocol integration mechanism for smart home

    NASA Astrophysics Data System (ADS)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  9. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  10. Water insecurity in 3 dimensions: An anthropological perspective on water and women's psychosocial distress in Ethiopia

    PubMed Central

    Stevenson, Edward G. J.; Greene, Leslie E.; Maes, Kenneth C.; Ambelu, Argaw; Tesfaye, Yihenew Alemu; Rheingans, Richard; Hadley, Craig

    2012-01-01

    Water insecurity is a primary underlying determinant of global health disparities. While public health research on water insecurity has focused mainly on two dimensions, water access and adequacy, an anthropological perspective highlights the cultural or lifestyle dimension of water insecurity, and its implications for access / adequacy and for the phenomenology of water insecurity. Recent work in Bolivia has shown that scores on a water insecurity scale derived from ethnographic observations are associated with emotional distress. We extend this line of research by assessing the utility of a locally developed water insecurity scale, compared with standard measures of water access and adequacy, in predicting women's psychosocial distress in Ethiopia. In 2009-2010 we conducted two phases of research. Phase I was mainly qualitative and designed to identify locally relevant experiences of water insecurity, and Phase II used a quantitative survey to test the association between women's reported water insecurity and the Falk Self-Reporting Questionnaire (SRQ-F), a measure of psychosocial distress. In multiple regression models controlling for food insecurity and reported quantity of water used, women's water insecurity scores were significantly associated with psychosocial distress. Including controls for time required to collect water and whether water sources were protected did not further predict psychosocial distress. This approach highlights the social dimension of water insecurity, and may be useful for informing and evaluating interventions to improve water supplies. PMID:22575697

  11. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  12. The Genetic Basis of Upland/Lowland Ecotype Divergence in Switchgrass (Panicum virgatum)

    PubMed Central

    Milano, Elizabeth R.; Lowry, David B.; Juenger, Thomas E.

    2016-01-01

    The evolution of locally adapted ecotypes is a common phenomenon that generates diversity within plant species. However, we know surprisingly little about the genetic mechanisms underlying the locally adapted traits involved in ecotype formation. The genetic architecture underlying locally adapted traits dictates how an organism will respond to environmental selection pressures, and has major implications for evolutionary ecology, conservation, and crop breeding. To understand the genetic architecture underlying the divergence of switchgrass (Panicum virgatum) ecotypes, we constructed a genetic mapping population through a four-way outbred cross between two northern upland and two southern lowland accessions. Trait segregation in this mapping population was largely consistent with multiple independent loci controlling the suite of traits that characterizes ecotype divergence. We assembled a joint linkage map using ddRADseq, and mapped quantitative trait loci (QTL) for traits that are divergent between ecotypes, including flowering time, plant size, physiological processes, and disease resistance. Overall, we found that most QTL had small to intermediate effects. While we identified colocalizing QTL for multiple traits, we did not find any large-effect QTL that clearly controlled multiple traits through pleiotropy or tight physical linkage. These results indicate that ecologically important traits in switchgrass have a complex genetic basis, and that similar loci may underlie divergence across the geographic range of the ecotypes. PMID:27613751

  13. An Adaptive Memory Interface Controller for Improving Bandwidth Utilization of Hybrid and Reconfigurable Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Castellana, Vito G.; Tumeo, Antonino; Ferrandi, Fabrizio

    Emerging applications such as data mining, bioinformatics, knowledge discovery, social network analysis are irregular. They use data structures based on pointers or linked lists, such as graphs, unbalanced trees or unstructures grids, which generates unpredictable memory accesses. These data structures usually are large, but difficult to partition. These applications mostly are memory bandwidth bounded and have high synchronization intensity. However, they also have large amounts of inherent dynamic parallelism, because they potentially perform a task for each one of the element they are exploring. Several efforts are looking at accelerating these applications on hybrid architectures, which integrate general purpose processorsmore » with reconfigurable devices. Some solutions, which demonstrated significant speedups, include custom-hand tuned accelerators or even full processor architectures on the reconfigurable logic. In this paper we present an approach for the automatic synthesis of accelerators from C, targeted at irregular applications. In contrast to typical High Level Synthesis paradigms, which construct a centralized Finite State Machine, our approach generates dynamically scheduled hardware components. While parallelism exploitation in typical HLS-generated accelerators is usually bound within a single execution flow, our solution allows concurrently running multiple execution flow, thus also exploiting the coarser grain task parallelism of irregular applications. Our approach supports multiple, multi-ported and distributed memories, and atomic memory operations. Its main objective is parallelizing as many memory operations as possible, independently from their execution time, to maximize the memory bandwidth utilization. This significantly differs from current HLS flows, which usually consider a single memory port and require precise scheduling of memory operations. A key innovation of our approach is the generation of a memory interface controller, which dynamically maps concurrent memory accesses to multiple ports. We present a case study on a typical irregular kernel, Graph Breadth First search (BFS), exploring different tradeoffs in terms of parallelism and number of memories.« less

  14. Research on a Queue Scheduling Algorithm in Wireless Communications Network

    NASA Astrophysics Data System (ADS)

    Yang, Wenchuan; Hu, Yuanmei; Zhou, Qiancai

    This paper proposes a protocol QS-CT, Queue Scheduling Mechanism based on Multiple Access in Ad hoc net work, which adds queue scheduling mechanism to RTS-CTS-DATA using multiple access protocol. By endowing different queues different scheduling mechanisms, it makes networks access to the channel much more fairly and effectively, and greatly enhances the performance. In order to observe the final performance of the network with QS-CT protocol, we simulate it and compare it with MACA/C-T without QS-CT protocol. Contrast to MACA/C-T, the simulation result shows that QS-CT has greatly improved the throughput, delay, rate of packets' loss and other key indicators.

  15. Apollo: Giving application developers a single point of access to public health models using structured vocabularies and Web services

    PubMed Central

    Wagner, Michael M.; Levander, John D.; Brown, Shawn; Hogan, William R.; Millett, Nicholas; Hanna, Josh

    2013-01-01

    This paper describes the Apollo Web Services and Apollo-SV, its related ontology. The Apollo Web Services give an end-user application a single point of access to multiple epidemic simulators. An end user can specify an analytic problem—which we define as a configuration and a query of results—exactly once and submit it to multiple epidemic simulators. The end user represents the analytic problem using a standard syntax and vocabulary, not the native languages of the simulators. We have demonstrated the feasibility of this design by implementing a set of Apollo services that provide access to two epidemic simulators and two visualizer services. PMID:24551417

  16. Apollo: giving application developers a single point of access to public health models using structured vocabularies and Web services.

    PubMed

    Wagner, Michael M; Levander, John D; Brown, Shawn; Hogan, William R; Millett, Nicholas; Hanna, Josh

    2013-01-01

    This paper describes the Apollo Web Services and Apollo-SV, its related ontology. The Apollo Web Services give an end-user application a single point of access to multiple epidemic simulators. An end user can specify an analytic problem-which we define as a configuration and a query of results-exactly once and submit it to multiple epidemic simulators. The end user represents the analytic problem using a standard syntax and vocabulary, not the native languages of the simulators. We have demonstrated the feasibility of this design by implementing a set of Apollo services that provide access to two epidemic simulators and two visualizer services.

  17. Web service activities at the IRIS DMC to support federated and multidisciplinary access

    NASA Astrophysics Data System (ADS)

    Trabant, Chad; Ahern, Timothy K.

    2013-04-01

    At the IRIS Data Management Center (DMC) we have developed a suite of web service interfaces to access our large archive of, primarily seismological, time series data and related metadata. The goals of these web services include providing: a) next-generation and easily used access interfaces for our current users, b) access to data holdings in a form usable for non-seismologists, c) programmatic access to facilitate integration into data processing workflows and d) a foundation for participation in federated data discovery and access systems. To support our current users, our services provide access to the raw time series data and metadata or conversions of the raw data to commonly used formats. Our services also support simple, on-the-fly signal processing options that are common first steps in many workflows. Additionally, high-level data products derived from raw data are available via service interfaces. To support data access by researchers unfamiliar with seismic data we offer conversion of the data to broadly usable formats (e.g. ASCII text) and data processing to convert the data to Earth units. By their very nature, web services are programmatic interfaces. Combined with ubiquitous support for web technologies in programming & scripting languages and support in many computing environments, web services are very well suited for integrating data access into data processing workflows. As programmatic interfaces that can return data in both discipline-specific and broadly usable formats, our services are also well suited for participation in federated and brokered systems either specific to seismology or multidisciplinary. Working within the International Federation of Digital Seismograph Networks, the DMC collaborated on the specification of standardized web service interfaces for use at any seismological data center. These data access interfaces, when supported by multiple data centers, will form a foundation on which to build discovery and access mechanisms for data sets spanning multiple centers. To promote the adoption of these standardized services the DMC has developed portable implementations of the software needed to host these interfaces, minimizing the work required at each data center. Within the COOPEUS project framework, the DMC is working with EU partners to install web services implementations at multiple data centers in Europe.

  18. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  19. Network accessibility & the evoluation of urban employment.

    DOT National Transportation Integrated Search

    2011-06-01

    This research examines the impact of accessibility on the growth of employment centers in the : Los Angeles Region between 1980 and 2000. There is extensive empirical documentation of : polycentricity the presence of multiple concentrations of em...

  20. Integrated Laser Characterization, Data Acquisition, and Command and Control Test System

    NASA Technical Reports Server (NTRS)

    Stysley, Paul; Coyle, Barry; Lyness, Eric

    2012-01-01

    Satellite-based laser technology has been developed for topographical measurements of the Earth and of other planets. Lasers for such missions must be highly efficient and stable over long periods in the temperature variations of orbit. In this innovation, LabVIEW is used on an Apple Macintosh to acquire and analyze images of the laser beam as it exits the laser cavity to evaluate the laser s performance over time, and to monitor and control the environmental conditions under which the laser is tested. One computer attached to multiple cameras and instruments running LabVIEW-based software replaces a conglomeration of computers and software packages, saving hours in maintenance and data analysis, and making very longterm tests possible. This all-in-one system was written primarily using LabVIEW for Mac OS X, which allows the combining of data from multiple RS-232, USB, and Ethernet instruments for comprehensive laser analysis and control. The system acquires data from CCDs (charge coupled devices), power meters, thermistors, and oscilloscopes over a controllable period of time. This data is saved to an html file that can be accessed later from a variety of data analysis programs. Also, through the LabVIEW interface, engineers can easily control laser input parameters such as current, pulse width, chiller temperature, and repetition rates. All of these parameters can be adapted and cycled over a period of time.

  1. Family Characteristics and Children's Receipt of Autism Services in Low-Resourced Families.

    PubMed

    Karp, Elizabeth A; Dudovitz, Rebecca; Nelson, Bergen B; Shih, Wendy; Gulsrud, Amanda; Orlich, Felice; Colombi, Costanza; Kuo, Alice A

    2018-04-01

    Parents of children with autism spectrum disorder (ASD) face competing demands when caring for their child and fulfilling family commitments. It remains unknown whether family obligations and parental stress might decrease the use of intervention services for young children with ASD. The current study is a secondary analysis of baseline date from a published randomized control trial with 147 low-resourced caregiver-child dyads. Demographic information, data on service use, maternal employment, parent's perception of their child's development, and parental stress were collected for primary caregivers of 2- to 5-year-old children with ASD from 5 sites. Multiple logistic regressions of accessing any intervention services or more than 1 services on familial characteristics were performed, controlling for demographic and contextual variables. Twenty-five percent of children were receiving no intervention service; 26% were receiving 1 service; and 49% were receiving 2 or more services. Perceived developmental delay and not having a sibling in the home were associated with higher odds of receiving intervention services. Children were more likely to receive more than 1 service if their parents had at least a college education and low levels of stress. Factors including perceived developmental level, parental stress, and caring for siblings may play a role in accessing services for children with ASD. Results reveal that competing family needs may be barriers to service use. Mothers of children with ASD with multiple children in the home, low levels of education, and high levels of stress may need additional supports or alternative service delivery models. Copyright © 2018 by the American Academy of Pediatrics.

  2. Impact of MAC Delay on AUV Localization: Underwater Localization Based on Hyperbolic Frequency Modulation Signal

    PubMed Central

    2018-01-01

    Medium Access Control (MAC) delay which occurs between the anchor node’s transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater. PMID:29373518

  3. Impact of MAC Delay on AUV Localization: Underwater Localization Based on Hyperbolic Frequency Modulation Signal.

    PubMed

    Kim, Sungryul; Yoo, Younghwan

    2018-01-26

    Medium Access Control (MAC) delay which occurs between the anchor node's transmissions is one of the error sources in underwater localization. In particular, in AUV localization, the MAC delay significantly degrades the ranging accuracy. The Cramer-Rao Low Bound (CRLB) definition theoretically proves that the MAC delay significantly degrades the localization performance. This paper proposes underwater localization combined with multiple access technology to decouple the localization performance from the MAC delay. Towards this goal, we adopt hyperbolic frequency modulation (HFM) signal that provides multiplexing based on its good property, high-temporal correlation. Owing to the multiplexing ability of the HFM signal, the anchor nodes can transmit packets without MAC delay, i.e., simultaneous transmission is possible. In addition, the simulation results show that the simultaneous transmission is not an optional communication scheme, but essential for the localization of mobile object in underwater.

  4. The Arabidopsis thaliana mobilome and its impact at the species level.

    PubMed

    Quadrana, Leandro; Bortolini Silveira, Amanda; Mayhew, George F; LeBlanc, Chantal; Martienssen, Robert A; Jeddeloh, Jeffrey A; Colot, Vincent

    2016-06-03

    Transposable elements (TEs) are powerful motors of genome evolution yet a comprehensive assessment of recent transposition activity at the species level is lacking for most organisms. Here, using genome sequencing data for 211 Arabidopsis thaliana accessions taken from across the globe, we identify thousands of recent transposition events involving half of the 326 TE families annotated in this plant species. We further show that the composition and activity of the 'mobilome' vary extensively between accessions in relation to climate and genetic factors. Moreover, TEs insert equally throughout the genome and are rapidly purged by natural selection from gene-rich regions because they frequently affect genes, in multiple ways. Remarkably, loci controlling adaptive responses to the environment are the most frequent transposition targets observed. These findings demonstrate the pervasive, species-wide impact that a rich mobilome can have and the importance of transposition as a recurrent generator of large-effect alleles.

  5. Niche construction initiates the evolution of mutualistic interactions.

    PubMed

    Buser, Claudia C; Newcomb, Richard D; Gaskett, Anne C; Goddard, Matthew R

    2014-10-01

    Niche construction theory explains how organisms' niche modifications may feed back to affect their evolutionary trajectories. In theory, the evolution of other species accessing the same modified niche may also be affected. We propose that this niche construction may be a general mechanism driving the evolution of mutualisms. Drosophilid flies benefit from accessing yeast-infested fruits, but the consequences of this interaction for yeasts are unknown. We reveal high levels of variation among strains of Saccharomyces cerevisiae in their ability to modify fruits and attract Drosophila simulans. More attractive yeasts are dispersed more frequently, both in the lab and in the field, and flies associated with more attractive yeasts have higher fecundity. Although there may be multiple natural yeast and fly species interactions, our controlled assays in the lab and field provide evidence of a mutualistic interaction, facilitated by the yeast's niche modification. © 2014 John Wiley & Sons Ltd/CNRS.

  6. Resource allocation for error resilient video coding over AWGN using optimization approach.

    PubMed

    An, Cheolhong; Nguyen, Truong Q

    2008-12-01

    The number of slices for error resilient video coding is jointly optimized with 802.11a-like media access control and the physical layers with automatic repeat request and rate compatible punctured convolutional code over additive white gaussian noise channel as well as channel times allocation for time division multiple access. For error resilient video coding, the relation between the number of slices and coding efficiency is analyzed and formulated as a mathematical model. It is applied for the joint optimization problem, and the problem is solved by a convex optimization method such as the primal-dual decomposition method. We compare the performance of a video communication system which uses the optimal number of slices with one that codes a picture as one slice. From numerical examples, end-to-end distortion of utility functions can be significantly reduced with the optimal slices of a picture especially at low signal-to-noise ratio.

  7. Transforming cold chain performance and management in lower-income countries.

    PubMed

    Brison, Mike; LeTallec, Yann

    2017-04-19

    In many countries, one of the common factors limiting full and equitable access to effective immunization is the existence of gaps in cold chain and logistics (CCL) systems. This article focuses on the critical contribution that better management of CCL performance can make in addressing these barriers, as well as some essential practices needed to achieve and sustain these gains. These include (i) an emphasis on continuous improvement in CCL performance indicators, (ii) strong coordination and accountability across multiple stakeholders, and (iii) making the most of limited financial resources. This article is informed by the Clinton Health Access Initiative's (CHAI's) experience working with National Immunization Programs (NIPs) and immunization partners to improve the effectiveness and efficiency of CCL systems (including CCE deployment and maintenance, temperature monitoring and control, stock management and distribution) across ten Gavi-supported "focus" countries. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  8. The influence of financial incentives and racial status on the use of post-hospital care.

    PubMed

    Robertson, Madeline J; Broyles, Robert W; Khaliq, Amir

    2004-01-01

    This study examines the influence of financial incentives and the racial status of the patient on the use of extended care following an episode of hospitalization. Post-hospital care (PHC) is defined as the services provided by a skilled nursing facility (SNF) or intermediate care facility (ICF) following discharge. The focus of the analysis is on the use or nonuse of PHC, the presence or absence of a delay in transfer to an ICF or SNF and, limited to those who experienced a postponement, the length of the delayed discharge. After controlling for multiple factors, the results indicate that Medicare beneficiaries were more likely to use PHC, less likely to experience a delay in discharge, and used fewer days of prolonged care. Medicaid recipients and uninsured patients experienced reduced access to PHC. The results also indicated that the access of Native Americans and Americans to PHC was impeded.

  9. A Conceptual Design for a Reliable Optical Bus (ROBUS)

    NASA Technical Reports Server (NTRS)

    Miner, Paul S.; Malekpour, Mahyar; Torres, Wilfredo

    2002-01-01

    The Scalable Processor-Independent Design for Electromagnetic Resilience (SPIDER) is a new family of fault-tolerant architectures under development at NASA Langley Research Center (LaRC). The SPIDER is a general-purpose computational platform suitable for use in ultra-reliable embedded control applications. The design scales from a small configuration supporting a single aircraft function to a large distributed configuration capable of supporting several functions simultaneously. SPIDER consists of a collection of simplex processing elements communicating via a Reliable Optical Bus (ROBUS). The ROBUS is an ultra-reliable, time-division multiple access broadcast bus with strictly enforced write access (no babbling idiots) providing basic fault-tolerant services using formally verified fault-tolerance protocols including Interactive Consistency (Byzantine Agreement), Internal Clock Synchronization, and Distributed Diagnosis. The conceptual design of the ROBUS is presented in this paper including requirements, topology, protocols, and the block-level design. Verification activities, including the use of formal methods, are also discussed.

