Sample records for role-based access control

  1. Atom-Role-Based Access Control Model

    NASA Astrophysics Data System (ADS)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  2. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  3. An improved task-role-based access control model for G-CSCW applications

    NASA Astrophysics Data System (ADS)

    He, Chaoying; Chen, Jun; Jiang, Jie; Han, Gang

    2005-10-01

    Access control is an important and popular security mechanism for multi-user applications. GIS-based Computer Supported Cooperative Work (G-CSCW) application is one of such applications. This paper presents an improved Task-Role-Based Access Control (X-TRBAC) model for G-CSCW applications. The new model inherits the basic concepts of the old ones, such as role and task. Moreover, it has introduced two concepts, i.e. object hierarchy and operation hierarchy, and the corresponding rules to improve the efficiency of permission definition in access control models. The experiments show that the method can simplify the definition of permissions, and it is more applicable for G-CSCW applications.

  4. An access control model with high security for distributed workflow and real-time application

    NASA Astrophysics Data System (ADS)

    Han, Ruo-Fei; Wang, Hou-Xiang

    2007-11-01

    The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.

  5. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  6. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  7. Policy-based secure communication with automatic key management for industrial control and automation systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chernoguzov, Alexander; Markham, Thomas R.; Haridas, Harshal S.

    A method includes generating at least one access vector associated with a specified device in an industrial process control and automation system. The specified device has one of multiple device roles. The at least one access vector is generated based on one or more communication policies defining communications between one or more pairs of devices roles in the industrial process control and automation system, where each pair of device roles includes the device role of the specified device. The method also includes providing the at least one access vector to at least one of the specified device and one ormore » more other devices in the industrial process control and automation system in order to control communications to or from the specified device.« less

  8. An Attribute Based Access Control Framework for Healthcare System

    NASA Astrophysics Data System (ADS)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  9. Access Control for Cooperation Systems Based on Group Situation

    NASA Astrophysics Data System (ADS)

    Kim, Minsoo; Joshi, James B. D.; Kim, Minkoo

    Cooperation systems characterize many emerging environments such as ubiquitous and pervasive systems. Agent based cooperation systems have been proposed in the literature to address challenges of such emerging application environments. A key aspect of such agent based cooperation system is the group situation that changes dynamically and governs the requirements of the cooperation. While individual agent context is important, the overall cooperation behavior is more driven by the group context because of relationships and interactions between agents. Dynamic access control based on group situation is a crucial challenge in such cooperation systems. In this paper we propose a dynamic role based access control model for cooperation systems based on group situation. The model emphasizes capability based agent to role mapping and group situation based permission assignment to allow capturing dynamic access policies that evolve continuously.

  10. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    PubMed

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  11. A dynamic access control method based on QoS requirement

    NASA Astrophysics Data System (ADS)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  12. RBAC-Matrix-based EMR right management system to improve HIPAA compliance.

    PubMed

    Lee, Hung-Chang; Chang, Shih-Hsin

    2012-10-01

    Security control of Electronic Medical Record (EMR) is a mechanism used to manage electronic medical records files and protect sensitive medical records document from information leakage. Researches proposed the Role-Based Access Control(RBAC). However, with the increasing scale of medical institutions, the access control behavior is difficult to have a detailed declaration among roles in RBAC. Furthermore, with the stringent specifications such as the U.S. HIPAA and Canada PIPEDA etc., patients are encouraged to have the right in regulating the access control of his EMR. In response to these problems, we propose an EMR digital rights management system, which is a RBAC-based extension to a matrix organization of medical institutions, known as RBAC-Matrix. With the aim of authorizing the EMR among roles in the organization, RBAC-Matrix also allow patients to be involved in defining access rights of his records. RBAC-Matrix authorizes access control declaration among matrix organizations of medical institutions by using XrML file in association with each EMR. It processes XrML rights declaration file-based authorization of behavior in the two-stage design, called master & servant stage, thus makes the associated EMR to be better protected. RBAC-Matrix will also make medical record file and its associated XrML declaration to two different EMRA(EMR Authorization)roles, namely, the medical records Document Creator (DC) and the medical records Document Right Setting (DRS). Access right setting, determined by the DRS, is cosigned by the patient, thus make the declaration of rights and the use of EMR to comply with HIPAA specifications.

  13. Research on a dynamic workflow access control model

    NASA Astrophysics Data System (ADS)

    Liu, Yiliang; Deng, Jinxia

    2007-12-01

    In recent years, the access control technology has been researched widely in workflow system, two typical technologies of that are RBAC (Role-Based Access Control) and TBAC (Task-Based Access Control) model, which has been successfully used in the role authorizing and assigning in a certain extent. However, during the process of complicating a system's structure, these two types of technology can not be used in minimizing privileges and separating duties, and they are inapplicable when users have a request of frequently changing on the workflow's process. In order to avoid having these weakness during the applying, a variable flow dynamic role_task_view (briefly as DRTVBAC) of fine-grained access control model is constructed on the basis existed model. During the process of this model applying, an algorithm is constructed to solve users' requirements of application and security needs on fine-grained principle of privileges minimum and principle of dynamic separation of duties. The DRTVBAC model is implemented in the actual system, the figure shows that the task associated with the dynamic management of role and the role assignment is more flexible on authority and recovery, it can be met the principle of least privilege on the role implement of a specific task permission activated; separated the authority from the process of the duties completing in the workflow; prevented sensitive information discovering from concise and dynamic view interface; satisfied with the requirement of the variable task-flow frequently.

  14. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  15. Task Delegation Based Access Control Models for Workflow Systems

    NASA Astrophysics Data System (ADS)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  16. Access Control in Location-Based Services

    NASA Astrophysics Data System (ADS)

    Ardagna, Claudio A.; Cremonini, Marco; de Capitani di Vimercati, Sabrina; Samarati, Pierangela

    Recent enhancements in location technologies reliability and precision are fostering the development of a new wave of applications that make use of the location information of users. Such applications introduces new aspects of access control which should be addressed. On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with conditions based on the physical position of users. On the other side, location information of users can be considered sensitive and access control solutions should be developed to protect it against unauthorized accesses and disclosures. In this chapter, we address these two aspects related to the use and protection of location information, discussing existing solutions, open issues, and some research directions.