  10. The long underestimated carbonyl function of carbohydrates – an organocatalyzed shot into carbohydrate chemistry.

    PubMed

    Mahrwald, R

    2015-09-21

    The aggressive and strong development of organocatalysis provides several protocols for the convenient utilization of the carbonyl function of unprotected carbohydrates in C-C-bond formation processes. These amine-catalyzed mechanisms enable multiple cascade-protocols for the synthesis of a wide range of carbohydrate-derived compound classes. Several, only slightly different protocols, have been developed for the application of 1,3-dicarbonyl compounds in the stereoselective chain-elongation of unprotected carbohydrates and the synthesis of highly functionalized C-glycosides of defined configuration. In addition, C-glycosides can also be accessed by amine-catalyzed reactions with methyl ketones. By a one-pot cascade reaction of isocyanides with unprotected aldoses and amino acids access to defined configured glycopeptide mimetics is achieved. Depending on the reaction conditions different origins to control the installation of configuration during the bond-formation process were observed.

  11. Method and apparatus for controlling multiple motors

    DOEpatents

    Jones, Rollin G.; Kortegaard, Bert L.; Jones, David F.

    1987-01-01

    A method and apparatus are provided for simultaneously controlling a plurality of stepper motors. Addressing circuitry generates address data for each motor in a periodic address sequence. Memory circuits respond to the address data for each motor by accessing a corresponding memory location containing a first operational data set functionally related to a direction for moving the motor, speed data, and rate of speed change. First logic circuits respond to the first data set to generate a motor step command. Second logic circuits respond to the command from the first logic circuits to generate a third data set for replacing the first data set in memory with a current operational motor status, which becomes the first data set when the motor is next addressed.

  12. Research on an IP disaster recovery storage system

    NASA Astrophysics Data System (ADS)

    Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng

    2008-12-01

    According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.

  13. A physical layer perspective on access network sharing

    NASA Astrophysics Data System (ADS)

    Pfeiffer, Thomas

    2015-12-01

    Unlike in copper or wireless networks, there is no sharing of resources in fiber access networks yet, other than bit stream access or cable sharing, in which the fibers of a cable are let to one or multiple operators. Sharing optical resources on a single fiber among multiple operators or different services has not yet been applied. While this would allow for a better exploitation of installed infrastructures, there are operational issues which still need to be resolved, before this sharing model can be implemented in networks. Operating multiple optical systems and services over a common fiber plant, autonomously and independently from each other, can result in mutual distortions on the physical layer. These distortions will degrade the performance of the involved systems, unless precautions are taken in the infrastructure hardware to eliminate or to reduce them to an acceptable level. Moreover, the infrastructure needs to be designed such as to support different system technologies and to ensure a guaranteed quality of the end-to-end connections. In this paper, suitable means are proposed to be introduced in fiber access infrastructures that will allow for shared utilization of the fibers while safeguarding the operational needs and business interests of the involved parties.

  14. What versus where: Investigating how autobiographical memory retrieval differs when accessed with thematic versus spatial information.

    PubMed

    Sheldon, Signy; Chu, Sonja

    2017-09-01

    Autobiographical memory research has investigated how cueing distinct aspects of a past event can trigger different recollective experiences. This research has stimulated theories about how autobiographical knowledge is accessed and organized. Here, we test the idea that thematic information organizes multiple autobiographical events whereas spatial information organizes individual past episodes by investigating how retrieval guided by these two forms of information differs. We used a novel autobiographical fluency task in which participants accessed multiple memory exemplars to event theme and spatial (location) cues followed by a narrative description task in which they described the memories generated to these cues. Participants recalled significantly more memory exemplars to event theme than to spatial cues; however, spatial cues prompted faster access to past memories. Results from the narrative description task revealed that memories retrieved via event theme cues compared to spatial cues had a higher number of overall details, but those recalled to the spatial cues were recollected with a greater concentration on episodic details than those retrieved via event theme cues. These results provide evidence that thematic information organizes and integrates multiple memories whereas spatial information prompts the retrieval of specific episodic content from a past event.

  15. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grudka, Andrzej; National Quantum Information Centre of Gdansk, PL-81-824 Sopot; Horodecki, Pawel

    2010-06-15

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  16. Code division multiple access signaling for modulated reflector technology

    DOEpatents

    Briles, Scott D [Los Alamos, NM

    2012-05-01

    A method and apparatus for utilizing code division multiple access in modulated reflectance transmissions comprises the steps of generating a phase-modulated reflectance data bit stream; modifying the modulated reflectance data bit stream; providing the modified modulated reflectance data bit stream to a switch that connects an antenna to an infinite impedance in the event a "+1" is to be sent, or connects the antenna to ground in the event a "0" or a "-1" is to be sent.

  17. Regional and Temporal Variation in Methamphetamine-Related Incidents: Applications of Spatial and Temporal Scan Statistics

    PubMed Central

    Sudakin, Daniel L.

    2009-01-01

    Introduction This investigation utilized spatial scan statistics, geographic information systems and multiple data sources to assess spatial clustering of statewide methamphetamine-related incidents. Temporal and spatial associations with regulatory interventions to reduce access to precursor chemicals (pseudoephedrine) were also explored. Methods Four statewide data sources were utilized including regional poison control center statistics, fatality incidents, methamphetamine laboratory seizures, and hazardous substance releases involving methamphetamine laboratories. Spatial clustering of methamphetamine incidents was assessed using SaTScan™. SaTScan™ was also utilized to assess space-time clustering of methamphetamine laboratory incidents, in relation to the enactment of regulations to reduce access to pseudoephedrine. Results Five counties with a significantly higher relative risk of methamphetamine-related incidents were identified. The county identified as the most likely cluster had a significantly elevated relative risk of methamphetamine laboratories (RR=11.5), hazardous substance releases (RR=8.3), and fatalities relating to methamphetamine (RR=1.4). A significant increase in relative risk of methamphetamine laboratory incidents was apparent in this same geographic area (RR=20.7) during the time period when regulations were enacted in 2004 and 2005, restricting access to pseudoephedrine. Subsequent to the enactment of these regulations, a significantly lower rate of incidents (RR 0.111, p=0.0001) was observed over a large geographic area of the state, including regions that previously had significantly higher rates. Conclusions Spatial and temporal scan statistics can be effectively applied to multiple data sources to assess regional variation in methamphetamine-related incidents, and explore the impact of preventive regulatory interventions. PMID:19225949

  18. A narrowband CDMA communications payload for little LEOS applications

    NASA Astrophysics Data System (ADS)

    Michalik, H.; Hävecker, W.; Ginati, A.

    1996-09-01

    In recent years Code Division Multiple Access (CDMA) techniques have been investigated for application in Local Area Networks [J. A. Salehi, IEEE Trans. Commun. 37 (1989)]as well as in Mobile Communications [R. Kohno et al., IEEE Commun. Mag. Jan (1995)]. The main attraction of these techniques is due to potential higher throughput and capacity of such systems under certain conditions compared to conventional multi-access schemes like frequency and time division multiplexing. Mobile communication over a Satellite Link represents in some terms the "worst case" for operating a CDMA-system. Considering e.g. the uplink case from mobile to satellite, the imperfections due to different and time varying channel conditions will add to the well known effects of Multiple Access Interference (MAI) between the simultaneously active users at the satellite receiver. In addition, bandwidth constraints due to the non-availability of large bandwidth channels in the interesting frequency bands, exist for small systems. As a result, for a given service in terms of user data rates, the practical code sequence lengths are limited as well as the available number of codes within a code set. In this paper a communications payload for Small Satellite Applications with CDMA uplink and C/TDMA downlink under the constraint of bandwidth limitations is proposed. To optimise the performance under the above addressed imperfections the system provides ability for power control and synchronisation for the CDMA uplink. The major objectives of this project are studying, development and testing of such a system for educational purposes and technology development at Hochschule Bremen.

  19. Resource allocation and supervisory control architecture for intelligent behavior generation

    NASA Astrophysics Data System (ADS)

    Shah, Hitesh K.; Bahl, Vikas; Moore, Kevin L.; Flann, Nicholas S.; Martin, Jason

    2003-09-01

    In earlier research the Center for Self-Organizing and Intelligent Systems (CSOIS) at Utah State University (USU) was funded by the US Army Tank-Automotive and Armaments Command's (TACOM) Intelligent Mobility Program to develop and demonstrate enhanced mobility concepts for unmanned ground vehicles (UGVs). As part of our research, we presented the use of a grammar-based approach to enabling intelligent behaviors in autonomous robotic vehicles. With the growth of the number of available resources on the robot, the variety of the generated behaviors and the need for parallel execution of multiple behaviors to achieve reaction also grew. As continuation of our past efforts, in this paper, we discuss the parallel execution of behaviors and the management of utilized resources. In our approach, available resources are wrapped with a layer (termed services) that synchronizes and serializes access to the underlying resources. The controlling agents (called behavior generating agents) generate behaviors to be executed via these services. The agents are prioritized and then, based on their priority and the availability of requested services, the Control Supervisor decides on a winner for the grant of access to services. Though the architecture is applicable to a variety of autonomous vehicles, we discuss its application on T4, a mid-sized autonomous vehicle developed for security applications.

  20. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  1. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  2. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  3. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  4. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  5. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  6. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... Requirements for Irradiators § 36.23 Access control. (a) Each entrance to a radiation room at a panoramic... radiation room at a panoramic irradiator must have an independent backup access control to detect personnel...

  7. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  8. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  9. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  10. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  11. Above the cloud computing orbital services distributed data model

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2014-05-01

    Technology miniaturization and system architecture advancements have created an opportunity to significantly lower the cost of many types of space missions by sharing capabilities between multiple spacecraft. Historically, most spacecraft have been atomic entities that (aside from their communications with and tasking by ground controllers) operate in isolation. Several notable example exist; however, these are purpose-designed systems that collaborate to perform a single goal. The above the cloud computing (ATCC) concept aims to create ad-hoc collaboration between service provider and consumer craft. Consumer craft can procure processing, data transmission, storage, imaging and other capabilities from provider craft. Because of onboard storage limitations, communications link capability limitations and limited windows of communication, data relevant to or required for various operations may span multiple craft. This paper presents a model for the identification, storage and accessing of this data. This model includes appropriate identification features for this highly distributed environment. It also deals with business model constraints such as data ownership, retention and the rights of the storing craft to access, resell, transmit or discard the data in its possession. The model ensures data integrity and confidentiality (to the extent applicable to a given data item), deals with unique constraints of the orbital environment and tags data with business model (contractual) obligation data.

  12. 'The surface management system' (SuMS) database: a surface-based database to aid cortical surface reconstruction, visualization and analysis

    NASA Technical Reports Server (NTRS)

    Dickson, J.; Drury, H.; Van Essen, D. C.

    2001-01-01

    Surface reconstructions of the cerebral cortex are increasingly widely used in the analysis and visualization of cortical structure, function and connectivity. From a neuroinformatics perspective, dealing with surface-related data poses a number of challenges. These include the multiplicity of configurations in which surfaces are routinely viewed (e.g. inflated maps, spheres and flat maps), plus the diversity of experimental data that can be represented on any given surface. To address these challenges, we have developed a surface management system (SuMS) that allows automated storage and retrieval of complex surface-related datasets. SuMS provides a systematic framework for the classification, storage and retrieval of many types of surface-related data and associated volume data. Within this classification framework, it serves as a version-control system capable of handling large numbers of surface and volume datasets. With built-in database management system support, SuMS provides rapid search and retrieval capabilities across all the datasets, while also incorporating multiple security levels to regulate access. SuMS is implemented in Java and can be accessed via a Web interface (WebSuMS) or using downloaded client software. Thus, SuMS is well positioned to act as a multiplatform, multi-user 'surface request broker' for the neuroscience community.

  13. Can your software engineer program your PLC?

    NASA Astrophysics Data System (ADS)

    Borrowman, Alastair J.; Taylor, Philip

    2016-07-01

    The use of Programmable Logic Controllers (PLCs) in the control of large physics experiments is ubiquitous1, 2, 3. The programming of these controllers is normally the domain of engineers with a background in electronics, this paper introduces PLC program development from the software engineer's perspective. PLC programs provide the link between control software running on PC architecture systems and physical hardware controlled and monitored by digital and analog signals. The higher-level software running on the PC is typically responsible for accepting operator input and from this deciding when and how hardware connected to the PLC is controlled. The PLC accepts demands from the PC, considers the current state of its connected hardware and if correct to do so (based upon interlocks or other constraints) adjusts its hardware output signals appropriately for the PC's demands. A published ICD (Interface Control Document) defines the PLC memory locations available to be written and read by the PC to control and monitor the hardware. Historically the method of programming PLCs has been ladder diagrams that closely resemble circuit diagrams, however, PLC manufacturers nowadays also provide, and promote, the use of higher-level programming languages4. Based on techniques used in the development of high-level PC software to control PLCs for multiple telescopes, this paper examines the development of PLC programs to operate the hardware of a medical cyclotron beamline controlled from a PC using the Experimental Physics and Industrial Control System (EPICS), which is also widely used in telescope control5, 6, 7. The PLC used is the new generation Siemens S7-1200 programmed using Siemens Pascal based Structured Control Language (SCL), which is their implementation of Structured Text (ST). The approach described is that from a software engineer's perspective, utilising Siemens Totally Integrated Automation (TIA) Portal integrated development environment (IDE) to create modular PLC programs based upon reusable functions capable of being unit tested without the PLC connected to hardware. Emphasis has been placed on designing an interface between EPICS and SCL that enforces correct operation of hardware through stringent separation of PC accessible PLC memory and hardware I/O addresses used only by the PLC. The paper also introduces the method used to automate the creation, from the same source document, the PLC memory structure (tag) definitions (defining memory used to access hardware I/O and that accessed by the PC) and creation of the PC program data structures (EPICS database records) used to access the permitted PLC addresses. From direct experience this paper demonstrates the advantages of PLC program development being shared between electronic and software engineers, to enable use of the most appropriate processes from both the perspective of the hardware and the higher-level software used to control it.

  14. System Design and Cataloging Meet the User: User Interfaces to Online Public Access Catalogs.

    ERIC Educational Resources Information Center

    Yee, Martha M.

    1991-01-01

    Discusses features of online public access catalogs: (1) demonstration of relationships between records; (2) provision of entry vocabularies; (3) arrangement of multiple entries on the screen; (4) provision of access points; (5) display of single records; and (6) division of catalogs into separate files or indexes. User studies and other research…

  15. Action Research to Improve Methods of Delivery and Feedback in an Access Grid Room Environment

    ERIC Educational Resources Information Center

    McArthur, Lynne C.; Klass, Lara; Eberhard, Andrew; Stacey, Andrew

    2011-01-01

    This article describes a qualitative study which was undertaken to improve the delivery methods and feedback opportunity in honours mathematics lectures which are delivered through Access Grid Rooms. Access Grid Rooms are facilities that provide two-way video and audio interactivity across multiple sites, with the inclusion of smart boards. The…

  16. Impact of Patient-Centered Care Innovations on Access to Providers, Ambulatory Care Utilization, and Patient Clinical Indicators in the Veterans Health Administration.

    PubMed

    Burkhart, Lisa; Sohn, Min-Woong; Jordan, Neil; Tarlov, Elizabeth; Gampetro, Pamela; LaVela, Sherri L

    2016-01-01

    The Veterans Health Administration piloted patient-centered care (PCC) innovations beginning in 2010 to improve patient and provider experience and environment in ambulatory care. We use secondary data to look at longitudinal trends, evaluate system redesign, and identify areas for further quality improvement. This was a retrospective, observational study using existing secondary data from multiple US Department of Veteran Affairs sources to evaluate changes in veteran and facility outcomes associated with PCC innovations at 2 innovation and matched comparison sites between FY 2008-2010 (pre-PCC innovations) and FY 2011-2012 (post-PCC innovations). Outcomes included access to primary care providers (PCPs); primary, specialty, and emergency care use; and clinical indicators for chronic disease. Longitudinal trends revealed a different story at each site. One site demonstrated better PCP access, decrease in emergency and primary care use, increase in specialty care use, and improvement in diabetic glucose control. The other site demonstrated a decrease in PCP access and primary care use, no change in specialty care use, and an increase in diastolic blood pressure in relation to the comparison site. Secondary data analysis can reveal longitudinal trends associated with system changes, thereby informing program evaluation and identifying opportunities for quality improvement.

  17. Evolution of the Generic Lock System at Jefferson Lab

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brian Bevins; Yves Roblin

    2003-10-13

    The Generic Lock system is a software framework that allows highly flexible feedback control of large distributed systems. It allows system operators to implement new feedback loops between arbitrary process variables quickly and with no disturbance to the underlying control system. Several different types of feedback loops are provided and more are being added. This paper describes the further evolution of the system since it was first presented at ICALEPCS 2001 and reports on two years of successful use in accelerator operations. The framework has been enhanced in several key ways. Multiple-input, multiple-output (MIMO) lock types have been added formore » accelerator orbit and energy stabilization. The general purpose Proportional-Integral-Derivative (PID) locks can now be tuned automatically. The generic lock server now makes use of the Proxy IOC (PIOC) developed at Jefferson Lab to allow the locks to be monitored from any EPICS Channel Access aware client. (Previously clients had to be Cdev aware.) The dependency on the Qt XML parser has been replaced with the freely available Xerces DOM parser from the Apache project.« less

  18. [Fingolimod compassionate use program: case study on the concept of a therapy option for multiple sclerosis prior to marketing approval].

    PubMed

    Haas, J; Linker, R A; Hartung, H P; Meergans, M; Ortler, S; Tracik, F

    2012-12-01

    In order to meet the needs of therapy of multiple sclerosis (MS) new immune therapies with a user-friendly application and better effectiveness together with good tolerability are necessary. With respect to its potential to improve MS therapy, patients with a high medical need were given access to Fingolimod even before marketing approval. Therefore, a compassionate use program unique in the field of MS was initiated. In total 137 centers participated (75 % outpatient neurologists and 25 % hospitals). Within 19 weeks 135 patients were enrolled to receive Fingolimod. The patients in the compassionate use program can be representatively described as showing hardly controllable disease activity and progression with currently available, often poorly tolerated therapy. The compassionate use program for these patients offered better control of the disease with Fingolimod. The adverse events were as expected. The Fingolimod compassionate use program demonstrated the need for this new therapeutic option. Patients who were not yet sufficiently treated were provided with an effective therapy with a good safety profile and a user-friendly administration form.

  19. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    NASA Astrophysics Data System (ADS)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective integration with services and resources which they must protect. Effective policy and governance structures are needed for ongoing operations Federated identity infrastructures often exist only at the national level making it difficult for international research collaborations to exploit them.

  20. Improving Global Access to New Vaccines: Intellectual Property, Technology Transfer, and Regulatory Pathways

    PubMed Central

    2014-01-01

    The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers. PMID:25211753

  1. Improving global access to new vaccines: intellectual property, technology transfer, and regulatory pathways.

    PubMed

    Crager, Sara Eve

    2014-11-01

    The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.

  2. [Improving global access to new vaccines: intellectual property, technology transfer, and regulatory pathways].

    PubMed

    Crager, Sara Eve

    2015-01-01

    The 2012 World Health Assembly Global Vaccine Action Plan called for global access to new vaccines within 5 years of licensure. Current approaches have proven insufficient to achieve sustainable vaccine pricing within such a timeline. Paralleling the successful strategy of generic competition to bring down drug prices, a clear consensus is emerging that market entry of multiple suppliers is a critical factor in expeditiously bringing down prices of new vaccines. In this context, key target objectives for improving access to new vaccines include overcoming intellectual property obstacles, streamlining regulatory pathways for biosimilar vaccines, and reducing market entry timelines for developing-country vaccine manufacturers by transfer of technology and know-how. I propose an intellectual property, technology, and know-how bank as a new approach to facilitate widespread access to new vaccines in low- and middle-income countries by efficient transfer of patented vaccine technologies to multiple developing-country vaccine manufacturers.

  3. FD/DAMA Scheme For Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.

    1992-01-01

    Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.

  4. An Educational Rationale for Deaf Students with Multiple Disabilities

    ERIC Educational Resources Information Center

    Ewing, Karen M.; Jones, Thomas W.

    2003-01-01

    Deaf students with multiple disabilities have a long history of limited opportunity, including limited access to educational opportunities available to their deaf peers. This article places the individual needs of deaf students with multiple disabilities in the context that guides much of deaf education--the importance of language acquisition.…

  5. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  6. An integrated voice and data multiple-access scheme for a land-mobile satellite system

    NASA Technical Reports Server (NTRS)

    Li, V. O. K.; Yan, T.-Y.

    1984-01-01

    An analytical study is performed of the satellite requirements for a land mobile satellite system (LMSS). The spacecraft (MSAT-X) would be in GEO and would be compatible with multiple access by mobile radios and antennas and fixed stations. The FCC has received a petition from NASA to reserve the 821-825 and 866-870 MHz frequencies for the LMSS, while communications with fixed earth stations would be in the Ku band. MSAT-X transponders would alter the frequencies of signal and do no processing in the original configuration considered. Channel use would be governed by an integrated demand-assigned, multiple access protocol, which would divide channels into reservation and information channels, governed by a network management center. Further analyses will cover tradeoffs between data and voice users, probability of blocking, and the performance impacts of on-board switching and variable bandwidth assignment. Initial calculations indicate that a large traffic volume can be handled with acceptable delays and voice blocking probabilities.

  7. An integrated voice and data multiple-access scheme for a land-mobile satellite system

    NASA Astrophysics Data System (ADS)

    Li, V. O. K.; Yan, T.-Y.

    1984-11-01

    An analytical study is performed of the satellite requirements for a land mobile satellite system (LMSS). The spacecraft (MSAT-X) would be in GEO and would be compatible with multiple access by mobile radios and antennas and fixed stations. The FCC has received a petition from NASA to reserve the 821-825 and 866-870 MHz frequencies for the LMSS, while communications with fixed earth stations would be in the Ku band. MSAT-X transponders would alter the frequencies of signal and do no processing in the original configuration considered. Channel use would be governed by an integrated demand-assigned, multiple access protocol, which would divide channels into reservation and information channels, governed by a network management center. Further analyses will cover tradeoffs between data and voice users, probability of blocking, and the performance impacts of on-board switching and variable bandwidth assignment. Initial calculations indicate that a large traffic volume can be handled with acceptable delays and voice blocking probabilities.

  8. User needs for propagation data

    NASA Technical Reports Server (NTRS)

    Sullivan, Thomas M.

    1993-01-01

    New and refined models of radio signal propagation phenomena are needed to support studies of evolving satellite services and systems. Taking an engineering perspective, applications for propagation measurements and models in the context of various types of analyses that are of ongoing interest are reviewed. Problems that were encountered in the signal propagation aspects of these analyses are reviewed, and potential solutions to these problems are discussed. The focus is on propagation measurements and models needed to support design and performance analyses of systems in the Mobile-Satellite Service (MSS) operating in the 1-3 GHz range. These systems may use geostationary or non-geostationary satellites and Frequency Division Multiple Access (FDMA), Time Division Multiple Access Digital (TDMA), or Code Division Multiple Access (CDMA) techniques. Many of the propagation issues raised in relation to MSS are also pertinent to other services such as broadcasting-satellite (sound) at 2310-2360 MHz. In particular, services involving mobile terminals or terminals with low gain antennas are of concern.

  9. Transparent data service with multiple wireless access

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  10. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  11. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  13. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  14. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  15. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  17. Wild versus domestic prey in the diet of reintroduced tigers (Panthera tigris) in the livestock-dominated multiple-use forests of Panna Tiger Reserve, India.

    PubMed

    Kolipaka, S S; Tamis, W L M; van 't Zelfde, M; Persoon, G A; de Iongh, H H

    2017-01-01

    Grazing livestock in openly accessible areas is a common practice in the multiple-use forests of India; however, its compatibility with the reintroduction of tigers to these areas requires examination. Here, we investigated the diet of tigers in a livestock-dominated multiple-use buffer zone of the Panna Tiger Reserve, India. We hypothesised that the presence of feral cattle, along with open-access grazing practices in multiple-use forests, would increase the incidence of predation on livestock by tigers, even when wild prey are available. We used generalised linear models to test whether predation of livestock versus wild animals was influenced by (1) the sex and age class of tigers, (2) season, and (3) the distance of prey from the core-zone boundary of the reserve. Overall, sub-adult tigers and male tigers killed more livestock than wild prey, even when wild prey was available. In the winter and rainy seasons livestock were killed in higher numbers in the buffer zone than in summers, this may be because of the seasonally changing livestock herding patterns in the area. Further, with increasing distance from the core-zone boundary, all tigers killed more livestock, possibly because livestock were more easily accessible than wild prey. Our results show that open-access and unregulated livestock grazing is not currently compatible with large carnivore conservation in the same landscape. Such practices will lead to an increase in negative tiger-human-livestock interactions. In conclusion, we suggest the need to encourage locals to corral valuable cattle, leaving feral/unwanted livestock for tigers. This simple strategy would benefit both local inhabitants and tiger conservation in the multiple-use forests of India.

  18. Wild versus domestic prey in the diet of reintroduced tigers (Panthera tigris) in the livestock-dominated multiple-use forests of Panna Tiger Reserve, India

    PubMed Central

    Tamis, W. L. M.; van ‘t Zelfde, M.; Persoon, G. A.; de Iongh, H. H.

    2017-01-01

    Grazing livestock in openly accessible areas is a common practice in the multiple-use forests of India; however, its compatibility with the reintroduction of tigers to these areas requires examination. Here, we investigated the diet of tigers in a livestock-dominated multiple-use buffer zone of the Panna Tiger Reserve, India. We hypothesised that the presence of feral cattle, along with open-access grazing practices in multiple-use forests, would increase the incidence of predation on livestock by tigers, even when wild prey are available. We used generalised linear models to test whether predation of livestock versus wild animals was influenced by (1) the sex and age class of tigers, (2) season, and (3) the distance of prey from the core-zone boundary of the reserve. Overall, sub-adult tigers and male tigers killed more livestock than wild prey, even when wild prey was available. In the winter and rainy seasons livestock were killed in higher numbers in the buffer zone than in summers, this may be because of the seasonally changing livestock herding patterns in the area. Further, with increasing distance from the core-zone boundary, all tigers killed more livestock, possibly because livestock were more easily accessible than wild prey. Our results show that open-access and unregulated livestock grazing is not currently compatible with large carnivore conservation in the same landscape. Such practices will lead to an increase in negative tiger-human-livestock interactions. In conclusion, we suggest the need to encourage locals to corral valuable cattle, leaving feral/unwanted livestock for tigers. This simple strategy would benefit both local inhabitants and tiger conservation in the multiple-use forests of India. PMID:28379997

  19. Security middleware infrastructure for DICOM images in health information systems.

    PubMed

    Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A

    2003-12-01

    In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.

  20. A Review of Existing Studies Reporting the Negative Effects of Alcohol Access and Positive Effects of Alcohol Control Policies on Interpersonal Violence

    PubMed Central

    Fitterer, Jessica L.; Nelson, Trisalyn A.; Stockwell, Timothy

    2015-01-01

    Alcohol consumption often leads to elevated rates of violence yet alcohol access policies continue to relax across the globe. Our review establishes the extent alcohol policy can moderate violent crime through alcohol availability restrictions. Results were informed from comprehensive selection of peer-reviewed journals from 1950 to October 2015. Our search identified 87 relevant studies on alcohol access and violence conducted across 12 countries. Seventeen studies included quasi-control design, and 23 conducted intervention analysis. Seventy-one (82%) reported a significant relationship between alcohol access and violent offenses. Alcohol outlet studies reported the greatest percentage of significant results (93%), with trading hours (63%), and alcohol price following (58%). Results from baseline studies indicated the effectiveness of increasing the price of commonly consumed alcohol, restricting the hours of alcohol trading, and limiting the number of alcohol outlets per region to prevent violent offenses. Unclear are the effects of tax reductions, restriction of on-premises re-entry, and different outlet types on violent crime. Further, the generalization of statistics over broad areas and the low number of control/intervention studies poses some concern for confounding or correlated effects on study results, and amount of information for local-level prevention of interpersonal violence. Future studies should focus on gathering longitudinal data, validating models, limiting crime data to peak drinking days and times, and wherever possible collecting the joint distribution between violent crime, intoxication, and place. A greater uptake of local-level analysis will benefit studies comparing the influence of multiple alcohol establishment types by relating the location of a crime to establishment proximity. Despite, some uncertainties particular studies showed that even modest policy changes, such as 1% increases in alcohol price, 1 h changes to closing times, and limiting establishment densities to <25 outlets per postal code substantively reduce violent crime. PMID:26636055

  1. Event-Driven Random-Access-Windowing CCD Imaging System

    NASA Technical Reports Server (NTRS)

    Monacos, Steve; Portillo, Angel; Ortiz, Gerardo; Alexander, James; Lam, Raymond; Liu, William

    2004-01-01

    A charge-coupled-device (CCD) based high-speed imaging system, called a realtime, event-driven (RARE) camera, is undergoing development. This camera is capable of readout from multiple subwindows [also known as regions of interest (ROIs)] within the CCD field of view. Both the sizes and the locations of the ROIs can be controlled in real time and can be changed at the camera frame rate. The predecessor of this camera was described in High-Frame-Rate CCD Camera Having Subwindow Capability (NPO- 30564) NASA Tech Briefs, Vol. 26, No. 12 (December 2002), page 26. The architecture of the prior camera requires tight coupling between camera control logic and an external host computer that provides commands for camera operation and processes pixels from the camera. This tight coupling limits the attainable frame rate and functionality of the camera. The design of the present camera loosens this coupling to increase the achievable frame rate and functionality. From a host computer perspective, the readout operation in the prior camera was defined on a per-line basis; in this camera, it is defined on a per-ROI basis. In addition, the camera includes internal timing circuitry. This combination of features enables real-time, event-driven operation for adaptive control of the camera. Hence, this camera is well suited for applications requiring autonomous control of multiple ROIs to track multiple targets moving throughout the CCD field of view. Additionally, by eliminating the need for control intervention by the host computer during the pixel readout, the present design reduces ROI-readout times to attain higher frame rates. This camera (see figure) includes an imager card consisting of a commercial CCD imager and two signal-processor chips. The imager card converts transistor/ transistor-logic (TTL)-level signals from a field programmable gate array (FPGA) controller card. These signals are transmitted to the imager card via a low-voltage differential signaling (LVDS) cable assembly. The FPGA controller card is connected to the host computer via a standard peripheral component interface (PCI).

  2. Qualitative differences in the guidance of attention during single-color and multiple-color visual search: behavioral and electrophysiological evidence.

    PubMed

    Grubert, Anna; Eimer, Martin

    2013-10-01

    To find out whether attentional target selection can be effectively guided by top-down task sets for multiple colors, we measured behavioral and ERP markers of attentional target selection in an experiment where participants had to identify color-defined target digits that were accompanied by a single gray distractor object in the opposite visual field. In the One Color task, target color was constant. In the Two Color task, targets could have one of two equally likely colors. Color-guided target selection was less efficient during multiple-color relative to single-color search, and this was reflected by slower response times and delayed N2pc components. Nontarget-color items that were presented in half of all trials captured attention and gained access to working memory when participants searched for two colors, but were excluded from attentional processing in the One Color task. Results demonstrate qualitative differences in the guidance of attentional target selection between single-color and multiple-color visual search. They suggest that top-down attentional control can be applied much more effectively when it is based on a single feature-specific attentional template. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  3. The behavior of multiple independent managers and ecological traits interact to determine prevalence of weeds.

    PubMed

    Coutts, Shaun R; Yokomizo, Hiroyuki; Buckley, Yvonne M

    2013-04-01

    Management of damaging invasive plants is often undertaken by multiple decision makers, each managing only a small part of the invader's population. As weeds can move between properties and re-infest eradicated sites from unmanaged sources, the dynamics of multiple decision makers plays a significant role in weed prevalence and invasion risk at the landscape scale. We used a spatially explicit agent-based simulation to determine how individual agent behavior, in concert with weed population ecology, determined weed prevalence. We compared two invasive grass species that differ in ecology, control methods, and costs: Nassella trichotoma (serrated tussock) and Eragrostis curvula (African love grass). The way decision makers reacted to the benefit of management had a large effect on the extent of a weed. If benefits of weed control outweighed the costs, and either net benefit was very large or all agents were very sensitive to net benefits, then agents tended to act synchronously, reducing the pool of infested agents available to spread the weed. As N. trichotoma was more damaging than E. curvula and had more effective control methods, agents chose to manage it more often, which resulted in lower prevalence of N. trichotoma. A relatively low number of agents who were intrinsically less motivated to control weeds led to increased prevalence of both species. This was particularly apparent when long-distance dispersal meant each infested agent increased the invasion risk for a large portion of the landscape. In this case, a small proportion of land mangers reluctant to control, regardless of costs and benefits, could lead to the whole landscape being infested, even when local control stopped new infestations. Social pressure was important, but only if it was independent of weed prevalence, suggesting that early access to information, and incentives to act on that information, may be crucial in stopping a weed from infesting large areas. The response of our model to both behavioral and ecological parameters was highly nonlinear. This implies that the outcomes of weed management programs that deal with multiple land mangers could be highly variable in both space and through time.

  4. Cervical Cancer Control for Hispanic Women in Texas: Effective Strategies from Research and Practice

    PubMed Central

    Fernandez, Maria E.; Savas, Lara S.; Lipizzi, Erica; Smith, Jennifer S.; Vernon, Sally W.

    2014-01-01

    Purpose Hispanic women in Texas have among the highest rates of cervical cancer incidence and mortality in the country. Increasing regular Papanicolaou test screening and HPV vaccination are crucial to reduce the burden of cervical cancer among Hispanics. This paper presents lessons learned from community-based cervical cancer control programs in Texas and highlights effective intervention programs, methods and strategies. Methods We reviewed and summarized cervical cancer control efforts targeting Hispanic women in Texas, focusing on interventions developed by researchers at the University of Texas, School of Public Health. We identified commonalities across programs, highlighted effective methods, and summarized lessons learned to help guide future intervention efforts. Results Community-academic partnerships were fundamental in all steps of program development and implementation. Programs reviewed addressed psychosocial, cultural, and access barriers to cervical cancer control among low-income Hispanic women. Intervention approaches included lay health worker (LHW) and navigation models and used print media, interactive tailored media, photonovellas, client reminders, one-on-one and group education sessions. Conclusions Small media materials combined with LHW and navigation approaches were effective in delivering Pap test screening and HPV vaccination messages and in linking women to services. Common theoretical methods included in these approaches were modeling, verbal persuasion, and facilitating access. Adaptation of programs to an urban environment revealed that intensive navigation was needed to link women with multiple access barriers to health services. Collectively, this review reveals 1) the importance of using a systematic approach for planning and adapting cervical cancer control programs; 2) advantages of collaborative academic-community partnerships to develop feasible interventions with broad reach; 3) the use of small media and LHW approaches and the need for tailored phone navigation in urban settings; and 4) coordination and technical assistance of community-based efforts as a way to maximize resources. PMID:24398135

  5. Reducing racial/ethnic disparities in diabetes: the Coached Care (R2D2C2) project.

    PubMed

    Kaplan, Sherrie H; Billimek, John; Sorkin, Dara H; Ngo-Metzger, Quyen; Greenfield, Sheldon

    2013-10-01

    Despite numerous efforts to change healthcare delivery, the profile of disparities in diabetes care and outcomes has not changed substantially over the past decade. To understand potential contributors to disparities in diabetes care and glycemic control. Cross sectional analysis. Seven outpatient clinics affiliated with an academic medical center. Adult patients with type 2 diabetes who were Mexican American, Vietnamese American or non-Hispanic white (n = 1,484). Glycemic control was measured as hemoglobin A1c (HbA1c) level. Patient, provider and system characteristics included demographic characteristics; access to care; quality of process of care including clinical inertia; quality of interpersonal care; illness burden; mastery (diabetes management confidence, passivity); and adherence to treatment. Unadjusted HbA1c values were significantly higher for Mexican American patients (n = 782) (mean = 8.3 % [SD:2.1]) compared with non-Hispanic whites (n = 389) (mean = 7.1 % [SD:1.4]). There were no significant differences in HbA1c values between Vietnamese American and non-Hispanic white patients. There were no statistically significant group differences in glycemic control after adjustment for multiple measures of access, and quality of process and interpersonal care. Disease management mastery and adherence to treatment were related to glycemic control for all patients, independent of race/ethnicity. Generalizability to other minorities or to patients with poorer access to care may be limited. The complex interplay among patient, physician and system characteristics contributed to disparities in HbA1c between Mexican American and non-Hispanic white patients. In contrast, Vietnamese American patients achieved HbA1c levels comparable to non-Hispanic whites and adjustment for numerous characteristics failed to identify confounders that could have masked disparities in this subgroup. Disease management mastery appeared to be an important contributor to glycemic control for all patient subgroups.