  17. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  18. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  19. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  20. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  1. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  2. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  3. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  4. A federated capability-based access control mechanism for internet of things (IoTs)

    NASA Astrophysics Data System (ADS)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  5. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  6. 76 FR 54190 - Proposed Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... decentralized, with each mission area and agency managing its respective FOIA programs. At the end of each year...-know basis. Role-based access controls are used, and FX is only accessible via the Internet using USDA...

  7. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  8. The Paperless Solution

    NASA Technical Reports Server (NTRS)

    2001-01-01

    REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.

  9. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  10. Secure access control and large scale robust representation for online multimedia event detection.

    PubMed

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  11. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  12. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  13. Securely and Flexibly Sharing a Biomedical Data Management System

    PubMed Central

    Wang, Fusheng; Hussels, Phillip; Liu, Peiya

    2011-01-01

    Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285

  14. RBAC Driven Least Privilege Architecture For Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hull, Julie; Markham, Mark

    The concept of role based access control (RBAC) within the IT environment has been studied by researchers and was supported by NIST (circa 1992). This earlier work highlighted the benefits of RBAC which include reduced administrative workload and policies which are easier to analyze and apply. The goals of this research were to expand the application of RBAC in the following ways. Apply RBAC to the control systems environment: The typical RBAC model within the IT environment is used to control a user’s access to files. Within the control system environment files are replaced with measurement (e.g., temperature) and controlmore » (e.g. valve) points organized as a hierarchy of control assets (e.g. a boiler, compressor, refinery unit). Control points have parameters (e.g., high alarm limit, set point, etc.) associated with them. The RBAC model is extended to support access to points and their parameters based upon roles while at the same time allowing permissions for the points to be defined at the asset level or point level directly. In addition, centralized policy administration with distributed access enforcement mechanisms was developed to support the distributed architecture of distributed control systems and SCADA; Extend the RBAC model to include access control for software and devices: The established RBAC approach is to assign users to roles. This work extends that notion by first breaking the control system down into three layers 1) users, 2) software and 3) devices. An RBAC model is then created for each of these three layers. The result is that RBAC can be used to define machine-to-machine policy enforced via the IP security (IPsec) protocol. This highlights the potential to use RBAC for machine-to-machine connectivity within the internet of things; and Enable dynamic policy based upon the operating mode of the system: The IT environment is generally static with respect to policy. However, large cyber physical systems such as industrial controls have various operating modes (start-up, normal operation, emergency, shut-down and maintenance are typical). The policy enforcement architecture must be able to support changes in access permissions as the mode of the control system changes. For example an operator’s role may not allow the operator to shut down a pump during “normal operation” but that same operator role may be given permission to shut down the pump if the refinery transitions to “emergency” mode. The effectiveness of the approach was validated by applying it to the Experion Process Knowledge System. This is a large commercial industrial control system often used to control oil refineries and other assets within the oil and gas sector. As a by-product, other industries using Experion (Pharmaceuticals, Specialty Chemicals, etc.) also benefit from increased security. Policies representative of those that would be used within an oil refinery were created and validated against the RBAC model as implemented in the underlying SQL database. The administration of policy is simplified which in turn makes it practical for security administrators to specify policies which enforce least privilege. The result is a qualitative reduction in risk. The benefits of the enhanced RBAC model are clear and as a result. Honeywell is incorporating portions of the RBAC research into the 2014 release of Experion.« less

  15. Anomaly and signature filtering improve classifier performance for detection of suspicious access to EHRs.

    PubMed

    Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila

    2011-01-01

    Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10(-6). Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful.

  16. Anomaly and Signature Filtering Improve Classifier Performance For Detection Of Suspicious Access To EHRs

    PubMed Central

    Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila

    2011-01-01

    Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10−6. Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful. PMID:22195129

  17. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  18. Design of Accelerator Online Simulator Server Using Structured Data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen, Guobao; /Brookhaven; Chu, Chungming

    2012-07-06

    Model based control plays an important role for a modern accelerator during beam commissioning, beam study, and even daily operation. With a realistic model, beam behaviour can be predicted and therefore effectively controlled. The approach used by most current high level application environments is to use a built-in simulation engine and feed a realistic model into that simulation engine. Instead of this traditional monolithic structure, a new approach using a client-server architecture is under development. An on-line simulator server is accessed via network accessible structured data. With this approach, a user can easily access multiple simulation codes. This paper describesmore » the design, implementation, and current status of PVData, which defines the structured data, and PVAccess, which provides network access to the structured data.« less

  19. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  20. Cloud-assisted mobile-access of health data with privacy and auditability.

    PubMed

    Tong, Yue; Sun, Jinyuan; Chow, Sherman S M; Li, Pan

    2014-03-01

    Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and the wild success of cloud service models, we propose to build privacy into mobile healthcare systems with the help of the private cloud. Our system offers salient features including efficient key management, privacy-preserving data storage, and retrieval, especially for retrieval at emergencies, and auditability for misusing health data. Specifically, we propose to integrate key management from pseudorandom number generator for unlinkability, a secure indexing method for privacy-preserving keyword search which hides both search and access patterns based on redundancy, and integrate the concept of attribute-based encryption with threshold signing for providing role-based access control with auditability to prevent potential misbehavior, in both normal and emergency cases.

  1. Approach to spatial information security based on digital certificate

    NASA Astrophysics Data System (ADS)

    Cong, Shengri; Zhang, Kai; Chen, Baowen

    2005-11-01

    With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.

  2. Framework and prototype for a secure XML-based electronic health records system.

    PubMed

    Steele, Robert; Gardner, William; Chandra, Darius; Dillon, Tharam S

    2007-01-01

    Security of personal medical information has always been a challenge for the advancement of Electronic Health Records (EHRs) initiatives. eXtensible Markup Language (XML), is rapidly becoming the key standard for data representation and transportation. The widespread use of XML and the prospect of its use in the Electronic Health (e-health) domain highlights the need for flexible access control models for XML data and documents. This paper presents a declarative access control model for XML data repositories that utilises an expressive XML role control model. The operational semantics of this model are illustrated by Xplorer, a user interface generation engine which supports search-browse-navigate activities on XML repositories.

  3. Simulating the Historical Process To Create Laboratory Exercises That Teach Research Methods.

    ERIC Educational Resources Information Center

    Alcock, James

    1994-01-01

    Explains how controlling student access to data can be used as a strategy enabling students to take the role of a research geologist. Students develop models based on limited data and conduct field tests by comparing their predictions with the additional data. (DDR)

  4. 75 FR 8043 - National Institute of Standards and Technology

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... the National Institute of Standards and Technology (``NIST''), U.S. Department of Commerce, is... and commonwealths, to NIST's interest in the invention embodied in U.S. Patent No. 6,088,679 (Application No. 08/ 980,908), titled ``Workflow Management Employing Role-based Access Control,'' NIST Docket...

  5. Role-Based And Adaptive User Interface Designs In A Teledermatology Consult System: A Way To Secure And A Way To Enhance

    PubMed Central

    Lin, Yi-Jung; Speedie, Stuart

    2003-01-01

    User interface design is one of the most important parts of developing applications. Nowadays, a quality user interface must not only accommodate interaction between machines and users, but also needs to recognize the differences and provide functionalities for users from role-to-role or even individual-to-individual. With the web-based application of our Teledermatology consult system, the development environment provides us highly useful opportunities to create dynamic user interfaces, which lets us to gain greater access control and has the potential to increase efficiency of the system. We will describe the two models of user interfaces in our system: Role-based and Adaptive. PMID:14728419

  6. Fine-grained policy control in U.S. Army Research Laboratory (ARL) multimodal signatures database

    NASA Astrophysics Data System (ADS)

    Bennett, Kelly; Grueneberg, Keith; Wood, David; Calo, Seraphin

    2014-06-01

    The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) consists of a number of colocated relational databases representing a collection of data from various sensors. Role-based access to this data is granted to external organizations such as DoD contractors and other government agencies through a client Web portal. In the current MMSDB system, access control is only at the database and firewall level. In order to offer finer grained security, changes to existing user profile schemas and authentication mechanisms are usually needed. In this paper, we describe a software middleware architecture and implementation that allows fine-grained access control to the MMSDB at a dataset, table, and row level. Result sets from MMSDB queries issued in the client portal are filtered with the use of a policy enforcement proxy, with minimal changes to the existing client software and database. Before resulting data is returned to the client, policies are evaluated to determine if the user or role is authorized to access the data. Policies can be authored to filter data at the row, table or column level of a result set. The system uses various technologies developed in the International Technology Alliance in Network and Information Science (ITA) for policy-controlled information sharing and dissemination1. Use of the Policy Management Library provides a mechanism for the management and evaluation of policies to support finer grained access to the data in the MMSDB system. The GaianDB is a policy-enabled, federated database that acts as a proxy between the client application and the MMSDB system.

  7. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    PubMed Central

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment. PMID:26075013

  8. User Access Management Based on Network Pricing for Social Network Applications

    PubMed Central

    Ma, Xingmin; Gu, Qing

    2018-01-01

    Social applications play a very important role in people’s lives, as users communicate with each other through social networks on a daily basis. This presents a challenge: How does one receive high-quality service from social networks at a low cost? Users can access different kinds of wireless networks from various locations. This paper proposes a user access management strategy based on network pricing such that networks can increase its income and improve service quality. Firstly, network price is treated as an optimizing access parameter, and an unascertained membership algorithm is used to make pricing decisions. Secondly, network price is adjusted dynamically in real time according to network load. Finally, selecting a network is managed and controlled in terms of the market economy. Simulation results show that the proposed scheme can effectively balance network load, reduce network congestion, improve the user's quality of service (QoS) requirements, and increase the network’s income. PMID:29495252

  9. Nurse practitioners and controlled substances prescriptive authority: improving access to care.

    PubMed

    Ambrose, Michelle A; Tarlier, Denise S

    2013-03-01

    In 2007, Health Canada proposed a new framework to regulate prescriptive authority for controlled substances, titled New Classes of Practitioners Regulations (NCPR). The new regulatory framework was passed in November 2012; it gives nurse practitioners (NPs), midwives and podiatrists the authority to prescribe controlled medications under the Controlled Drugs and Substances Act. It is expected that authorizing NPs to write prescriptions for certain controlled substances commonly used in primary care will enhance flexibility and timeliness in primary care service delivery. Studies from the United States have shown positive outcomes in primary care access, decreased healthcare costs and the evolution and advancement of the NP role when prescriptive authority was expanded to include controlled substances. The purpose of this paper is to examine how NPs' prescriptive authority for controlled substances affects access to primary care and NP role development. Three key issues identified from the experience of one group of NPs in the United States (access to care, professional autonomy and prescriber knowledge) offer insight into the practice changes that may be anticipated for NPs in Canada now that they have acquired prescriptive authority for controlled substances. Recommendations are offered to assist nurse leaders and educators to best support NPs as they take on this new and important role responsibility.

  10. Schools as Racial Spaces: Understanding and Resisting Structural Racism

    ERIC Educational Resources Information Center

    Blaisdell, Benjamin

    2016-01-01

    Analyzing schools as racial spaces can help researchers examine the role of teachers in the perpetuation of structural racism in schools. Based on ethnographic and autoethnographic work, this article offers examples of schools as racial spaces, spaces where whiteness controlled access. It also highlights four teachers who pursued racial equity in…

  11. Group Membership Based Authorization to CADC Resources

    NASA Astrophysics Data System (ADS)

    Damian, A.; Dowler, P.; Gaudet, S.; Hill, N.

    2012-09-01

    The Group Membership Service (GMS), implemented at the Canadian Astronomy Data Centre (CADC), is a prototype of what could eventually be an IVOA standard for a distributed and interoperable group membership protocol. Group membership is the core authorization concept that enables teamwork and collaboration amongst astronomers accessing distributed resources and services. The service integrates and complements other access control related IVOA standards such as single-sign-on (SSO) using X.509 proxy certificates and the Credential Delegation Protocol (CDP). The GMS has been used at CADC for several years now, initially as a subsystem and then as a stand-alone Web service. It is part of the authorization mechanism for controlling the access to restricted Web resources as well as the VOSpace service hosted by the CADC. We present the role that GMS plays within the access control system at the CADC, including the functionality of the service and how the different CADC services make use of it to assert user authorization to resources. We also describe the main advantages and challenges of using the service as well as future work to increase its robustness and functionality.