  6. 30/20 GHz communications systems baseband processor development

    NASA Astrophysics Data System (ADS)

    Brown, L.; Sabourin, D.; Stilwell, J.; McCallister, R.; Borota, M.

    The architecture and system design concepts for a commercial satellite communications system planned for the 1990's has been developed. The system provides data communications between the individual users via trunking and customer premise service terminals utilizing a central switching satellite operating in a time-division multiple-access mode. Baseband processing is employed to route and control traffic on an individual message basis while providing significant advantages in improved link margins and system flexibility. Key technology developments required to prove the flight readiness of the baseband processor design are being verified in the baseband processor proof-of-concept model described herein.

  7. High-capacity and security molecular capsule transporters.

    PubMed

    Visessamit, Jakkapol; Kulsirirat, Kathawut; Yupapin, Preecha P

    2015-01-01

    Multiwavelength optical capsules can be generated and controlled by using soliton/Gaussian pulses within a nonlinear device system known as a "PANDA" ring circuit and system. The security of molecule/drug transportation can be formed by the strong coupling of soliton-like pulse, where the high-capacity optical capsules can be formed using the multiwavelength solitons, which can be a good advantage and combination of drug delivery to the required targets. Moreover, the multiple access of drug delivery can be formed using the optical networks, which allows the use of various drug molecules with variety of diagnosis and therapeutic applications.

  8. LGBT Populations' Barriers to Cancer Care.

    PubMed

    Boehmer, Ulrike

    2018-02-01

    To describe lesbian, gay, bisexual, and transgender (LGBT) individuals' barriers to accessing and receiving quality cancer care. Published data on cancer care and studies of LGBT individuals. There is a clustering of barriers among LGBT individuals, which suggests multiple inequities exist in LGBT individuals' cancer care, although data on disparities along the cancer control continuum are not consistently available. Nurses can make a difference in LGBT individuals' cancer care by obtaining training on LGBT health and their cancer-related needs and by providing a welcoming and respectful relationship with LGBT patients. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. 30/20 GHz communications systems baseband processor development

    NASA Technical Reports Server (NTRS)

    Brown, L.; Sabourin, D.; Stilwell, J.; Mccallister, R.; Borota, M.

    1982-01-01

    The architecture and system design concepts for a commercial satellite communications system planned for the 1990's has been developed. The system provides data communications between the individual users via trunking and customer premise service terminals utilizing a central switching satellite operating in a time-division multiple-access mode. Baseband processing is employed to route and control traffic on an individual message basis while providing significant advantages in improved link margins and system flexibility. Key technology developments required to prove the flight readiness of the baseband processor design are being verified in the baseband processor proof-of-concept model described herein.

  10. Moving Virtual Research Environments from high maintenance Stovepipes to Multi-purpose Sustainable Service-oriented Science Platforms

    NASA Astrophysics Data System (ADS)

    Klump, Jens; Fraser, Ryan; Wyborn, Lesley; Friedrich, Carsten; Squire, Geoffrey; Barker, Michelle; Moloney, Glenn

    2017-04-01

    The researcher of today is likely to be part of a team distributed over multiple sites that will access data from an external repository and then process the data on a public or private cloud or even on a large centralised supercomputer. They are increasingly likely to use a mixture of their own code, third party software and libraries, or even access global community codes. These components will be connected into a Virtual Research Environments (VREs) that will enable members of the research team who are not co-located to actively work together at various scales to share data, models, tools, software, workflows, best practices, infrastructures, etc. Many VRE's are built in isolation: designed to meet a specific research program with components tightly coupled and not capable of being repurposed for other use cases - they are becoming 'stovepipes'. The limited number of users of some VREs also means that the cost of maintenance per researcher can be unacceptably high. The alternative is to develop service-oriented Science Platforms that enable multiple communities to develop specialised solutions for specific research programs. The platforms can offer access to data, software tools and processing infrastructures (cloud, supercomputers) through globally distributed, interconnected modules. In Australia, the Virtual Geophysics Laboratory (VGL) was initially built to enable a specific set of researchers in government agencies access to specific data sets and a limited number of tools, that is now rapidly evolving into a multi-purpose Earth science platform with access to an increased variety of data, a broader range of tools, users from more sectors and a diversity of computational infrastructures. The expansion has been relatively easy, because of the architecture whereby data, tools and compute resources are loosely coupled via interfaces that are built on international standards and accessed as services wherever possible. In recent years, investments in discoverability and accessibility of data via online services in Australia mean that data resources can be easily added to the virtual environments as and when required. Another key to increasing to reusability and uptake of the VRE is the capability to capturing workflows so that they can be reused and repurposed both within and beyond the community that that defined the original use case. Unfortunately, Software-as-a-Service in the research sector is not yet mature. In response, we developed a Scientific Software solutions Center (SSSC) that enables researchers to discover, deploy and then share computational codes, code snippets or processes both in a human and machine-readable manner. Growth has come not only from within the Earth science community but from the Australian Virtual Laboratory community which is building VREs for a diversity of communities such as astronomy, genomics, environment, humanities, climate etc. Components such as access control, provenance, visualisation, accounting etc. are common to all scientific domains and sharing of these across multiple domains reduces costs, but more importantly increases the ability to undertake interdisciplinary science. These efforts are transitioning VREs to more sustainable Service-oriented Science Platforms that can be delivered in an agile, adaptable manner for broader community interests.

  11. Pain medication management processes used by oncology outpatients and family caregivers part I: health systems contexts.

    PubMed

    Schumacher, Karen L; Plano Clark, Vicki L; West, Claudia M; Dodd, Marylin J; Rabow, Michael W; Miaskowski, Christine

    2014-11-01

    Oncology patients with persistent pain treated in outpatient settings and their family caregivers have significant responsibility for managing pain medications. However, little is known about their practical day-to-day experiences with pain medication management. The aim was to describe day-to-day pain medication management from the perspectives of oncology outpatients and their family caregivers who participated in a randomized clinical trial of a psychoeducational intervention called the Pro-Self(©) Plus Pain Control Program. In this article, we focus on pain medication management by patients and family caregivers in the context of multiple complex health systems. We qualitatively analyzed audio-recorded intervention sessions that included extensive dialogue between patients, family caregivers, and nurses about pain medication management during the 10-week intervention. The health systems context for pain medication management included multiple complex systems for clinical care, reimbursement, and regulation of analgesic prescriptions. Pain medication management processes particularly relevant to this context were getting prescriptions and obtaining medications. Responsibilities that fell primarily to patients and family caregivers included facilitating communication and coordination among multiple clinicians, overcoming barriers to access, and serving as a final safety checkpoint. Significant effort was required of patients and family caregivers to insure safe and effective pain medication management. Health systems issues related to access to needed analgesics, medication safety in outpatient settings, and the effort expended by oncology patients and their family caregivers require more attention in future research and health-care reform initiatives. Copyright © 2014 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  12. Web Application Software for Ground Operations Planning Database (GOPDb) Management

    NASA Technical Reports Server (NTRS)

    Lanham, Clifton; Kallner, Shawn; Gernand, Jeffrey

    2013-01-01

    A Web application facilitates collaborative development of the ground operations planning document. This will reduce costs and development time for new programs by incorporating the data governance, access control, and revision tracking of the ground operations planning data. Ground Operations Planning requires the creation and maintenance of detailed timelines and documentation. The GOPDb Web application was created using state-of-the-art Web 2.0 technologies, and was deployed as SaaS (Software as a Service), with an emphasis on data governance and security needs. Application access is managed using two-factor authentication, with data write permissions tied to user roles and responsibilities. Multiple instances of the application can be deployed on a Web server to meet the robust needs for multiple, future programs with minimal additional cost. This innovation features high availability and scalability, with no additional software that needs to be bought or installed. For data governance and security (data quality, management, business process management, and risk management for data handling), the software uses NAMS. No local copy/cloning of data is permitted. Data change log/tracking is addressed, as well as collaboration, work flow, and process standardization. The software provides on-line documentation and detailed Web-based help. There are multiple ways that this software can be deployed on a Web server to meet ground operations planning needs for future programs. The software could be used to support commercial crew ground operations planning, as well as commercial payload/satellite ground operations planning. The application source code and database schema are owned by NASA.

  13. Why build limited access highways?.

    DOT National Transportation Integrated Search

    1991-01-01

    This report first explains what a limited access highway is, then describes the benefits and advantages of limited access highways. As compared with highways with no control of access, limited access highways (especially those with full control) have...

  14. "My Daughter Does Not Know How to Make the Chappati": Understanding Food Access among African Immigrants in Lewiston, Maine

    ERIC Educational Resources Information Center

    Jacobus, Michelle Vazquez; Ahmed, Hussein; Jalali, Reza

    2013-01-01

    Food access for Maine's growing African refugee population reflects multiple levels of general access to society. To better understand the challenges and opportunities unique to this community, a multidisciplinary team of students, faculty, and community partners integrated the expertise of local residents with the results of a food assessment of…

  15. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  16. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  17. Access to Preventive Health Care for Cancer Survivors

    PubMed Central

    Yabroff, K. Robin; Short, Pamela Farley; Machlin, Steven; Dowling, Emily; Rozjabek, Heather; Li, Chunyu; McNeel, Timothy; Ekwueme, Donatus U.; Virgo, Katherine S.

    2013-01-01

    Background Access to healthcare, particularly effective primary and secondary preventive care, is critical for cancer survivors, in order to minimize the adverse sequelae of cancer and its treatment. Purpose The goal of the study was to evaluate the association between cancer survivorship and access to primary and preventive health care. Methods Cancer survivors (n=4960) and individuals without a cancer history (n=64,431) aged ≥18 years, from the 2008–2010 Medical Expenditure Panel Survey (MEPS), were evaluated. Multiple measures of access and preventive services use were compared. The association between cancer survivorship and access and preventive services was evaluated with multivariate logistic regression models, stratified by age group (18–64 years and ≥65 years), controlling for the effects of age, gender, race/ethnicity, education, marital status, and comorbidities. Data were analyzed in 2013. Results Cancer survivors aged ≥65 years had equivalent or greater access and preventive services use than individuals without a cancer history, in adjusted analyses. However, among those aged 18–64 years with private health insurance, cancer survivors were more likely than other individuals to have a usual source of care and to use preventive services, whereas uninsured or publicly insured cancer survivors were generally less likely to have a usual source of care and to use preventive services than were uninsured or publicly insured adults without a cancer history. Conclusions Although access and preventive care use in cancer survivors is generally equivalent or greater compared to that of other individuals, disparities for uninsured and publicly insured cancer survivors aged 18–64 years suggest that improvements in survivor care are needed. PMID:23953357

  18. Balancing access to health data and privacy: a review of the issues and approaches for the future.

    PubMed

    Lane, Julia; Schur, Claudia

    2010-10-01

    There has been a dramatic increase in the types of microdata, and this holds great promise for health services research. However, legislative efforts to protect individual privacy have reduced the flow of health care data for research purposes and increased costs and delays, affecting the quality of analysis. This paper provides an overview of the challenges raised by concerns about data confidentiality in the context of health services research, the current methodologies used to ensure data security, and a description of one successful approach to balancing access and privacy. Materials and Methods. We analyze the issues of access and privacy using a conceptual framework based on balancing the risk of reidentification with the utility associated with data analysis. The guiding principle should be to generate released data that are as close to the maximum acceptable risk as possible. HIPAA and other privacy measures can perhaps be seen as having had the effect of lowering the "maximum acceptable risk" level and rendering some data unreleasable. We discuss the levels of risk and utility associated with different types of data used in health services research and the ability to link data from multiple sources as well as current models of data sharing and their limitations. One particularly compelling approach is to establish a remote access "data enclave," where statistical protections are applied to the data, technical protections ensure compliance with data-sharing requirements, and operational controls limit researchers' access to the data they need for their specific research questions. We recommend reducing delays in access to data for research, increasing the use of remote access data enclaves, and disseminating knowledge and promulgating standards for best practices related to data protection. © Health Research and Educational Trust.

  19. Post-coma persons with extensive multiple disabilities use microswitch technology to access selected stimulus events or operate a radio device.

    PubMed

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Alberti, Gloria; Oliva, Doretta; Megna, Gianfranco; Iliceto, Carla; Damiani, Sabino; Ricci, Irene; Spica, Antonella

    2011-01-01

    The present two studies extended research evidence on the use of microswitch technology by post-coma persons with multiple disabilities. Specifically, Study I examined whether three adults with a diagnosis of minimally conscious state and multiple disabilities could use microswitches as tools to access brief, selected stimulus events. Study II assessed whether an adult, who had emerged from a minimally conscious state but was affected by multiple disabilities, could manage the use of a radio device via a microswitch-aided program. Results showed that the participants of Study I had a significant increase of microswitch responding during the intervention phases. The participant of Study II learned to change radio stations and seemed to spend different amounts of session time on the different stations available (suggesting preferences among the programs characterizing them). The importance of microswitch technology for assisting post-coma persons with multiple disabilities to positively engage with their environment was discussed. Copyright © 2011 Elsevier Ltd. All rights reserved.

  20. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  1. IMPROVING ACCESS TO INFORMATION ABOUT ORD PROJECTS

    EPA Science Inventory

    ORD project information is maintained in, and retrieved from, multiple systems and home pages. Not all sources of project information are Intranet accessible. Descriptive information may be abbreviated and not useful in conveying a comprehensive understanding of a project. The m...

  2. Coupling Oxygen Consumption with Hydrocarbon Oxidation in Bacterial Multicomponent Monooxygenases.

    PubMed

    Wang, Weixue; Liang, Alexandria D; Lippard, Stephen J

    2015-09-15

    A fundamental goal in catalysis is the coupling of multiple reactions to yield a desired product. Enzymes have evolved elegant approaches to address this grand challenge. A salient example is the biological conversion of methane to methanol catalyzed by soluble methane monooxygenase (sMMO), a member of the bacterial multicomponent monooxygenase (BMM) superfamily. sMMO is a dynamic protein complex of three components: a hydroxylase, a reductase, and a regulatory protein. The active site, a carboxylate-rich non-heme diiron center, is buried inside the 251 kDa hydroxylase component. The enzyme processes four substrates: O2, protons, electrons, and methane. To couple O2 activation to methane oxidation, timely control of substrate access to the active site is critical. Recent studies of sMMO, as well as its homologues in the BMM superfamily, have begun to unravel the mechanism. The emerging and unifying picture reveals that each substrate gains access to the active site along a specific pathway through the hydroxylase. Electrons and protons are delivered via a three-amino-acid pore located adjacent to the diiron center; O2 migrates via a series of hydrophobic cavities; and hydrocarbon substrates reach the active site through a channel or linked set of cavities. The gating of these pathways mediates entry of each substrate to the diiron active site in a timed sequence and is coordinated by dynamic interactions with the other component proteins. The result is coupling of dioxygen consumption with hydrocarbon oxidation, avoiding unproductive oxidation of the reductant rather than the desired hydrocarbon. To initiate catalysis, the reductase delivers two electrons to the diiron(III) center by binding over the pore of the hydroxylase. The regulatory component then displaces the reductase, docking onto the same surface of the hydroxylase. Formation of the hydroxylase-regulatory component complex (i) induces conformational changes of pore residues that may bring protons to the active site; (ii) connects hydrophobic cavities in the hydroxylase leading from the exterior to the diiron active site, providing a pathway for O2 and methane, in the case of sMMO, to the reduced diiron center for O2 activation and substrate hydroxylation; (iii) closes the pore, as well as a channel in the case of four-component BMM enzymes, restricting proton access to the diiron center during formation of "Fe2O2" intermediates required for hydrocarbon oxidation; and (iv) inhibits undesired electron transfer to the Fe2O2 intermediates by blocking reductase binding during O2 activation. This mechanism is quite different from that adopted by cytochromes P450, a large class of heme-containing monooxygenases that catalyze reactions very similar to those catalyzed by the BMM enzymes. Understanding the timed enzyme control of substrate access has implications for designing artificial catalysts. To achieve multiple turnovers and tight coupling, synthetic models must also control substrate access, a major challenge considering that nature requires large, multimeric, dynamic protein complexes to accomplish this feat.

  3. A survey of accessibility and utilisation of chiropractic services for wheelchair-users in the United Kingdom: What are the issues?

    PubMed

    McKay, Naomi D; Langworthy, Jennifer

    2011-09-13

    People with physical disabilities experience barriers to healthcare across all services despite a legal and moral obligation to the contrary. Complementary medicine is considered as supplementary to conventional care and integration of these approaches is essential to achieve optimal care. This paper explores the utilisation of chiropractic services and practitioner experiences of treating wheelchair-users which appears under-reported. A 20 item questionnaire was posted to 250 randomly selected chiropractors registered with the General Chiropractic Council. Follow-up questionnaires were sent 7 days after the initial return date. Quantitative data were subjected to frequency analysis. The response rate was 64% (n = 161). The majority (66%) of chiropractors had been in practice less than 10 years and were practice owners (50%). Fifty-two percent of chiropractors sampled had treated a patient in a wheelchair in the previous 5 years. The majority (87%) had treated between 1 and 5 such patients. Patients with multiple sclerosis, stroke and cerebral palsy most commonly presented for treatment. The majority of patients' presenting complaint was musculoskeletal in origin, primarily for pain control. Only 13% of respondents worked in a fully accessible clinic. Impracticality of alterations was the most common reason for inaccessibility. Wheelchair-users seem to be an underserved patient group in relation to chiropractic services. Chiropractic management is primarily utilised for pain control in patients with physical disabilities in which mobility may be improved or maintained. Co-management of wheelchair-users with GPs appears to be desirable in order to achieve optimal patient care however more research is required regarding the efficacy of chiropractic treatment for a range of disabling conditions. Physical access was identified as a key barrier to accessing care.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Forslund, D.W.; Cook, J.L.

    One of the most powerful tools available for telemedicine is a multimedia medical record accessible over a wide area and simultaneously editable by multiple physicians. The ability to do this through an intuitive interface linking multiple distributed data repositories while maintaining full data integrity is a fundamental enabling technology in healthcare. The authors discuss the role of distributed object technology using Java and CORBA in providing this capability including an example of such a system (TeleMed) which can be accessed through the World Wide Web. Issues of security, scalability, data integrity, and usability are emphasized.

  5. Why is CDMA the solution for mobile satellite communication

    NASA Technical Reports Server (NTRS)

    Gilhousen, Klein S.; Jacobs, Irwin M.; Padovani, Roberto; Weaver, Lindsay A.

    1989-01-01

    It is demonstrated that spread spectrum Code Division Multiple Access (CDMA) systems provide an economically superior solution to satellite mobile communications by increasing the system maximum capacity with respect to single channel per carrier Frequency Division Multiple Access (FDMA) systems. Following the comparative analysis of CDMA and FDMA systems, the design of a model that was developed to test the feasibility of the approach and the performance of a spread spectrum system in a mobile environment. Results of extensive computer simulations as well as laboratory and field tests results are presented.

  6. Lowering data retention voltage in static random access memory array by post fabrication self-improvement of cell stability by multiple stress application

    NASA Astrophysics Data System (ADS)

    Mizutani, Tomoko; Takeuchi, Kiyoshi; Saraya, Takuya; Kobayashi, Masaharu; Hiramoto, Toshiro

    2018-04-01

    We propose a new version of the post fabrication static random access memory (SRAM) self-improvement technique, which utilizes multiple stress application. It is demonstrated that, using a device matrix array (DMA) test element group (TEG) with intrinsic channel fully depleted (FD) silicon-on-thin-buried-oxide (SOTB) six-transistor (6T) SRAM cells fabricated by the 65 nm technology, the lowering of data retention voltage (DRV) is more effectively achieved than using the previously proposed single stress technique.

  7. The role of CORBA in enabling telemedicine

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Forslund, D.W.

    1997-07-01

    One of the most powerful tools available for telemedicine is a multimedia medical record accessible over a wide area and simultaneously editable by multiple physicians. The ability to do this through an intuitive interface linking multiple distributed data repositories while maintaining full data integrity is a fundamental enabling technology in healthcare. The author discusses the role of distributed object technology using CORBA in providing this capability including an example of such a system (TeleMed) which can be accessed through the World Wide Web. Issues of security, scalability, data integrity, and useability are emphasized.

  8. Investigating the Extent to Which Patients Should Control Access to Patient Records for Research: A Deliberative Process Using Citizens’ Juries

    PubMed Central

    Bozentko, Kyle; Clement, Sarah; Hunn, Amanda; Hassan, Lamiece; Norris, Ruth; Oswald, Malcolm; Peek, Niels

    2018-01-01

    Background The secondary use of health data for research raises complex questions of privacy and governance. Such questions are ill-suited to opinion polling where citizens must choose quickly between multiple-choice answers based on little information. Objective The aim of this project was to extend knowledge about what control informed citizens would seek over the use of health records for research after participating in a deliberative process using citizens’ juries. Methods Two 3-day citizens’ juries, of 17 citizens each, were convened to reflect UK national demographics from 355 eligible applicants. Each jury addressed the mission “To what extent should patients control access to patient records for secondary use?” Jurors heard from and questioned 5 expert witnesses (chosen either to inform the jury, or to argue for and against the secondary use of data), interspersed with structured opportunities to deliberate among themselves, including discussion and role-play. Jurors voted on a series of questions associated with the jury mission, giving their rationale. Individual views were polled using questionnaires at the beginning and at end of the process. Results At the end of the process, 33 out of 34 jurors voted in support of the secondary use of data for research, with 24 wanting individuals to be able to opt out, 6 favoring opt in, and 3 voting that all records should be available without any consent process. When considering who should get access to data, both juries had very similar rationales. Both thought that public benefit was a key justification for access. Jury 1 was more strongly supportive of sharing patient records for public benefit, whereas jury 2 was more cautious and sought to give patients more control. Many jurors changed their opinion about who should get access to health records: 17 people became more willing to support wider information sharing of health data for public benefit, whereas 2 moved toward more patient control over patient records. Conclusions The findings highlight that, when informed of both risks and opportunities associated with data sharing, citizens believe an individual’s right to privacy should not prevent research that can benefit the general public. The juries also concluded that patients should be notified of any such scheme and have the right to opt out if they so choose. Many jurors changed their minds about this complex policy question when they became more informed. Many, but not all, jurors became less skeptical about health data sharing, as they became better informed of its benefits and risks. PMID:29592847

  9. Modelling Drug Abuse Epidemics in the Presence of Limited Rehabilitation Capacity.

    PubMed

    Mushanyu, J; Nyabadza, F; Muchatibaya, G; Stewart, A G R

    2016-12-01

    The abuse of drugs is now an epidemic globally whose control has been mainly through rehabilitation. The demand for drug abuse rehabilitation has not been matched with the available capacity resulting in limited placement of addicts into rehabilitation. In this paper, we model limited rehabilitation through the Hill function incorporated into a system of nonlinear ordinary differential equations. Not every member of the community is equally likely to embark on drug use, risk structure is included to help differentiate those more likely (high risk) to abuse drugs and those less likely (low risk) to abuse drugs. It is shown that the model has multiple equilibria, and using the centre manifold theory, the model exhibits the phenomenon of backward bifurcation whose implications to rehabilitation are discussed. Sensitivity analysis and numerical simulations are performed. The results show that saturation in rehabilitation will in the long run lead to the escalation of drug abuse. This means that limited access to rehabilitation has negative implications in the fight against drug abuse where rehabilitation is the main form of control. This suggests that increased access to rehabilitation is likely to lower the drug abuse epidemic.

  10. Design of an impact evaluation using a mixed methods model--an explanatory assessment of the effects of results-based financing mechanisms on maternal healthcare services in Malawi.

    PubMed

    Brenner, Stephan; Muula, Adamson S; Robyn, Paul Jacob; Bärnighausen, Till; Sarker, Malabika; Mathanga, Don P; Bossert, Thomas; De Allegri, Manuela

    2014-04-22

    In this article we present a study design to evaluate the causal impact of providing supply-side performance-based financing incentives in combination with a demand-side cash transfer component on equitable access to and quality of maternal and neonatal healthcare services. This intervention is introduced to selected emergency obstetric care facilities and catchment area populations in four districts in Malawi. We here describe and discuss our study protocol with regard to the research aims, the local implementation context, and our rationale for selecting a mixed methods explanatory design with a quasi-experimental quantitative component. The quantitative research component consists of a controlled pre- and post-test design with multiple post-test measurements. This allows us to quantitatively measure 'equitable access to healthcare services' at the community level and 'healthcare quality' at the health facility level. Guided by a theoretical framework of causal relationships, we determined a number of input, process, and output indicators to evaluate both intended and unintended effects of the intervention. Overall causal impact estimates will result from a difference-in-difference analysis comparing selected indicators across intervention and control facilities/catchment populations over time.To further explain heterogeneity of quantitatively observed effects and to understand the experiential dimensions of financial incentives on clients and providers, we designed a qualitative component in line with the overall explanatory mixed methods approach. This component consists of in-depth interviews and focus group discussions with providers, service user, non-users, and policy stakeholders. In this explanatory design comprehensive understanding of expected and unexpected effects of the intervention on both access and quality will emerge through careful triangulation at two levels: across multiple quantitative elements and across quantitative and qualitative elements. Combining a traditional quasi-experimental controlled pre- and post-test design with an explanatory mixed methods model permits an additional assessment of organizational and behavioral changes affecting complex processes. Through this impact evaluation approach, our design will not only create robust evidence measures for the outcome of interest, but also generate insights on how and why the investigated interventions produce certain intended and unintended effects and allows for a more in-depth evaluation approach.

  11. Dynamic bandwidth allocation based on multiservice in software-defined wavelength-division multiplexing time-division multiplexing passive optical network

    NASA Astrophysics Data System (ADS)

    Wang, Fu; Liu, Bo; Zhang, Lijia; Jin, Feifei; Zhang, Qi; Tian, Qinghua; Tian, Feng; Rao, Lan; Xin, Xiangjun

    2017-03-01

    The wavelength-division multiplexing passive optical network (WDM-PON) is a potential technology to carry multiple services in an optical access network. However, it has the disadvantages of high cost and an immature technique for users. A software-defined WDM/time-division multiplexing PON was proposed to meet the requirements of high bandwidth, high performance, and multiple services. A reasonable and effective uplink dynamic bandwidth allocation algorithm was proposed. A controller with dynamic wavelength and slot assignment was introduced, and a different optical dynamic bandwidth management strategy was formulated flexibly for services of different priorities according to the network loading. The simulation compares the proposed algorithm with the interleaved polling with adaptive cycle time algorithm. The algorithm shows better performance in average delay, throughput, and bandwidth utilization. The results show that the delay is reduced to 62% and the throughput is improved by 35%.

  12. Pancreatic trauma: demographics, diagnosis, and management.

    PubMed

    Stawicki, Stanislaw Peter; Schwab, C William

    2008-12-01

    Pancreatic injuries are rare, with penetrating mechanisms being causative in majority of cases. They can create major diagnostic and therapeutic challenges and require multiple diagnostic modalities, including multislice high-definition computed tomography, magnetic resonance cholangiopancreatography, endoscopic retrograde cholangiopancreatography, ultrasonography, and at times, surgery and direct visualization of the pancreas. Pancreatic trauma is frequently associated with duodenal and other severe vascular and visceral injuries. Mortality is high and usually related to the concomitant vascular injury. Surgical management of pancreatic and pancreatic-duodenal trauma is challenging, and multiple surgical approaches and techniques have been described, up to and including pancreatic damage control and later resection and reconstruction. Wide surgical drainage is a key to any surgical trauma technique and access for enteral nutrition, or occasionally parenteral nutrition, are important adjuncts. Morbidity associated with pancreatic trauma is high and can be quite severe. Treatment of pancreatic trauma-related complications often requires a combination of interventional, endoscopic, and surgical approaches.

  13. Construction of a virtual EPR and automated contextual linkage to multiple sources of support information on the Oxford Clinical Intranet.

    PubMed

    Kay, J D; Nurse, D

    1999-01-01

    We have used internet-standard tools to provide access for clinicians to the components of the electronic patient record held on multiple remote disparate systems. Through the same interface we have provided access to multiple knowledgebases, some written locally and others published elsewhere. We have developed linkage between these two types of information which removes the need for the user to drill down into each knowledgebase to search for relevant information. This approach may help in the implementation of evidence-based practice. The major problems appear to be semantic rather than technological. The intranet was developed at low cost and is now in routine use. This approach appears to be transferable across systems and organisations.

  14. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    NASA Technical Reports Server (NTRS)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  15. Visualization of Multi-mission Astronomical Data with ESASky

    NASA Astrophysics Data System (ADS)

    Baines, Deborah; Giordano, Fabrizio; Racero, Elena; Salgado, Jesús; López Martí, Belén; Merín, Bruno; Sarmiento, María-Henar; Gutiérrez, Raúl; Ortiz de Landaluce, Iñaki; León, Ignacio; de Teodoro, Pilar; González, Juan; Nieto, Sara; Segovia, Juan Carlos; Pollock, Andy; Rosa, Michael; Arviset, Christophe; Lennon, Daniel; O'Mullane, William; de Marchi, Guido

    2017-02-01

    ESASky is a science-driven discovery portal to explore the multi-wavelength sky and visualize and access multiple astronomical archive holdings. The tool is a web application that requires no prior knowledge of any of the missions involved and gives users world-wide simplified access to the highest-level science data products from multiple astronomical space-based astronomy missions plus a number of ESA source catalogs. The first public release of ESASky features interfaces for the visualization of the sky in multiple wavelengths, the visualization of query results summaries, and the visualization of observations and catalog sources for single and multiple targets. This paper describes these features within ESASky, developed to address use cases from the scientific community. The decisions regarding the visualization of large amounts of data and the technologies used were made to maximize the responsiveness of the application and to keep the tool as useful and intuitive as possible.

  16. Identifying Opportunities for Decision Support Systems in Support of Regional Resource Use Planning: An Approach Through Soft Systems Methodology.

    PubMed

    Zhu; Dale

    2000-10-01

    / Regional resource use planning relies on key regional stakeholder groups using and having equitable access to appropriate social, economic, and environmental information and assessment tools. Decision support systems (DSS) can improve stakeholder access to such information and analysis tools. Regional resource use planning, however, is a complex process involving multiple issues, multiple assessment criteria, multiple stakeholders, and multiple values. There is a need for an approach to DSS development that can assist in understanding and modeling complex problem situations in regional resource use so that areas where DSSs could provide effective support can be identified, and the user requirements can be well established. This paper presents an approach based on the soft systems methodology for identifying DSS opportunities for regional resource use planning, taking the Central Highlands Region of Queensland, Australia, as a case study.

  17. Multimaterial magnetically assisted 3D printing of composite materials.

    PubMed

    Kokkinis, Dimitri; Schaffner, Manuel; Studart, André R

    2015-10-23

    3D printing has become commonplace for the manufacturing of objects with unusual geometries. Recent developments that enabled printing of multiple materials indicate that the technology can potentially offer a much wider design space beyond unusual shaping. Here we show that a new dimension in this design space can be exploited through the control of the orientation of anisotropic particles used as building blocks during a direct ink-writing process. Particle orientation control is demonstrated by applying low magnetic fields on deposited inks pre-loaded with magnetized stiff platelets. Multimaterial dispensers and a two-component mixing unit provide additional control over the local composition of the printed material. The five-dimensional design space covered by the proposed multimaterial magnetically assisted 3D printing platform (MM-3D printing) opens the way towards the manufacturing of functional heterogeneous materials with exquisite microstructural features thus far only accessible by biological materials grown in nature.

  18. Thermal Control Subsystem Design for the Avionics of a Space Station Payload

    NASA Technical Reports Server (NTRS)

    Moran, Matthew E.

    1996-01-01

    A case study of the thermal control subsystem development for a space based payload is presented from the concept stage through preliminary design. This payload, the Space Acceleration Measurement System 2 (SAMS-2), will measure the acceleration environment at select locations within the International Space Station. Its thermal control subsystem must maintain component temperatures within an acceptable range over a 10 year life span, while restricting accessible surfaces to touch temperature limits and insuring fail safe conditions in the event of loss of cooling. In addition to these primary design objectives, system level requirements and constraints are imposed on the payload, many of which are driven by multidisciplinary issues. Blending these issues into the overall system design required concurrent design sessions with the project team, iterative conceptual design layouts, thermal analysis and modeling, and hardware testing. Multiple tradeoff studies were also performed to investigate the many options which surfaced during the development cycle.

  19. Fiber optic configurations for local area networks

    NASA Technical Reports Server (NTRS)

    Nassehi, M. M.; Tobagi, F. A.; Marhic, M. E.

    1985-01-01

    A number of fiber optic configurations for a new class of demand assignment multiple-access local area networks requiring a physical ordering among stations are proposed. In such networks, the data transmission and linear-ordering functions may be distinguished and be provided by separate data and control subnetworks. The configurations proposed for the data subnetwork are based on the linear, star, and tree topologies. To provide the linear-ordering function, the control subnetwork must always have a linear unidirectional bus structure. Due to the reciprocity and excess loss of optical couplers, the number of stations that can be accommodated on a linear fiber optic bus is severely limited. Two techniques are proposed to overcome this limitation. For each of the data and control subnetwork configurations, the maximum number of stations as a function of the power margin, for both reciprocal and nonreciprocal couplers, is computed.

  20. Air Traffic Control Improvement Using Prioritized CSMA

    NASA Technical Reports Server (NTRS)

    Robinson, Daryl C.

    2001-01-01

    Version 7 simulations of the industry-standard network simulation software "OPNET" are presented of two applications of the Aeronautical Telecommunications Network (ATN), Controller Pilot Data Link Communications (CPDLC) and Automatic Dependent Surveillance-Broadcast mode (ADS-B), over VHF Data Link mode 2 (VDL-2). Communication is modeled for air traffic between just three cities. All aircraft are assumed to have the same equipage. The simulation involves Air Traffic Control (ATC) ground stations and 105 aircraft taking off, flying realistic free-flight trajectories, and landing in a 24-hr period. All communication is modeled as unreliable. Collision-less, prioritized carrier sense multiple access (CSMA) is successfully tested. The statistics presented include latency, queue length, and packet loss. This research may show that a communications system simpler than the currently accepted standard envisioned may not only suffice, but also surpass performance of the standard at a lower cost of deployment.

  1. Cloning of DOG1, a quantitative trait locus controlling seed dormancy in Arabidopsis.

    PubMed

    Bentsink, Leónie; Jowett, Jemma; Hanhart, Corrie J; Koornneef, Maarten

    2006-11-07

    Genetic variation for seed dormancy in nature is a typical quantitative trait controlled by multiple loci on which environmental factors have a strong effect. Finding the genes underlying dormancy quantitative trait loci is a major scientific challenge, which also has relevance for agriculture and ecology. In this study we describe the identification of the DELAY OF GERMINATION 1 (DOG1) gene previously identified as a quantitative trait locus involved in the control of seed dormancy. This gene was isolated by a combination of positional cloning and mutant analysis and is absolutely required for the induction of seed dormancy. DOG1 is a member of a small gene family of unknown molecular function, with five members in Arabidopsis. The functional natural allelic variation present in Arabidopsis is caused by polymorphisms in the cis-regulatory region of the DOG1 gene and results in considerable expression differences between the DOG1 alleles of the accessions analyzed.

  2. Emulating weak localization using a solid-state quantum circuit.

    PubMed

    Chen, Yu; Roushan, P; Sank, D; Neill, C; Lucero, Erik; Mariantoni, Matteo; Barends, R; Chiaro, B; Kelly, J; Megrant, A; Mutus, J Y; O'Malley, P J J; Vainsencher, A; Wenner, J; White, T C; Yin, Yi; Cleland, A N; Martinis, John M

    2014-10-14

    Quantum interference is one of the most fundamental physical effects found in nature. Recent advances in quantum computing now employ interference as a fundamental resource for computation and control. Quantum interference also lies at the heart of sophisticated condensed matter phenomena such as Anderson localization, phenomena that are difficult to reproduce in numerical simulations. Here, employing a multiple-element superconducting quantum circuit, with which we manipulate a single microwave photon, we demonstrate that we can emulate the basic effects of weak localization. By engineering the control sequence, we are able to reproduce the well-known negative magnetoresistance of weak localization as well as its temperature dependence. Furthermore, we can use our circuit to continuously tune the level of disorder, a parameter that is not readily accessible in mesoscopic systems. Demonstrating a high level of control, our experiment shows the potential for employing superconducting quantum circuits as emulators for complex quantum phenomena.