  12. Shared Medical Imaging Repositories.

    PubMed

    Lebre, Rui; Bastião, Luís; Costa, Carlos

    2018-01-01

    This article describes the implementation of a solution for the integration of ownership concept and access control over medical imaging resources, making possible the centralization of multiple instances of repositories. The proposed architecture allows the association of permissions to repository resources and delegation of rights to third entities. It includes a programmatic interface for management of proposed services, made available through web services, with the ability to create, read, update and remove all components resulting from the architecture. The resulting work is a role-based access control mechanism that was integrated with Dicoogle Open-Source Project. The solution has several application scenarios like, for instance, collaborative platforms for research and tele-radiology services deployed at Cloud.

  13. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand of the development efforts within CEDA has been the NDG (NERC Datagrid) Security system. This system has been extended to interoperate with ESG, greatly assisted by the standards based approach adopted for the ESG security architecture. Drawing from experience from previous projects the decision was taken to refactor the NDG Security software into a component based architecture to enable a separation of concerns between access control and the functionality of a given application being protected. Such an approach is only possible through a generic interface. At CEDA, this has been realised in the Python programming language using the WSGI (Web Server Gateway Interface) specification. A parallel Java filter based implementation is also under development with our US partners for use with the THREDDS Data Server. Using such technologies applications and middleware can be assembled into custom configurations to meet different requirements. In the case of access control, NDG Security middleware can be layered over the top of existing applications without the need to modify them. A RESTful approach to the application of authorisation policy has been key in this approach. We explore the practical implementation of such a scheme alongside the application of the ESG security architecture to CEDA's OGC web services implementation COWS.

  14. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  15. Randomized, community-based pharmacy intervention to expand services beyond sale of sterile syringes to injection drug users in pharmacies in New York City.

    PubMed

    Crawford, Natalie D; Amesty, Silvia; Rivera, Alexis V; Harripersaud, Katherine; Turner, Alezandria; Fuller, Crystal M

    2013-09-01

    Structural interventions may help reduce racial/ethnic disparities in HIV. In 2009 to 2011, we randomized pharmacies participating in a nonprescription syringe access program in minority communities to intervention (pharmacy enrolled and delivered HIV risk reduction information to injection drug users [IDUs]), primary control (pharmacy only enrolled IDUs), and secondary control (pharmacy did not engage IDUs). Intervention pharmacy staff reported more support for syringe sales than did control staff. An expanded pharmacy role in HIV risk reduction may be helpful.

  16. Patients' experiences of an open access follow up arrangement in managing inflammatory bowel disease

    PubMed Central

    Rogers, A; Kennedy, A; Nelson, E; Robinson, A

    2004-01-01

    Background: Improving access is a key policy issue in improving quality of care and extending patient choice and participation. People's experience of changing from fixed outpatient appointments to more flexible direct access arrangements for chronic disease has been underexplored. Objectives: To examine patients' views on using an open system of access compared with fixed outpatient appointments as part of a guided self-management intervention for inflammatory bowel disease (IBD). Design: Embedded qualitative study undertaken alongside a randomised controlled trial. Semi-structured interviews were undertaken to obtain an in depth understanding of patients' experience of the change in access arrangements. Participants: A purposive sample (n = 30) was drawn from the intervention group (n = 700) according to a range of responses to the trial baseline and follow up quantitative measures. Results: 28 interviews were included in the analysis. Compared with the previous system of fixed appointments, preference for the new open access system was based on enhanced personal control in contacting services and the view that it fitted better with everyday routine management and the requirement for urgent medical contact when symptoms fail to respond to medication. Preference for retaining fixed appointments was based on a sense of security from gaining access which did not require the individual to initiate the request for medical help. Conclusions: Open access may fit better with patients' self-management of their condition and everyday routines, roles and responsibilities. Ensuring that outpatient organisational arrangements and personnel are responsive to patient initiated requests for appointments is likely to impact on the acceptability of this type of access arrangement. Some people may continue to prefer the fixed appointment system which should be retained if patient choice is to be respected. PMID:15465941

  17. Fundus Photography in the 21st Century--A Review of Recent Technological Advances and Their Implications for Worldwide Healthcare.

    PubMed

    Panwar, Nishtha; Huang, Philemon; Lee, Jiaying; Keane, Pearse A; Chuan, Tjin Swee; Richhariya, Ashutosh; Teoh, Stephen; Lim, Tock Han; Agrawal, Rupesh

    2016-03-01

    The introduction of fundus photography has impacted retinal imaging and retinal screening programs significantly. Fundus cameras play a vital role in addressing the cause of preventive blindness. More attention is being turned to developing countries, where infrastructure and access to healthcare are limited. One of the major limitations for tele-ophthalmology is restricted access to the office-based fundus camera. Recent advances in access to telecommunications coupled with introduction of portable cameras and smartphone-based fundus imaging systems have resulted in an exponential surge in available technologies for portable fundus photography. Retinal cameras in the near future would have to cater to these needs by featuring a low-cost, portable design with automated controls and digitalized images with Web-based transfer. In this review, we aim to highlight the advances of fundus photography for retinal screening as well as discuss the advantages, disadvantages, and implications of the various technologies that are currently available.