  3. Expert system for controlling plant growth in a contained environment

    NASA Technical Reports Server (NTRS)

    May, George A. (Inventor); Lanoue, Mark Allen (Inventor); Bethel, Matthew (Inventor); Ryan, Robert E. (Inventor)

    2011-01-01

    In a system for optimizing crop growth, vegetation is cultivated in a contained environment, such as a greenhouse, an underground cavern or other enclosed space. Imaging equipment is positioned within or about the contained environment, to acquire spatially distributed crop growth information, and environmental sensors are provided to acquire data regarding multiple environmental conditions that can affect crop development. Illumination within the contained environment, and the addition of essential nutrients and chemicals are in turn controlled in response to data acquired by the imaging apparatus and environmental sensors, by an "expert system" which is trained to analyze and evaluate crop conditions. The expert system controls the spatial and temporal lighting pattern within the contained area, and the timing and allocation of nutrients and chemicals to achieve optimized crop development. A user can access the "expert system" remotely, to assess activity within the growth chamber, and can override the "expert system".

  4. Expert system for controlling plant growth in a contained environment

    NASA Technical Reports Server (NTRS)

    May, George A. (Inventor); Lanoue, Mark Allen (Inventor); Bethel, Matthew (Inventor); Ryan, Robert E. (Inventor)

    2009-01-01

    In a system for optimizing crop growth, vegetation is cultivated in a contained environment, such as a greenhouse, an underground cavern or other enclosed space. Imaging equipment is positioned within or about the contained environment, to acquire spatially distributed crop growth information, and environmental sensors are provided to acquire data regarding multiple environmental conditions that can affect crop development. Illumination within the contained environment, and the addition of essential nutrients and chemicals are in turn controlled in response to data acquired by the imaging apparatus and environmental sensors, by an ''expert system'' which is trained to analyze and evaluate crop conditions. The expert system controls the spatial and temporal lighting pattern within the contained area, and the timing and allocation of nutrients and chemicals to achieve optimized crop development. A user can access the ''expert system'' remotely, to assess activity within the growth chamber, and can override the ''expert system''.

  5. Multimaterial magnetically assisted 3D printing of composite materials

    NASA Astrophysics Data System (ADS)

    Kokkinis, Dimitri; Schaffner, Manuel; Studart, André R.

    2015-10-01

    3D printing has become commonplace for the manufacturing of objects with unusual geometries. Recent developments that enabled printing of multiple materials indicate that the technology can potentially offer a much wider design space beyond unusual shaping. Here we show that a new dimension in this design space can be exploited through the control of the orientation of anisotropic particles used as building blocks during a direct ink-writing process. Particle orientation control is demonstrated by applying low magnetic fields on deposited inks pre-loaded with magnetized stiff platelets. Multimaterial dispensers and a two-component mixing unit provide additional control over the local composition of the printed material. The five-dimensional design space covered by the proposed multimaterial magnetically assisted 3D printing platform (MM-3D printing) opens the way towards the manufacturing of functional heterogeneous materials with exquisite microstructural features thus far only accessible by biological materials grown in nature.

  6. The history of Belgian assisted reproduction technology cycle registration and control: a case study in reducing the incidence of multiple pregnancy.

    PubMed

    De Neubourg, D; Bogaerts, K; Wyns, C; Albert, A; Camus, M; Candeur, M; Degueldre, M; Delbaere, A; Delvigne, A; De Sutter, P; Dhont, M; Dubois, M; Englert, Y; Gillain, N; Gordts, S; Hautecoeur, W; Lesaffre, E; Lejeune, B; Leroy, F; Ombelet, W; Perrier D'Hauterive, S; Vandekerckhove, F; Van der Elst, J; D'Hooghe, T

    2013-10-01

    What is the effect of a legal limitation of the number of embryos that can be transferred in an assisted reproductive technology (ART) cycle on the multiple delivery rate? The Belgian national register shows that the introduction of reimbursement of ART laboratory costs in July 2003, and the imposition of a legal limitation of the number of embryos transferred in the same year, were associated with a >50% reduction of the multiple pregnancy rate from 27 to 11% between 2003 and the last assessment in 2010, without any reduction of the pregnancy rate per cycle. Individual Belgian IVF centres have published their results since the implementation of the law, and these show a decrease in the multiple pregnancy rate on a centre by centre basis. However, the overall national picture remains unpublished. Cohort study from 1990 to 2010 of all ART cycles in Belgium (2685 cycles in 1990 evolving to 19 110 cycles in 2010), with a retrospective analysis from 1990 to 2000 and prospective online data collection since 2001. Registration evolved from paper written reports per centre to a compulsory online registration of all ART cycles. From 2001 up to mid-2009, data were collected from Excel spread sheets or MS Access files into an MS Access database. Since mid-2009, data collection is done via a remote and secured web-based system (www.belrap.be) where centres can upload their data and get immediate feedback about missing data, errors and inconsistencies. National Belgian registration data show that reimbursement of IVF laboratory costs in July 2003, coupled to a legal limitation in the number of embryos transferred in utero, were associated with a 50% reduction of the multiple pregnancy rate from 27 to 11% without reduction of the pregnancy rate per cycle, and with an increase in the number of fresh and frozen ART cycles due to improved access to treatment. There is potential underreporting of complications of ART treatment, pregnancy outcome and neonatal health. Over the 20 years of registration, the pregnancy rate has remained constant, despite the reduction in the number of embryos transferred, optimization of laboratory procedures and stimulation protocols, introduction of quality systems and implementation of the EU Tissue Directive over the period 2004-2010. No external funding was sought for this study. None of the authors has any conflict of interest to declare.

  7. 75 FR 16507 - In the Matter of Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-01

    ... Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same... synchronous dynamic random access memory controllers and products containing same by reason of infringement of... semiconductor chips having synchronous dynamic random access memory controllers and products containing same...

  8. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  9. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    PubMed

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  10. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  11. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  12. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  13. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  14. The spectra program library: A PC based system for gamma-ray spectra analysis and INAA data reduction

    USGS Publications Warehouse

    Baedecker, P.A.; Grossman, J.N.

    1995-01-01

    A PC based system has been developed for the analysis of gamma-ray spectra and for the complete reduction of data from INAA experiments, including software to average the results from mulitple lines and multiple countings and to produce a final report of analysis. Graphics algorithms may be called for the analysis of complex spectral features, to compare the data from alternate photopeaks and to evaluate detector performance during a given counting cycle. A database of results for control samples can be used to prepare quality control charts to evaluate long term precision and to search for systemic variations in data on reference samples as a function of time. The entire software library can be accessed through a user-friendly menu interface with internal help.

  15. Web Transfer Over Satellites Being Improved

    NASA Technical Reports Server (NTRS)

    Allman, Mark

    1999-01-01

    Extensive research conducted by NASA Lewis Research Center's Satellite Networks and Architectures Branch and the Ohio University has demonstrated performance improvements in World Wide Web transfers over satellite-based networks. The use of a new version of the Hypertext Transfer Protocol (HTTP) reduced the time required to load web pages over a single Transmission Control Protocol (TCP) connection traversing a satellite channel. However, an older technique of simultaneously making multiple requests of a given server has been shown to provide even faster transfer time. Unfortunately, the use of multiple simultaneous requests has been shown to be harmful to the network in general. Therefore, we are developing new mechanisms for the HTTP protocol which may allow a single request at any given time to perform as well as, or better than, multiple simultaneous requests. In the course of study, we also demonstrated that the time for web pages to load is at least as short via a satellite link as it is via a standard 28.8-kbps dialup modem channel. This demonstrates that satellites are a viable means of accessing the Internet.

  16. A Generic Authentication LoA Derivation Model

    NASA Astrophysics Data System (ADS)

    Yao, Li; Zhang, Ning

    One way of achieving a more fine-grained access control is to link an authentication level of assurance (LoA) derived from a requester’s authentication instance to the authorisation decision made to the requester. To realise this vision, there is a need for designing a LoA derivation model that supports the use and quantification of multiple LoA-effecting attributes, and analyse their composite effect on a given authentication instance. This paper reports the design of such a model, namely a generic LoA derivation model (GEA- LoADM). GEA-LoADM takes into account of multiple authentication attributes along with their relationships, abstracts the composite effect by the multiple attributes into a generic value, authentication LoA, and provides algorithms for the run-time derivation of LoA. The algorithms are tailored to reflect the relationships among the attributes involved in an authentication instance. The model has a number of valuable properties, including flexibility and extensibility; it can be applied to different application contexts and support easy addition of new attributes and removal of obsolete ones.

  17. So you think you've designed an effective recruitment protocol?

    PubMed

    Green, Cara; Vandall-Walker, Virginia

    2017-03-22

    Background Recruiting acutely ill patients to participate in research can be challenging. This paper outlines the difficulties the first author encountered in a study and the steps she took to overcome problems with research ethics, gain access to participants and implement a recruitment protocol in multiple hospitals. It also compares these steps with literature related to recruitment. Aim To inform and inspire neophyte researchers about the need for planning and resilience when dealing with recruitment challenges in multiple hospitals. Discussion The multiple enablers and barriers to the successful implementation of a hospital-based study recruitment protocol are explored based on a neophyte researcher's optimistic assumptions about this stage of the study. Conclusions Perseverance, adequately planning for contingencies, and accepting the barriers and challenges to recruitment are essential for completing one's research study and ensuring fulfilment as a researcher. Implications for practice Healthcare students carrying out research require adequate knowledge about conducting hospital-based, patient research to inform their recruitment plan. Maximising control over recruitment, allowing for adequate time to conduct data collection, and maintaining a good work ethic will help to ensure success.

  18. Identification of ribozymes within a ribozyme library that efficiently cleave a long substrate RNA.

    PubMed Central

    Campbell, T B; Cech, T R

    1995-01-01

    Positions 2-6 of the substrate-binding internal guide sequence (IGS) of the L-21 Sca I form of the Tetrahymena thermophila intron were mutagenized to produce a GN5 IGS library. Ribozymes within the GN5 library capable of efficient cleavage of an 818-nt human immunodeficiency virus type 1 vif-vpr RNA, at 37 degrees C, were identified by ribozyme-catalyzed guanosine addition to the 3' cleavage product. Three ribozymes (IGS = GGGGCU, GGCUCC, and GUGGCU) within the GN5 library that actively cleaved the long substrate were characterized kinetically and compared to the wild-type ribozyme (GGAGGG) and two control ribozymes (GGAGUC and GGAGAU). The two control ribozymes have specific sites within the long substrate, but were not identified during screening of the library. Under single-turnover conditions, ribozymes GGGGCU, GGCUCC, and GUGGCU cleaved the 818-nt substrate 4- to 200-fold faster than control ribozymes. Short cognate substrates, which should be structureless and therefore accessible to ribozyme binding, were cleaved at similar rates by all ribozymes except GGGGCU, which showed a fourfold rate enhancement. The rate of cleavage of long relative to short substrate under single-turnover conditions suggests that GGCUCC and GUGGCU were identified because of accessibility to their specific cleavage sites within the long substrate (substrate-specific effects), whereas GGGGCU was identified because of an enhanced rate of substrate binding despite a less accessible site in the long substrate. Even though screening was performed with 100-fold excess substrate (relative to total ribozyme), the rate of multiple-turnover catalysis did not contribute to identification of trans-cleaving ribozymes in the GN5 library. PMID:7489519

  19. Dual-balanced detection scheme with optical hard-limiters in an optical code division multiple access system

    NASA Astrophysics Data System (ADS)

    Liu, Maw-Yang; Hsu, Yi-Kai

    2017-03-01

    Three-arm dual-balanced detection scheme is studied in an optical code division multiple access system. As the MAI and beat noise are the main deleterious source of system performance, we utilize optical hard-limiters to alleviate such channel impairment. In addition, once the channel condition is improved effectively, the proposed two-dimensional error correction code can remarkably enhance the system performance. In our proposed scheme, the optimal thresholds of optical hard-limiters and decision circuitry are fixed, and they will not change with other system parameters. Our proposed scheme can accommodate a large number of users simultaneously and is suitable for burst traffic with asynchronous transmission. Therefore, it is highly recommended as the platform for broadband optical access network.

  20. Orchestrating Distributed Resource Ensembles for Petascale Science

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Baldin, Ilya; Mandal, Anirban; Ruth, Paul

    2014-04-24

    Distributed, data-intensive computational science applications of interest to DOE scientific com- munities move large amounts of data for experiment data management, distributed analysis steps, remote visualization, and accessing scientific instruments. These applications need to orchestrate ensembles of resources from multiple resource pools and interconnect them with high-capacity multi- layered networks across multiple domains. It is highly desirable that mechanisms are designed that provide this type of resource provisioning capability to a broad class of applications. It is also important to have coherent monitoring capabilities for such complex distributed environments. In this project, we addressed these problems by designing an abstractmore » API, enabled by novel semantic resource descriptions, for provisioning complex and heterogeneous resources from multiple providers using their native provisioning mechanisms and control planes: computational, storage, and multi-layered high-speed network domains. We used an extensible resource representation based on semantic web technologies to afford maximum flexibility to applications in specifying their needs. We evaluated the effectiveness of provisioning using representative data-intensive ap- plications. We also developed mechanisms for providing feedback about resource performance to the application, to enable closed-loop feedback control and dynamic adjustments to resource allo- cations (elasticity). This was enabled through development of a novel persistent query framework that consumes disparate sources of monitoring data, including perfSONAR, and provides scalable distribution of asynchronous notifications.« less

  1. The Genetic Basis of Upland/Lowland Ecotype Divergence in Switchgrass (Panicum virgatum)

    DOE PAGES

    Milano, E. R.; Lowry, D. B.; Juenger, T. E.

    2016-09-09

    The evolution of locally adapted ecotypes is a common phenomenon that generates diversity within plant species. However, we know surprisingly little about the genetic mechanisms underlying the locally adapted traits involved in ecotype formation. The genetic architecture underlying locally adapted traits dictates how an organism will respond to environmental selection pressures, and has major implications for evolutionary ecology, conservation, and crop breeding. To understand the genetic architecture underlying the divergence of switchgrass (Panicum virgatum) ecotypes, we constructed a genetic mapping population through a four-way outbred cross between two northern upland and two southern lowland accessions. Trait segregation in this mappingmore » population was largely consistent with multiple independent loci controlling the suite of traits that characterizes ecotype divergence. We assembled a joint linkage map using ddRADseq, and mapped quantitative trait loci (QTL) for traits that are divergent between ecotypes, including flowering time, plant size, physiological processes, and disease resistance. Overall, we found that most QTL had small to intermediate effects. While we identified colocalizing QTL for multiple traits, we did not find any large-effect QTL that clearly controlled multiple traits through pleiotropy or tight physical linkage. These results indicate that ecologically important traits in switchgrass have a complex genetic basis, and that similar loci may underlie divergence across the geographic range of the ecotypes.« less

  2. The Genetic Basis of Upland/Lowland Ecotype Divergence in Switchgrass (Panicum virgatum)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Milano, E. R.; Lowry, D. B.; Juenger, T. E.

    The evolution of locally adapted ecotypes is a common phenomenon that generates diversity within plant species. However, we know surprisingly little about the genetic mechanisms underlying the locally adapted traits involved in ecotype formation. The genetic architecture underlying locally adapted traits dictates how an organism will respond to environmental selection pressures, and has major implications for evolutionary ecology, conservation, and crop breeding. To understand the genetic architecture underlying the divergence of switchgrass (Panicum virgatum) ecotypes, we constructed a genetic mapping population through a four-way outbred cross between two northern upland and two southern lowland accessions. Trait segregation in this mappingmore » population was largely consistent with multiple independent loci controlling the suite of traits that characterizes ecotype divergence. We assembled a joint linkage map using ddRADseq, and mapped quantitative trait loci (QTL) for traits that are divergent between ecotypes, including flowering time, plant size, physiological processes, and disease resistance. Overall, we found that most QTL had small to intermediate effects. While we identified colocalizing QTL for multiple traits, we did not find any large-effect QTL that clearly controlled multiple traits through pleiotropy or tight physical linkage. These results indicate that ecologically important traits in switchgrass have a complex genetic basis, and that similar loci may underlie divergence across the geographic range of the ecotypes.« less

  3. Who's Got the Booze? The Role of Access to Alcohol in the Relations Between Social Status and Individual Use.

    PubMed

    Deutsch, Arielle R; Steinley, Douglas; Sher, Kenneth J; Slutske, Wendy S

    2017-09-01

    The findings of previous research that examined relationships between popularity and alcohol use in adolescents have been mixed, and few hypotheses have proposed mechanisms for this relationship. The current study expands on previous literature (a) by examining a possible mechanism that can explain the relation between popularity and alcohol use (home access to alcohol) and (b) by using another sociometric measure ("betweenness"), beyond popularity, that may relate more to home alcohol access. Using network-level data from adolescents in 9th-11th grades in eight schools within two in-home waves of the National Longitudinal Study of Adolescent to Adult Health (Add Health), we examined two sociometric measures of social status: popularity (number of schoolmates who nominated participants as a friend) and betweenness (level of ties participants have to multiple social subgroups within a network). Betweenness, but not popularity, related to later alcohol use. Having home access to alcohol positively related to later alcohol use, and having friends with home access to alcohol negatively related to later alcohol use. Alcohol access was also related to later sociometric status. Friends' alcohol access negatively related to later betweenness, and personal alcohol access moderated other pathways predicting betweenness. Betweenness appears to play a unique role in the association between social status and alcohol use in adolescent social networks. This is potentially tied to specific ways in which adolescents may be able to access alcohol (through home or through friends with access at home). More research is necessary to examine the ways in which multiple sociometric statuses relate to the contexts in which adolescents access and use alcohol.