  18. Fundus Photography in the 21st Century—A Review of Recent Technological Advances and Their Implications for Worldwide Healthcare

    PubMed Central

    Panwar, Nishtha; Huang, Philemon; Lee, Jiaying; Keane, Pearse A.; Chuan, Tjin Swee; Richhariya, Ashutosh; Teoh, Stephen; Lim, Tock Han

    2016-01-01

    Abstract Background: The introduction of fundus photography has impacted retinal imaging and retinal screening programs significantly. Literature Review: Fundus cameras play a vital role in addressing the cause of preventive blindness. More attention is being turned to developing countries, where infrastructure and access to healthcare are limited. One of the major limitations for tele-ophthalmology is restricted access to the office-based fundus camera. Results: Recent advances in access to telecommunications coupled with introduction of portable cameras and smartphone-based fundus imaging systems have resulted in an exponential surge in available technologies for portable fundus photography. Retinal cameras in the near future would have to cater to these needs by featuring a low-cost, portable design with automated controls and digitalized images with Web-based transfer. Conclusions: In this review, we aim to highlight the advances of fundus photography for retinal screening as well as discuss the advantages, disadvantages, and implications of the various technologies that are currently available. PMID:26308281

  19. Information-Sharing Application Standards for Integrated Government Systems

    DTIC Science & Technology

    2010-12-01

    23 4. Federated Search and Role-Based Data Access ................ 24 G. LESSONS FROM HSIN...4. Federated Search and Role-Based Data Access One of the original purposes of HSIN was to facilitate information sharing...recent search paradigm, Federated Search , allows separate systems to feed external data requests without the need for a huge centralized database

  20. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application

    NASA Astrophysics Data System (ADS)

    Zhang, De-gan; Zhang, Xiao-dan

    2012-11-01

    With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.

  1. An Optimal Mobile Service for Telecare Data Synchronization using a Role-based Access Control Model and Mobile Peer-to-Peer Technology.

    PubMed

    Ke, Chih-Kun; Lin, Zheng-Hua

    2015-09-01

    The progress of information and communication technologies (ICT) has promoted the development of healthcare which has enabled the exchange of resources and services between organizations. Organizations want to integrate mobile devices into their hospital information systems (HIS) due to the convenience to employees who are then able to perform specific healthcare processes from any location. The collection and merage of healthcare data from discrete mobile devices are worth exploring possible ways for further use, especially in remote districts without public data network (PDN) to connect the HIS. In this study, we propose an optimal mobile service which automatically synchronizes the telecare file resources among discrete mobile devices. The proposed service enforces some technical methods. The role-based access control model defines the telecare file resources accessing mechanism; the symmetric data encryption method protects telecare file resources transmitted over a mobile peer-to-peer network. The multi-criteria decision analysis method, ELECTRE (Elimination Et Choice Translating Reality), evaluates multiple criteria of the candidates' mobile devices to determine a ranking order. This optimizes the synchronization of telecare file resources among discrete mobile devices. A prototype system is implemented to examine the proposed mobile service. The results of the experiment show that the proposed mobile service can automatically and effectively synchronize telecare file resources among discrete mobile devices. The contribution of this experiment is to provide an optimal mobile service that enhances the security of telecare file resource synchronization and strengthens an organization's mobility.

  2. Automated Computer Access Request System

    NASA Technical Reports Server (NTRS)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  3. Semantically Enriched Data Access Policies in eHealth.

    PubMed

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  4. A Web-Based Remote Access Laboratory Using SCADA

    ERIC Educational Resources Information Center

    Aydogmus, Z.; Aydogmus, O.

    2009-01-01

    The Internet provides an opportunity for students to access laboratories from outside the campus. This paper presents a Web-based remote access real-time laboratory using SCADA (supervisory control and data acquisition) control. The control of an induction motor is used as an example to demonstrate the effectiveness of this remote laboratory,…

  5. The Effect of the Home Environment on Physical Activity and Dietary Intake in Preschool Children

    PubMed Central

    Østbye, Truls; Malhotra, Rahul; Stroo, Marissa; Lovelady, Cheryl; Brouwer, Rebecca; Zucker, Nancy; Fuemmeler, Bernard

    2013-01-01

    Background The effects of the home environment on child health behaviors related to obesity are unclear. Purpose To examine the role of the home physical activity (PA) and food environment on corresponding outcomes in young children, and assess maternal education/work status as a moderator. Methods Overweight or obese mothers reported on the home PA and food environment (accessibility, role modeling and parental policies). Outcomes included child moderate-vigorous PA (MVPA) and sedentary time derived from accelerometer data and two dietary factors (“junk” and healthy food intake scores) based on factor analysis of mother-reported food intake. Linear regression models assessed the net effect (controlling for child demographics, study arm, supplemental timepoint, maternal education/work status, child body mass index and accelerometer wear-time (for PA outcomes)) of the home environment on the outcomes and moderation by maternal education/work status. Data was collected in North Carolina from 2007–2011. Results Parental policies supporting PA increased MVPA time, and limiting access to unhealthy foods increased the healthy food intake score. Role modeling of healthy eating behaviors increased the healthy food intake score among children of mothers with no college education. Among children of mothers with no college education and not working, limiting access to unhealthy foods and role modeling reduced “junk” food intake scores while parental policies supporting family meals increased “junk” food intake scores. Conclusions To promote MVPA, parental policies supporting child PA are warranted. Limited access to unhealthy foods and role modeling of healthy eating may improve the quality of the child’s food intake. PMID:23736357

  6. The effect of the home environment on physical activity and dietary intake in preschool children.

    PubMed

    Østbye, T; Malhotra, R; Stroo, M; Lovelady, C; Brouwer, R; Zucker, N; Fuemmeler, B

    2013-10-01

    The effects of the home environment on child health behaviors related to obesity are unclear. To examine the role of the home physical activity (PA) and food environment on corresponding outcomes in young children, and assess maternal education/work status as a moderator. Overweight or obese mothers reported on the home PA and food environment (accessibility, role modeling and parental policies). Outcomes included child moderate-vigorous PA (MVPA) and sedentary time derived from accelerometer data and two dietary factors ('junk' and healthy food intake scores) based on factor analysis of mother-reported food intake. Linear regression models assessed the net effect (controlling for child demographics, study arm, supplemental time point, maternal education/work status, child body mass index and accelerometer wear time (for PA outcomes)) of the home environment on the outcomes and moderation by maternal education/work status. Data were collected in North Carolina from 2007 to 2011. Parental policies supporting PA increased MVPA time, and limiting access to unhealthy foods increased the healthy food intake score. Role modeling of healthy eating behaviors increased the healthy food intake score among children of mothers with no college education. Among children of mothers with no college education and not working, limiting access to unhealthy foods and role modeling reduced 'junk' food intake scores whereas parental policies supporting family meals increased 'junk' food intake scores. To promote MVPA, parental policies supporting child PA are warranted. Limited access to unhealthy foods and role modeling of healthy eating may improve the quality of the child's food intake.