  4. Development of a State Machine Sequencer for the Keck Interferometer: Evolution, Development and Lessons Learned using a CASE Tool Approach

    NASA Technical Reports Server (NTRS)

    Rede, Leonard J.; Booth, Andrew; Hsieh, Jonathon; Summer, Kellee

    2004-01-01

    This paper presents a discussion of the evolution of a sequencer from a simple EPICS (Experimental Physics and Industrial Control System) based sequencer into a complex implementation designed utilizing UML (Unified Modeling Language) methodologies and a CASE (Computer Aided Software Engineering) tool approach. The main purpose of the sequencer (called the IF Sequencer) is to provide overall control of the Keck Interferometer to enable science operations be carried out by a single operator (and/or observer). The interferometer links the two 10m telescopes of the W. M. Keck Observatory at Mauna Kea, Hawaii. The IF Sequencer is a high-level, multi-threaded, Hare1 finite state machine, software program designed to orchestrate several lower-level hardware and software hard real time subsystems that must perform their work in a specific and sequential order. The sequencing need not be done in hard real-time. Each state machine thread commands either a high-speed real-time multiple mode embedded controller via CORB A, or slower controllers via EPICS Channel Access interfaces. The overall operation of the system is simplified by the automation. The UML is discussed and our use of it to implement the sequencer is presented. The decision to use the Rhapsody product as our CASE tool is explained and reflected upon. Most importantly, a section on lessons learned is presented and the difficulty of integrating CASE tool automatically generated C++ code into a large control system consisting of multiple infrastructures is presented.

  5. Development of a state machine sequencer for the Keck Interferometer: evolution, development, and lessons learned using a CASE tool approach

    NASA Astrophysics Data System (ADS)

    Reder, Leonard J.; Booth, Andrew; Hsieh, Jonathan; Summers, Kellee R.

    2004-09-01

    This paper presents a discussion of the evolution of a sequencer from a simple Experimental Physics and Industrial Control System (EPICS) based sequencer into a complex implementation designed utilizing UML (Unified Modeling Language) methodologies and a Computer Aided Software Engineering (CASE) tool approach. The main purpose of the Interferometer Sequencer (called the IF Sequencer) is to provide overall control of the Keck Interferometer to enable science operations to be carried out by a single operator (and/or observer). The interferometer links the two 10m telescopes of the W. M. Keck Observatory at Mauna Kea, Hawaii. The IF Sequencer is a high-level, multi-threaded, Harel finite state machine software program designed to orchestrate several lower-level hardware and software hard real-time subsystems that must perform their work in a specific and sequential order. The sequencing need not be done in hard real-time. Each state machine thread commands either a high-speed real-time multiple mode embedded controller via CORBA, or slower controllers via EPICS Channel Access interfaces. The overall operation of the system is simplified by the automation. The UML is discussed and our use of it to implement the sequencer is presented. The decision to use the Rhapsody product as our CASE tool is explained and reflected upon. Most importantly, a section on lessons learned is presented and the difficulty of integrating CASE tool automatically generated C++ code into a large control system consisting of multiple infrastructures is presented.

  6. 76 FR 7213 - ACRAnet, Inc.; SettlementOne Credit Corporation, and Sackett National Holdings, Inc.; Fajilan and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-09

    ... allege that hackers were able to exploit vulnerabilities in the computer networks of multiple end user clients, putting all consumer reports in those networks at risk. In multiple breaches, hackers accessed...

  7. Looking to the future of new media in health marketing: deriving propositions based on traditional theories.

    PubMed

    Della, Lindsay J; Eroglu, Dogan; Bernhardt, Jay M; Edgerton, Erin; Nall, Janice

    2008-01-01

    Market trend data show that the media marketplace continues to rapidly evolve. Recent research shows that substantial portions of the U.S. media population are "new media" users. Today, more than ever before, media consumers are exposed to multiple media at the same point in time, encouraged to participate in media content generation, and challenged to learn, access, and use the new media that are continually entering the market. These media trends have strong implications for how consumers of health information access, process, and retain health-related knowledge. In this article we review traditional information processing models and theories of interpersonal and mass media access and consumption. We make several theory-based propositions for how traditional information processing and media consumption concepts will function as new media usage continues to increase. These propositions are supported by new media usage data from the Centers for Disease Control and Prevention's entry into the new media market (e.g., podcasting, virtual events, blogging, and webinars). Based on these propositions, we conclude by presenting both opportunities and challenges that public health communicators and marketers will face in the future.

  8. Bearer channel control protocol for the dynamic VB5.2 interface in ATM access networks

    NASA Astrophysics Data System (ADS)

    Fragoulopoulos, Stratos K.; Mavrommatis, K. I.; Venieris, Iakovos S.

    1996-12-01

    In the multi-vendor systems, a customer connected to an Access network (AN) must be capable of selecting a specific Service Node (SN) according to the services the SN provides. The multiplicity of technologically varying AN calls for the definition of a standard reference point between the AN and the SN widely known as the VB interface. Two versions are currently offered. The VB5.1 is simpler to implement but is not as flexible as the VB5.2, which supports switched connections. The VB5.2 functionality is closely coupled to the Broadband Bearer Channel Connection Protocol (B-BCCP). The B-BCCP is used for conveying the necessary information for dynamic resource allocation, traffic policing and routing in the AN as well as for information exchange concerning the status of the AN before a new call is established by the SN. By relying on such a protocol for the exchange of information instead of intercepting and interpreting signalling messages in the AN, the architecture of the AN is simplified because the functionality related to processing is not duplicated. In this paper a prominent B- BCCP candidate is defined, called the Service node Access network Interaction Protocol.

  9. Glycemic Control Associated With Secure Patient-Provider Messaging Within a Shared Electronic Medical Record

    PubMed Central

    Harris, Lynne T.; Koepsell, Thomas D.; Haneuse, Sebastien J.; Martin, Diane P.; Ralston, James D.

    2013-01-01

    OBJECTIVE To study differences in glycemic control and HbA1c testing associated with use of secure electronic patient-provider messaging. We hypothesized that messaging use would be associated with better glycemic control and a higher rate of adherence to HbA1c testing recommendations. RESEARCH DESIGN AND METHODS Retrospective observational study of secure messaging at Group Health, a large nonprofit health care system. Our analysis included adults with diabetes who had registered for access to a shared electronic medical record (SMR) between 2003 and 2006. We fit log-linear regression models, using generalized estimating equations, to estimate the adjusted rate ratio of meeting three indicators of glycemic control (HbA1c <7%, HbA1c <8%, and HbA1c >9%) and HbA1c testing adherence by level of previous messaging use. Multiple imputation and inverse probability weights were used to account for missing data. RESULTS During the study period, 6,301 adults with diabetes registered for access to the SMR. Of these individuals, 74% used messaging at least once during that time. Frequent use of messaging during the previous calendar quarter was associated with a higher rate of good glycemic control (HbA1c <7%: rate ratio, 1.26 [95% CI, 1.15–1.37]) and a higher rate testing adherence (1.20 [1.15–1.25]). CONCLUSIONS Among SMR users, recent and frequent messaging use was associated with better glycemic control and a higher rate of HbA1c testing adherence. These results suggest that secure messaging may facilitate important processes of care and help some patients to achieve or maintain adequate glycemic control. PMID:23628618

  10. Analog and digital transport of RF channels over converged 5G wireless-optical networks

    NASA Astrophysics Data System (ADS)

    Binh, Le Nguyen

    2016-02-01

    Under the exponential increase demand by the emerging 5G wireless access networking and thus data-center based Internet, novel and economical transport of RF channels to and from wireless access systems. This paper presents the transport technologies of RF channels over the analog and digital domain so as to meet the demands of the transport capacity reaching multi-Tbps, in the followings: (i) The convergence of 5G broadband wireless and optical networks and its demands on capacity delivery and network structures; (ii) Analog optical technologies for delivery of both the information and RF carriers to and from multiple-input multiple-output (MIMO) antenna sites so as to control the beam steering of MIMO antenna in the mmW at either 28.6 GHz and 56.8 GHz RF carrier and delivery of channels of aggregate capacity reaching several Tbps; (ii) Transceiver employing advanced digital modulation formats and digital signal processing (DSP) so as to provide 100G and beyond transmission rate to meet the ultra-high capacity demands with flexible spectral grids, hence pay-on-demand services. The interplay between DSP-based and analog transport techniques is examined; (iii) Transport technologies for 5G cloud access networks and associate modulation and digital processing techniques for capacity efficiency; and (iv) Finally the integrated optic technologies with novel lasers, comb generators and simultaneous dual function photonic devices for both demultiplexing/multiplexing and modulation are proposed, hence a system on chip structure can be structured. Quantum dot lasers and matrixes of micro ring resonators are integrated on the same Si-on-Silica substrate are proposed and described.

  11. Current challenges and possible solutions to improve access to care and treatment for hepatitis C infection in Vietnam: a systematic review.

    PubMed

    Berto, Alessandra; Day, Jeremy; Van Vinh Chau, Nguyen; Thwaites, Guy E; My, Ngoc Nghiem; Baker, Stephen; Darton, Thomas C

    2017-04-11

    Hepatitis C infection is a major public health concern in low- and middle-income countries where an estimated 71.1 million individuals are living with chronic infection. The World Health Organization (WHO) has recently released new guidance for hepatitis C virus (HCV) treatment programs, which include improving the access to new direct-acting antiviral agents. In Vietnam, a highly populated middle-income country, the seroprevalence of HCV infection is approximately 4% and multiple genotypes co-circulate in the general population. Here we review what is currently known regarding the epidemiology of HCV in Vietnam and outline options for reducing the significant burden of morbidity and mortality in our setting. We performed a systematic review of the currently available literature to evaluate what has been achieved to date with efforts to control HCV infection in Vietnam. This search retrieved few publications specific to Vietnam indicating a significant gap in baseline epidemiological and public health data. Key knowledge gaps identified included an understanding of the prevalence in specific high-risk groups, characterization of circulating HCV genotypes in the population and likely response to treatment, and the extent to which HCV treatment is available, accessed and utilized. We conclude that there is an urgent need to perform up to date assessments of HCV disease burden in Vietnam, especially in high-risk groups, in whom incidence is high and cross infection with multiple genotypes is likely to be frequent. Coordinating renewed surveillance measures with forthcoming HCV treatment studies should initiate the traction required to achieve the WHO goal of eliminating HCV as a public health threat by 2030, at least in this region.

  12. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  13. An Evaluation of a Three-Component Multiple Schedule to Indicate Attention Availability

    ERIC Educational Resources Information Center

    Nava, Maria J.; Vargo, Kristina K.; Babino, Misti M.

    2016-01-01

    Students may engage in high rates of social approach responses at inappropriate times throughout the school day. One intervention that has been used to teach students appropriate and inappropriate times to access attention is a multiple schedule of reinforcement. In this study, we evaluated the efficacy of a multiple schedule that indicated when…

  14. Development of a Prototype System for Accessing Linked NCES Data. Working Paper Series.

    ERIC Educational Resources Information Center

    Salvucci, Sameena; Wenck, Stephen; Tyson, James

    A project has been developed to advance the capabilities of the National Center for Education Statistics (NCES) to support the dissemination of linked data from multiple surveys, multiple components within a survey, and multiple time points. An essential element of this study is the development of a software prototype system to facilitate NCES…

  15. Method and device for maximizing memory system bandwidth by accessing data in a dynamically determined order

    NASA Technical Reports Server (NTRS)

    Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)

    2000-01-01

    A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.

  16. Unique Access to Learning

    ERIC Educational Resources Information Center

    Goble, Don

    2009-01-01

    This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…

  17. Line drawing titled 'TDRS Spacecraft On-Orbit Configuration'

    NASA Technical Reports Server (NTRS)

    1988-01-01

    Line drawing titled 'TDRS Spacecraft On-Orbit Configuration' identifies the various tracking and data relay satellite (TDRS) components (solar arrays, C-Band antenna, K-Band antenna, space ground link (SGL) antenna, single access antennas, multiple access antenna, omni antenna, solar sail). A TDRS will be deployed during the STS-26 mission. Including the space shuttle, the TDRS will be equipped to support up to 26 user spacecraft simultaneously. It will provide two types of service: 1) multiple access which can relay data from as many as 20 low data rate (100 bits per second to 50 kilobits per second) user satellites simultaneously and; 2) single access which will provide two high data rate (to 300 megabits per second) communication relays. The TDRS is three-axis stabilizrd with the body fixed antennas pointing constantly at the Earth while the solar arrays track the Sun. TDR satellites do no processing of user traffic in either direction. Rather, they operate as 'bent pipe' repeaters,

  18. gsSKAT: Rapid gene set analysis and multiple testing correction for rare-variant association studies using weighted linear kernels.

    PubMed

    Larson, Nicholas B; McDonnell, Shannon; Cannon Albright, Lisa; Teerlink, Craig; Stanford, Janet; Ostrander, Elaine A; Isaacs, William B; Xu, Jianfeng; Cooney, Kathleen A; Lange, Ethan; Schleutker, Johanna; Carpten, John D; Powell, Isaac; Bailey-Wilson, Joan E; Cussenot, Olivier; Cancel-Tassin, Geraldine; Giles, Graham G; MacInnis, Robert J; Maier, Christiane; Whittemore, Alice S; Hsieh, Chih-Lin; Wiklund, Fredrik; Catalona, William J; Foulkes, William; Mandal, Diptasri; Eeles, Rosalind; Kote-Jarai, Zsofia; Ackerman, Michael J; Olson, Timothy M; Klein, Christopher J; Thibodeau, Stephen N; Schaid, Daniel J

    2017-05-01

    Next-generation sequencing technologies have afforded unprecedented characterization of low-frequency and rare genetic variation. Due to low power for single-variant testing, aggregative methods are commonly used to combine observed rare variation within a single gene. Causal variation may also aggregate across multiple genes within relevant biomolecular pathways. Kernel-machine regression and adaptive testing methods for aggregative rare-variant association testing have been demonstrated to be powerful approaches for pathway-level analysis, although these methods tend to be computationally intensive at high-variant dimensionality and require access to complete data. An additional analytical issue in scans of large pathway definition sets is multiple testing correction. Gene set definitions may exhibit substantial genic overlap, and the impact of the resultant correlation in test statistics on Type I error rate control for large agnostic gene set scans has not been fully explored. Herein, we first outline a statistical strategy for aggregative rare-variant analysis using component gene-level linear kernel score test summary statistics as well as derive simple estimators of the effective number of tests for family-wise error rate control. We then conduct extensive simulation studies to characterize the behavior of our approach relative to direct application of kernel and adaptive methods under a variety of conditions. We also apply our method to two case-control studies, respectively, evaluating rare variation in hereditary prostate cancer and schizophrenia. Finally, we provide open-source R code for public use to facilitate easy application of our methods to existing rare-variant analysis results. © 2017 WILEY PERIODICALS, INC.

  19. Cluster randomized controlled trial of a mobile market intervention to increase fruit and vegetable intake among adults in lower-income communities in North Carolina.

    PubMed

    Leone, Lucia A; Tripicchio, Gina L; Haynes-Maslow, Lindsey; McGuirt, Jared; Grady Smith, Jacqueline S; Armstrong-Brown, Janelle; Gizlice, Ziya; Ammerman, Alice

    2018-01-05

    Poorer diets and subsequent higher rates of chronic disease among lower-income individuals may be partially attributed to reduced access to fresh fruits and vegetables (F&V) and other healthy foods. Mobile markets are an increasingly popular method for providing access to F&V in underserved communities, but evaluation efforts are limited. The purpose of this study was to determine the impact of Veggie Van (VV), a mobile produce market, on F&V intake in lower-income communities using a group randomized controlled trial. VV is a mobile produce market that sells reduced-cost locally grown produce and offers nutrition and cooking education. We recruited 12 sites in lower-income communities in North Carolina (USA) to host VV, randomizing them to receive VV immediately (intervention) or after the 6-month study period (delayed intervention control). Participants at each site completed baseline and follow-up surveys including F&V intake, perceived access to fresh F&V and self-efficacy for purchasing, preparing and eating F&V. We used multiple linear regression to calculate adjusted differences in outcomes while controlling for baseline values, education and clustering within site. Among 142 participants who completed the follow-up, baseline F&V intake was 3.48 cups/day for control and 3.33 for intervention. At follow-up, adjusted change in F&V consumption was 0.95 cups/day greater for intervention participants (p = 0.005), but was attenuated to 0.51 cups per day (p = 0.11) after removing extreme values. VV customers increased their F&V consumption by 0.41 cups/day (n = 30) compared to a 0.25 cups/day decrease for 111 non-customers (p = 0.04). Intervention participants did not show significant improvements in perceived access to fresh F&V, but increased their self-efficacy for working more F&V into snacks (p = 0.02), making up a vegetable dish with what they had on hand (p = 0.03), and cooking vegetables in a way that is appealing to their family (p = 0.048). Mobile markets may help improve F&V intake in lower-income communities. Clinicaltrials.gov ID# NCT03026608 retrospectively registered January 2, 2017.

  20. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  1. Optical beat interference noise reduction in OFDMA optical access link using self-homodyne balanced detection

    NASA Astrophysics Data System (ADS)

    Jung, Sang-Min; Won, Yong-Yuk; Han, Sang-Kook

    2013-12-01

    A Novel technique for reducing the OBI noise in optical OFDMA-PON uplink is presented. OFDMA is a multipleaccess/ multiplexing scheme that can provide multiplexing operation of user data streams onto the downlink sub-channels and uplink multiple access by means of dividing OFDM subcarriers as sub-channels. The main issue of high-speed, single-wavelength upstream OFDMA-PON arises from optical beating interference noise. Because the sub-channels are allocated dynamically to multiple access users over same nominal wavelength, it generates the optical beating interference among upstream signals. In this paper, we proposed a novel scheme using self-homodyne balanced detection in the optical line terminal (OLT) to reduce OBI noise which is generated in the uplink transmission of OFDMA-PON system. When multiple OFDMA sub-channels over the same nominal wavelength are received at the same time in the proposed architecture, OBI noises can be removed using balanced detection. Using discrete multitone modulation (DMT) to generate real valued OFDM signals, the proposed technique is verified through experimental demonstration.

  2. At-Home Transcranial Direct Current Stimulation (tDCS) With Telehealth Support for Symptom Control in Chronically-Ill Patients With Multiple Symptoms.