  7. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    PubMed

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  8. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    PubMed Central

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  9. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    PubMed

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  10. Randomized, Community-Based Pharmacy Intervention to Expand Services Beyond Sale of Sterile Syringes to Injection Drug Users in Pharmacies in New York City

    PubMed Central

    Amesty, Silvia; Rivera, Alexis V.; Harripersaud, Katherine; Turner, Alezandria; Fuller, Crystal M.

    2013-01-01

    Structural interventions may help reduce racial/ethnic disparities in HIV. In 2009 to 2011, we randomized pharmacies participating in a nonprescription syringe access program in minority communities to intervention (pharmacy enrolled and delivered HIV risk reduction information to injection drug users [IDUs]), primary control (pharmacy only enrolled IDUs), and secondary control (pharmacy did not engage IDUs). Intervention pharmacy staff reported more support for syringe sales than did control staff. An expanded pharmacy role in HIV risk reduction may be helpful. PMID:23865644

  11. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  12. Trust-based Access Control in Virtual Learning Community

    NASA Astrophysics Data System (ADS)

    Wang, Shujuan; Liu, Qingtang

    The virtual learning community is an important application pattern of E-Learning. It emphasizes the cooperation of the members in the community, the members would like to share their learning resources, to exchange their experience and complete the study task together. This instructional mode has already been proved as an effective way to improve the quality and efficiency of instruction. At the present time, the virtual learning communities are mostly designed using static access control policy by which the access permission rights are authorized by the super administrator, the super administrator assigns different rights to different roles, but the virtual and social characteristics of virtual learning community make information sharing and collaboration a complex problem, the community realizes its instructional goal only if the members in it believe that others will offer the knowledge they owned and believe the knowledge others offered is well-meaning and worthy. This paper tries to constitute an effective trust mechanism, which could promise favorable interaction and lasting knowledge sharing.

  13. Implementing Patient Access to Electronic Health Records Under HIPAA: Lessons Learned

    PubMed Central

    Wang, Tiffany; Pizziferri, Lisa; Volk, Lynn A; Mikels, Debra A; Grant, Karen G; Wald, Jonathan S; Bates, David W

    2004-01-01

    In 2001, the Institute of Medicine (IOM) and the Health Insurance Portability and Accountability Act (HIPAA) emphasized the need for patients to have greater control over their health information. We describe a Boston healthcare system's approach to providing patients access to their electronic health records (EHRs) via Patient Gateway, a secure, Web-based portal. Implemented in 19 clinic sites to date, Patient Gateway allows patients to access information from their medical charts via the Internet in a secure manner. Since 2002, over 19,000 patients have enrolled in Patient Gateway, more than 125,000 patients have logged into the system, and over 37,000 messages have been sent by patients to their practices. There have been no major security concerns. By providing access to EHR data, secure systems like Patient Gateway allow patients a greater role in their healthcare process, as envisioned by the IOM and HIPAA. PMID:18066391

  14. Toward edge minability for role mining in bipartite networks

    NASA Astrophysics Data System (ADS)

    Dong, Lijun; Wang, Yi; Liu, Ran; Pi, Benjie; Wu, Liuyi

    2016-11-01

    Bipartite network models have been extensively used in information security to automatically generate role-based access control (RBAC) from dataset. This process is called role mining. However, not all the topologies of bipartite networks are suitable for role mining; some edges may even reduce the quality of role mining. This causes unnecessary time consumption as role mining is NP-hard. Therefore, to promote the quality of role mining results, the capability that an edge composes roles with other edges, called the minability of edge, needs to be identified. We tackle the problem from an angle of edge importance in complex networks; that is an edge easily covered by roles is considered to be more important. Based on this idea, the k-shell decomposition of complex networks is extended to reveal the different minability of edges. By this way, a bipartite network can be quickly purified by excluding the low-minability edges from role mining, and thus the quality of role mining can be effectively improved. Extensive experiments via the real-world datasets are conducted to confirm the above claims.

  15. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  16. An action-based fine-grained access control mechanism for structured documents and its application.

    PubMed

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  17. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  18. PCASSO: a design for secure communication of personal health information via the internet.

    PubMed

    Baker, D B; Masys, D R

    1999-05-01

    The Internet holds both promise and peril for the communications of person-identifiable health information. Because of technical features designed to promote accessibility and interoperability rather than security, Internet addressing conventions and transport protocols are vulnerable to compromise by malicious persons and programs. In addition, most commonly used personal computer (PC) operating systems currently lack the hardware-based system software protection and process isolation that are essential for ensuring the integrity of trusted applications. Security approaches designed for electronic commerce, that trade known security weaknesses for limited financial liability, are not sufficient for personal health data, where the personal damage caused by unintentional disclosure may be far more serious. To overcome these obstacles, we are developing and evaluating an Internet-based communications system called PCASSO (Patient-centered access to secure systems online) that applies state of the art security to health information. PCASSO includes role-based access control, multi-level security, strong device and user authentication, session-specific encryption and audit trails. Unlike Internet-based electronic commerce 'solutions,' PCASSO secures data end-to-end: in the server; in the data repository; across the network; and on the client. PCASSO is designed to give patients as well as providers access to personal health records via the Internet.

  19. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  20. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    PubMed Central

    Guo, Yunchuan; Yin, Lihua; Li, Chao

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model. PMID:25177731

  1. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  2. Patient empowerment by the means of citizen-managed Electronic Health Records: web 2.0 health digital identity scenarios.

    PubMed

    Falcão-Reis, Filipa; Correia, Manuel E

    2010-01-01

    With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.

  3. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  4. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms are essential keys for this approach and they are accomplished by using semantic technologies (i.e., ontologies, rule languages, and inference engines). The results are mainly focused on the security and access control of the proposed scenario. An ontology has been designed and developed for the POVO covering the terminology of the scenario and easing the automation of administration tasks. Over that ontology, an access control mechanism based on rule languages allows specifying access control policies, and an inference engine performs the decision making process automatically. The usability of solutions to ease administration tasks to the SoC is improved by the Me-As-An-Admin (M3A) application. This guides the SoC through the specification of personal access control policies to his/her distributed resources by using semantic technologies (e.g., metamodeling, model-to-text transformations, etc.). All results are developed as services and included in an architecture in accordance with standards and principles of openness and interoperability. Current technology can bring health, social and well-being care actually centered on citizens, and granting each person the management of his/her health information. However, the application of technology without adopting methodologies or normalized guidelines will reduce the interoperability of solutions developed, failing in the development of advanced services and improved scenarios for health delivery. Standards and reference architectures can be cornerstones for future-proof and powerful developments. Finally, not only technology must follow citizen-centric approaches, but also the gaps needing legislative efforts that support these new paradigms of healthcare delivery must be identified and addressed. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  5. Iridium-Catalyzed Asymmetric Hydrogenation of Ketones with Accessible and Modular Ferrocene-Based Amino-phosphine Acid (f-Ampha) Ligands.

    PubMed

    Yu, Jianfei; Long, Jiao; Yang, Yuhong; Wu, Weilong; Xue, Peng; Chung, Lung Wa; Dong, Xiu-Qin; Zhang, Xumu

    2017-02-03

    A series of tridentate ferrocene-based amino-phosphine acid (f-Ampha) ligands have been successfully developed. The f-Ampha ligands are extremely air stable and exhibited excellent performance in the Ir-catalyzed asymmetric hydrogenation of ketones (full conversions, up to >99% ee, and 500 000 TON). DFT calculations were performed to elucidate the reaction mechanism and the importance of the -COOH group. Control experiments also revealed that the -COOH group played a key role in this reaction.

  6. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  7. Joint Battlespace Infosphere: Information Management Within a C2 Enterprise

    DTIC Science & Technology

    2005-06-01

    using. In version 1.2, we support both MySQL and Oracle as underlying implementations where the XML metadata schema is mapped into relational tables in...Identity Servers, Role-Based Access Control, and Policy Representation – Databases: Oracle , MySQL , TigerLogic, Berkeley XML DB 15 Instrumentation Services...converted to SQL for execution. Invocations are then forwarded to the appropriate underlying IOR core components that have the responsibility of issuing

  8. Automating individualized coaching and authentic role-play practice for brief intervention training.

    PubMed

    Hayes-Roth, B; Saker, R; Amano, K

    2010-01-01

    Brief intervention helps to reduce alcohol abuse, but there is a need for accessible, cost-effective training of clinicians. This study evaluated STAR Workshop , a web-based training system that automates efficacious techniques for individualized coaching and authentic role-play practice. We compared STAR Workshop to a web-based, self-guided e-book and a no-treatment control, for training the Engage for Change (E4C) brief intervention protocol. Subjects were medical and nursing students. Brief written skill probes tested subjects' performance of individual protocol steps, in different clinical scenarios, at three test times: pre-training, post-training, and post-delay (two weeks). Subjects also did live phone interviews with a standardized patient, post-delay. STAR subjects performed significantly better than both other groups. They showed significantly greater improvement from pre-training probes to post-training and post-delay probes. They scored significantly higher on post-delay phone interviews. STAR Workshop appears to be an accessible, cost-effective approach for training students to use the E4C protocol for brief intervention in alcohol abuse. It may also be useful for training other clinical interviewing protocols.

  9. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  10. The role of the University of the West Indies Mona libraries in HIV/AIDS information access and dissemination.

    PubMed

    Harris, S

    2013-01-01

    The recommendations for controlling HIV/AIDS, whether prescriptive or descriptive, underscore the value of information: its translation into knowledge, and knowledge into behaviour. Thus, accessing, evaluating, disseminating and applying authoritative, credible and scholarly information on HIV/AIDS are critical elements in the control of this pandemic in the Web 2.0 era. The University of the West Indies (UWI) Mona libraries have embraced this information role. This article provides insights into three of the information initiatives implemented by the UWI Mona libraries in this important capacity. In this regard, it also provides ideas for other West Indian information units and enhances communication on access to information products and services, albeit incrementally, in an important area of health services for the West Indies.

  11. What Does Role-Based Access Look Like? Examples from States

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2008

    2008-01-01

    Data are only useful if people are able to access, understand and use them. Without access to the right information, stakeholders are forced to make decisions based on anecdote, experience or instinct. For information to be useful, it must be timely, readily available, and easy to understand. Different stakeholders need and are entitled to access…

  12. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  13. Ecologists can enable communities to implement malaria vector control in Africa

    PubMed Central

    Mukabana, W Richard; Kannady, Khadija; Kiama, G Michael; Ijumba, Jasper N; Mathenge, Evan M; Kiche, Ibrahim; Nkwengulila, Gamba; Mboera, Leonard; Mtasiwa, Deo; Yamagata, Yoichi; van Schayk, Ingeborg; Knols, Bart GJ; Lindsay, Steven W; de Castro, Marcia Caldas; Mshinda, Hassan; Tanner, Marcel; Fillinger, Ulrike; Killeen, Gerry F

    2006-01-01

    Background Integrated vector management (IVM) for malaria control requires ecological skills that are very scarce and rarely applied in Africa today. Partnerships between communities and academic ecologists can address this capacity deficit, modernize the evidence base for such approaches and enable future scale up. Methods Community-based IVM programmes were initiated in two contrasting settings. On Rusinga Island, Western Kenya, community outreach to a marginalized rural community was achieved by University of Nairobi through a community-based organization. In Dar es Salaam, Tanzania, Ilala Municipality established an IVM programme at grassroots level, which was subsequently upgraded and expanded into a pilot scale Urban Malaria Control Programme with support from national academic institutes. Results Both programmes now access relevant expertise, funding and policy makers while the academic partners benefit from direct experience of community-based implementation and operational research opportunities. The communities now access up-to-date malaria-related knowledge and skills for translation into local action. Similarly, the academic partners have acquired better understanding of community needs and how to address them. Conclusion Until sufficient evidence is provided, community-based IVM remains an operational research activity. Researchers can never directly support every community in Africa so community-based IVM strategies and tactics will need to be incorporated into undergraduate teaching programmes to generate sufficient numbers of practitioners for national scale programmes. Academic ecologists at African institutions are uniquely positioned to enable the application of practical environmental and entomological skills for malaria control by communities at grassroots level and should be supported to fulfil this neglected role. PMID:16457724