    PubMed

    Riggs, Alexa; Patel, Vaishali; Paneri, Bhaskar; Portenoy, Russell K; Bikson, Marom; Knotkova, Helena

    2018-01-01

    Transcranial direct current stimulation (tDCS) delivered in multiple sessions can reduce symptom burden, but access of chronically ill patients to tDCS studies is constrained by the burden of office-based tDCS administration. Expanded access to this therapy can be accomplished through the development of interventions that allow at-home tDCS applications. Objective: We describe the development and initial feasibility assessment of a novel intervention for the chronically ill that combines at-home tDCS with telehealth support. Methods: In the developmental phase, the tDCS procedure was adjusted for easy application by patients or their informal caregivers at home, and a tDCS protocol with specific elements for enhanced safety and remote adherence monitoring was created. Lay language instructional materials were written and revised based on expert feedback. The materials were loaded onto a tablet allowing for secure video-conferencing. The telehealth tablet was paired with an at-home tDCS device that allowed for remote dose control via electronic codes dispensed to patients prior to each session. tDCS was delivered in two phases: once daily on 10 consecutive days, followed by an as needed regimen for 20 days. Initial feasibility of this tDCS-telehealth system was evaluated in four patients with advanced chronic illness and multiple symptoms. Change in symptom burden and patient satisfaction were assessed with the Condensed Memorial Symptom Assessment Scale (CMSAS) and a tDCS user survey. Results: The telehealth-tDCS protocol includes one home visit and has seven patient-tailored elements and six elements enhancing safety monitoring. Replicable electrode placement at home without 10-20 EEG measurement is achieved via a headband that holds electrodes in a pre-determined position. There were no difficulties with patients' training, protocol adherence, or tolerability. A total of 60 tDCS sessions were applied. No session required discontinuation, and there were no adverse events. Data collection was feasible and there were no missing data. Satisfaction with the tDCS-telehealth procedure was high and the patients were comfortable using the system. Conclusion: At-home tDCS with telehealth support appears to be a feasible approach for the management of symptom burden in patients with chronic illness. Further studies to evaluate and optimize the protocol effectiveness for symptom-control outcomes are warranted.

  3. At-Home Transcranial Direct Current Stimulation (tDCS) With Telehealth Support for Symptom Control in Chronically-Ill Patients With Multiple Symptoms

    PubMed Central

    Riggs, Alexa; Patel, Vaishali; Paneri, Bhaskar; Portenoy, Russell K.; Bikson, Marom; Knotkova, Helena

    2018-01-01

    Transcranial direct current stimulation (tDCS) delivered in multiple sessions can reduce symptom burden, but access of chronically ill patients to tDCS studies is constrained by the burden of office-based tDCS administration. Expanded access to this therapy can be accomplished through the development of interventions that allow at-home tDCS applications. Objective: We describe the development and initial feasibility assessment of a novel intervention for the chronically ill that combines at-home tDCS with telehealth support. Methods: In the developmental phase, the tDCS procedure was adjusted for easy application by patients or their informal caregivers at home, and a tDCS protocol with specific elements for enhanced safety and remote adherence monitoring was created. Lay language instructional materials were written and revised based on expert feedback. The materials were loaded onto a tablet allowing for secure video-conferencing. The telehealth tablet was paired with an at-home tDCS device that allowed for remote dose control via electronic codes dispensed to patients prior to each session. tDCS was delivered in two phases: once daily on 10 consecutive days, followed by an as needed regimen for 20 days. Initial feasibility of this tDCS-telehealth system was evaluated in four patients with advanced chronic illness and multiple symptoms. Change in symptom burden and patient satisfaction were assessed with the Condensed Memorial Symptom Assessment Scale (CMSAS) and a tDCS user survey. Results: The telehealth-tDCS protocol includes one home visit and has seven patient-tailored elements and six elements enhancing safety monitoring. Replicable electrode placement at home without 10–20 EEG measurement is achieved via a headband that holds electrodes in a pre-determined position. There were no difficulties with patients’ training, protocol adherence, or tolerability. A total of 60 tDCS sessions were applied. No session required discontinuation, and there were no adverse events. Data collection was feasible and there were no missing data. Satisfaction with the tDCS-telehealth procedure was high and the patients were comfortable using the system. Conclusion: At-home tDCS with telehealth support appears to be a feasible approach for the management of symptom burden in patients with chronic illness. Further studies to evaluate and optimize the protocol effectiveness for symptom-control outcomes are warranted. PMID:29872381

  4. Multiple Mating, Paternity and Complex Fertilisation Patterns in the Chokka Squid Loligo reynaudii

    PubMed Central

    Naud, Marie-Jose; Sauer, Warwick H. H.; McKeown, Niall J.; Shaw, Paul W.

    2016-01-01

    Polyandry is widespread and influences patterns of sexual selection, with implications for sexual conflict over mating. Assessing sperm precedence patterns is a first step towards understanding sperm competition within a female and elucidating the roles of male- and female-controlled factors. In this study behavioural field data and genetic data were combined to investigate polyandry in the chokka squid Loligo reynaudii. Microsatellite DNA-based paternity analysis revealed multiple paternity to be the norm, with 79% of broods sired by at least two males. Genetic data also determined that the male who was guarding the female at the moment of sampling was a sire in 81% of the families tested, highlighting mate guarding as a successful male tactic with postcopulatory benefits linked to sperm deposition site giving privileged access to extruded egg strings. As females lay multiple eggs in capsules (egg strings) wherein their position is not altered during maturation it is possible to describe the spatial / temporal sequence of fertilisation / sperm precedence There were four different patterns of fertilisation found among the tested egg strings: 1) unique sire; 2) dominant sire, with one or more rare sires; 3) randomly mixed paternity (two or more sires); and 4) a distinct switch in paternity occurring along the egg string. The latter pattern cannot be explained by a random use of stored sperm, and suggests postcopulatory female sperm choice. Collectively the data indicate multiple levels of male- and female-controlled influences on sperm precedence, and highlights squid as interesting models to study the interplay between sexual and natural selection. PMID:26872354

  5. A Multi-purpose Brain-Computer Interface Output Device

    PubMed Central

    Thompson, David E; Huggins, Jane E

    2012-01-01

    While brain-computer interfaces (BCIs) are a promising alternative access pathway for individuals with severe motor impairments, many BCI systems are designed as standalone communication and control systems, rather than as interfaces to existing systems built for these purposes. While an individual communication and control system may be powerful or flexible, no single system can compete with the variety of options available in the commercial assistive technology (AT) market. BCIs could instead be used as an interface to these existing AT devices and products, which are designed for improving access and agency of people with disabilities and are highly configurable to individual user needs. However, interfacing with each AT device and program requires significant time and effort on the part of researchers and clinicians. This work presents the Multi-Purpose BCI Output Device (MBOD), a tool to help researchers and clinicians provide BCI control of many forms of AT in a plug-and-play fashion, i.e. without the installation of drivers or software on the AT device, and a proof-of-concept of the practicality of such an approach. The MBOD was designed to meet the goals of target device compatibility, BCI input device compatibility, convenience, and intuitive command structure. The MBOD was successfully used to interface a BCI with multiple AT devices (including two wheelchair seating systems), as well as computers running Windows (XP and 7), Mac and Ubuntu Linux operating systems. PMID:22208120

  6. A multi-purpose brain-computer interface output device.

    PubMed

    Thompson, David E; Huggins, Jane E

    2011-10-01

    While brain-computer interfaces (BCIs) are a promising alternative access pathway for individuals with severe motor impairments, many BCI systems are designed as stand-alone communication and control systems, rather than as interfaces to existing systems built for these purposes. An individual communication and control system may be powerful or flexible, but no single system can compete with the variety of options available in the commercial assistive technology (AT) market. BCls could instead be used as an interface to these existing AT devices and products, which are designed for improving access and agency of people with disabilities and are highly configurable to individual user needs. However, interfacing with each AT device and program requires significant time and effort on the part of researchers and clinicians. This work presents the Multi-Purpose BCI Output Device (MBOD), a tool to help researchers and clinicians provide BCI control of many forms of AT in a plug-and-play fashion, i.e., without the installation of drivers or software on the AT device, and a proof-of-concept of the practicality of such an approach. The MBOD was designed to meet the goals of target device compatibility, BCI input device compatibility, convenience, and intuitive command structure. The MBOD was successfully used to interface a BCI with multiple AT devices (including two wheelchair seating systems), as well as computers running Windows (XP and 7), Mac and Ubuntu Linux operating systems.

  7. Performance Analysis of Modified Accelerative Preallocation MAC Protocol for Passive Star-Coupled WDMA Networks

    NASA Astrophysics Data System (ADS)

    Yun, Changho; Kim, Kiseon

    2006-04-01

    For the passive star-coupled wavelength-division multiple-access (WDMA) network, a modified accelerative preallocation WDMA (MAP-WDMA) media access control (MAC) protocol is proposed, which is based on AP-WDMA. To show the advantages of MAP-WDMA as an adequate MAC protocol for the network over AP-WDMA, the channel utilization, the channel-access delay, and the latency of MAP-WDMA are investigated and compared with those of AP-WDMA under various data traffic patterns, including uniform, quasi-uniform type, disconnected type, mesh type, and ring type data traffics, as well as the assumption that a given number of network stations is equal to that of channels, in other words, without channel sharing. As a result, the channel utilization of MAP-WDMA can be competitive with respect to that of AP-WDMA at the expense of insignificantly higher latency. Namely, if the number of network stations is small, MAP-WDMA provides better channel utilization for uniform, quasi-uniform-type, and disconnected-type data traffics at all data traffic loads, as well as for mesh and ring-type data traffics at low data traffic loads. Otherwise, MAP-WDMA only outperforms AP-WDMA for the first three data traffics at higher data traffic loads. In the aspect of channel-access delay, MAP-WDMA gives better performance than AP-WDMA, regardless of data traffic patterns and the number of network stations.

  8. ViSA: a neurodynamic model for visuo-spatial working memory, attentional blink, and conscious access.

    PubMed

    Simione, Luca; Raffone, Antonino; Wolters, Gezinus; Salmas, Paola; Nakatani, Chie; Belardinelli, Marta Olivetti; van Leeuwen, Cees

    2012-10-01

    Two separate lines of study have clarified the role of selectivity in conscious access to visual information. Both involve presenting multiple targets and distracters: one simultaneously in a spatially distributed fashion, the other sequentially at a single location. To understand their findings in a unified framework, we propose a neurodynamic model for Visual Selection and Awareness (ViSA). ViSA supports the view that neural representations for conscious access and visuo-spatial working memory are globally distributed and are based on recurrent interactions between perceptual and access control processors. Its flexible global workspace mechanisms enable a unitary account of a broad range of effects: It accounts for the limited storage capacity of visuo-spatial working memory, attentional cueing, and efficient selection with multi-object displays, as well as for the attentional blink and associated sparing and masking effects. In particular, the speed of consolidation for storage in visuo-spatial working memory in ViSA is not fixed but depends adaptively on the input and recurrent signaling. Slowing down of consolidation due to weak bottom-up and recurrent input as a result of brief presentation and masking leads to the attentional blink. Thus, ViSA goes beyond earlier 2-stage and neuronal global workspace accounts of conscious processing limitations. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  9. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  10. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  11. Writing and applications of fiber Bragg grating arrays

    NASA Astrophysics Data System (ADS)

    LaRochelle, Sophie; Cortes, Pierre-Yves; Fathallah, H.; Rusch, Leslie A.; Jaafar, H. B.

    2000-12-01

    Multiple Bragg gratings are written in a single fibre strand with accurate positioning to achieve predetermined time delays between optical channels. Applications of fibre Bragg grating arrays include encoders/decoders with series of identical gratings for optical code-division multiple access.

  12. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  13. What Are the Factors Influencing Implementation of Advanced Access in Family Medicine Units? A Cross-Case Comparison of Four Early Adopters in Quebec

    PubMed Central

    Touati, Nassera; Maillet, Lara; Gaboury, Isabelle

    2017-01-01

    Introduction Advanced access is an organizational model that has shown promise in improving timely access to primary care. In Quebec, it has recently been introduced in several family medicine units (FMUs) with a teaching mission. The objectives of this paper are to analyze the principles of advanced access implemented in FMUs and to identify which factors influenced their implementation. Methods A multiple case study of four purposefully selected FMUs was conducted. Data included document analysis and 40 semistructured interviews with health professionals and staff. Cross-case comparison and thematic analysis were performed. Results Three out of four FMUs implemented the key principles of advanced access at various levels. One scheduling pattern was observed: 90% of open appointment slots over three- to four-week periods and 10% of prebooked appointments. Structural and organizational factors facilitated the implementation: training of staff to support change, collective leadership, and openness to change. Conversely, family physicians practicing in multiple clinical settings, lack of team resources, turnover of clerical staff, rotation of medical residents, and management capacity were reported as major barriers to implementing the model. Conclusion Our results call for multilevel implementation strategies to improve the design of the advanced access model in academic teaching settings. PMID:28775899

  14. Dynamic Network Selection for Multicast Services in Wireless Cooperative Networks

    NASA Astrophysics Data System (ADS)

    Chen, Liang; Jin, Le; He, Feng; Cheng, Hanwen; Wu, Lenan

    In next generation mobile multimedia communications, different wireless access networks are expected to cooperate. However, it is a challenging task to choose an optimal transmission path in this scenario. This paper focuses on the problem of selecting the optimal access network for multicast services in the cooperative mobile and broadcasting networks. An algorithm is proposed, which considers multiple decision factors and multiple optimization objectives. An analytic hierarchy process (AHP) method is applied to schedule the service queue and an artificial neural network (ANN) is used to improve the flexibility of the algorithm. Simulation results show that by applying the AHP method, a group of weight ratios can be obtained to improve the performance of multiple objectives. And ANN method is effective to adaptively adjust weight ratios when users' new waiting threshold is generated.

  15. Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels - Achieving High Performance in Fully Loaded Systems

    NASA Astrophysics Data System (ADS)

    Silva, João Carlos; Souto, Nuno; Cercas, Francisco; Dinis, Rui

    A MMSE (Minimum Mean Square Error) DS-CDMA (Direct Sequence-Code Division Multiple Access) receiver coupled with a low-complexity iterative interference suppression algorithm was devised for a MIMO/BLAST (Multiple Input, Multiple Output / Bell Laboratories Layered Space Time) system in order to improve system performance, considering frequency selective fading channels. The scheme is compared against the simple MMSE receiver, for both QPSK and 16QAM modulations, under SISO (Single Input, Single Output) and MIMO systems, the latter with 2Tx by 2Rx and 4Tx by 4Rx (MIMO order 2 and 4 respectively) antennas. To assess its performance in an existing system, the uncoded UMTS HSDPA (High Speed Downlink Packet Access) standard was considered.

  16. Food-Based Interventions to Modify Diet Quality and Diversity to Address Multiple Micronutrient Deficiency.

    PubMed

    Nair, Madhavan K; Augustine, Little Flower; Konapur, Archana

    2015-01-01

    Global data indicate a high prevalence of hidden hunger among population. Deficiencies of certain micronutrients such as folic acid, iodine, iron, and vitamin A have long lasting effects on growth and development and therefore have been a National priority from many decades. The strategy implemented so far limits to the use of supplemental sources or fortified foods in alleviating the burden of deficiencies. These approaches however undermine the food-based strategies involving dietary diversification as the long-term sustainable strategy. There is lack of understanding on the level of evidence needed to implement such strategies and the level of monitoring required for impact evaluation. Dietary diversity concerns how to ensure access for each individual to a quality and safe diet with adequate macro- and micronutrients. The key to success in using dietary diversity as a strategy to tackle hidden hunger is in integrating it with the principles of bioavailability, translated to efficient food synergies with due emphasis on food accessibility, affordability, and outdoor physical activity/life style modifications. Promoting enabling environment and sustainable agriculture is crucial for practicing dietary diversification with behavior change communication as an integral segment. It can be concluded that food-based strategies require careful understanding of the factors associated with it and moderate it to form an effective strategy for controlling multiple micronutrient deficiencies.

  17. Food-Based Interventions to Modify Diet Quality and Diversity to Address Multiple Micronutrient Deficiency

    PubMed Central

    Nair, Madhavan K.; Augustine, Little Flower; Konapur, Archana

    2016-01-01

    Global data indicate a high prevalence of hidden hunger among population. Deficiencies of certain micronutrients such as folic acid, iodine, iron, and vitamin A have long lasting effects on growth and development and therefore have been a National priority from many decades. The strategy implemented so far limits to the use of supplemental sources or fortified foods in alleviating the burden of deficiencies. These approaches however undermine the food-based strategies involving dietary diversification as the long-term sustainable strategy. There is lack of understanding on the level of evidence needed to implement such strategies and the level of monitoring required for impact evaluation. Dietary diversity concerns how to ensure access for each individual to a quality and safe diet with adequate macro- and micronutrients. The key to success in using dietary diversity as a strategy to tackle hidden hunger is in integrating it with the principles of bioavailability, translated to efficient food synergies with due emphasis on food accessibility, affordability, and outdoor physical activity/life style modifications. Promoting enabling environment and sustainable agriculture is crucial for practicing dietary diversification with behavior change communication as an integral segment. It can be concluded that food-based strategies require careful understanding of the factors associated with it and moderate it to form an effective strategy for controlling multiple micronutrient deficiencies. PMID:26779472

  18. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  19. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  20. Increasing the quality, comparability and accessibility of phytoplankton species composition time-series data

    NASA Astrophysics Data System (ADS)

    Zingone, Adriana; Harrison, Paul J.; Kraberg, Alexandra; Lehtinen, Sirpa; McQuatters-Gollop, Abigail; O'Brien, Todd; Sun, Jun; Jakobsen, Hans H.

    2015-09-01

    Phytoplankton diversity and its variation over an extended time scale can provide answers to a wide range of questions relevant to societal needs. These include human health, the safe and sustained use of marine resources and the ecological status of the marine environment, including long-term changes under the impact of multiple stressors. The analysis of phytoplankton data collected at the same place over time, as well as the comparison among different sampling sites, provide key information for assessing environmental change, and evaluating new actions that must be made to reduce human induced pressures on the environment. To achieve these aims, phytoplankton data may be used several decades later by users that have not participated in their production, including automatic data retrieval and analysis. The methods used in phytoplankton species analysis vary widely among research and monitoring groups, while quality control procedures have not been implemented in most cases. Here we highlight some of the main differences in the sampling and analytical procedures applied to phytoplankton analysis and identify critical steps that are required to improve the quality and inter-comparability of data obtained at different sites and/or times. Harmonization of methods may not be a realistic goal, considering the wide range of purposes of phytoplankton time-series data collection. However, we propose that more consistent and detailed metadata and complementary information be recorded and made available along with phytoplankton time-series datasets, including description of the procedures and elements allowing for a quality control of the data. To keep up with the progress in taxonomic research, there is a need for continued training of taxonomists, and for supporting and complementing existing web resources, in order to allow a constant upgrade of knowledge in phytoplankton classification and identification. Efforts towards the improvement of metadata recording, data annotation and quality control procedures will ensure the internal consistency of phytoplankton time series and facilitate their comparability and accessibility, thus strongly increasing the value of the precious information they provide. Ultimately, the sharing of quality controlled data will allow one to recoup the high cost of obtaining the data through the multiple use of the time-series data in various projects over many decades.

Top