  14. Self-organizing feature maps for dynamic control of radio resources in CDMA microcellular networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    1998-03-01

    The application of artificial neural networks to the channel assignment problem for cellular code-division multiple access (CDMA) cellular networks has previously been investigated. CDMA takes advantage of voice activity and spatial isolation because its capacity is only interference limited, unlike time-division multiple access (TDMA) and frequency-division multiple access (FDMA) where capacities are bandwidth-limited. Any reduction in interference in CDMA translates linearly into increased capacity. To satisfy the high demands for new services and improved connectivity for mobile communications, microcellular and picocellular systems are being introduced. For these systems, there is a need to develop robust and efficient management procedures for the allocation of power and spectrum to maximize radio capacity. Topology-conserving mappings play an important role in the biological processing of sensory inputs. The same principles underlying Kohonen's self-organizing feature maps (SOFMs) are applied to the adaptive control of radio resources to minimize interference, hence, maximize capacity in direct-sequence (DS) CDMA networks. The approach based on SOFMs is applied to some published examples of both theoretical and empirical models of DS/CDMA microcellular networks in metropolitan areas. The results of the approach for these examples are informally compared to the performance of algorithms, based on Hopfield- Tank neural networks and on genetic algorithms, for the channel assignment problem.

  15. An Extended Role-Based Access Control Model for Delegating Obligations

    NASA Astrophysics Data System (ADS)

    Ben-Ghorbel-Talbi, Meriam; Cuppens, Frédéric; Cuppens-Boulahia, Nora; Bouhoula, Adel

    The main aim of access control models is to provide means to simplify the management of the security policy, which is a fastidious and error-prone task. Supporting delegation is considered as an important mean to decentralize the administration and therefore to allow security policy to be more flexible and easier to manipulate. Our main contribution is the proposition of a unified model to the administration and delegation of obligations. Managing such delegations implies more requirements than managing traditional privileges delegation. In fact, delegating obligations may include two interpretations: the delegation of the obligation and the delegation of the responsibility related to this obligation. Therefore, it is important to deal with these two notions separately. Moreover, since delegating an obligation involves the delegation of sanctions, then the consent of the user who receives this delegation may be required in some cases. We address in this paper these requirements and we propose a formalism to deal with them.

  16. Enhancing access and retention in substance abuse treatment: the role of Medicaid payment acceptance and cultural competence.

    PubMed

    Guerrero, Erick G

    2013-10-01

    Health insurance coverage and quality of care are common factors believed to improve access for and retention of racial and ethnic minority groups in health care. However, there is little evidence that acceptance of public insurance and provision of culturally responsive care decrease wait time and retention of minority populations in community-based substance abuse treatment. We analyzed client and program data collected in 2010-2011 from publicly funded treatment programs in Los Angeles County, CA. An analytical sample of 13,328 primarily African American and Latino clients nested within 104 treatment programs located in minority communities was analyzed using multilevel negative binomial regressions on count measures of days to initiate and days spent in treatment. Programs that accepted public insurance (p<.001) and in which staff reported personal involvement (p<.01) and linkages and resources with minority communities (p<.001) were negatively associated with client wait time. Similarly, programs with culturally responsive policies and assessment and treatment practices (p<.05) were positively associated with retention in treatment, after controlling for individual and program characteristics. These preliminary findings provide an evidentiary base for the role of community-based financial and cultural practices in improving accessibility and treatment adherence in a population at high risk of treatment dropout. Implications related to health care reform legislation, which seeks to expand public insurance and enhance culturally competent care, are discussed. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Disparities in access to care and satisfaction among U.S. children: the roles of race/ethnicity and poverty status.

    PubMed

    Shi, Leiyu; Stevens, Gregory D

    2005-01-01

    The study assessed the progress made toward reducing racial and ethnic disparities in access to health care among U.S. children between 1996 and 2000. Data are from the Household Component of the 1996 and 2000 Medical Expenditure Panel Survey. Bivariate associations of combinations of race/ethnicity and poverty status groups were examined with four measures of access to health care and a single measure of satisfaction. Logistic regression was used to examine the association of race/ethnicity with access, controlling for sociodemographic factors associated with access to care. To highlight the role of income, we present models with and without controlling for poverty status. Racial and ethnic minority children experience significant deficits in accessing medical care compared with whites. Asians, Hispanics, and blacks were less likely than whites to have a usual source of care, health professional or doctor visit, and dental visit in the past year. Asians were more likely than whites to be dissatisfied with the quality of medical care in 2000 (but not 1996), while blacks and Hispanics were more likely than whites to be dissatisfied with the quality of medical care in 1996 (but not in 2000). Both before and after controlling for health insurance coverage, poverty status, health status, and several other factors associated with access to care, these disparities in access to care persisted between 1996 and 2000. Continued monitoring of racial and ethnic differences is necessary in light of the persistence of racial/ethnic and socioeconomic disparities in access to care. Given national goals to achieve equity in health care and eliminate racial/ ethnic disparities in health, greater attention needs to be paid to the interplay of race/ethnicity factors and poverty status in influencing access.

  18. Detecting Payload Attacks on Programmable Logic Controllers (PLCs)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yang, Huan

    Programmable logic controllers (PLCs) play critical roles in industrial control systems (ICS). Providing hardware peripherals and firmware support for control programs (i.e., a PLC’s “payload”) written in languages such as ladder logic, PLCs directly receive sensor readings and control ICS physical processes. An attacker with access to PLC development software (e.g., by compromising an engineering workstation) can modify the payload program and cause severe physical damages to the ICS. To protect critical ICS infrastructure, we propose to model runtime behaviors of legitimate PLC payload program and use runtime behavior monitoring in PLC firmware to detect payload attacks. By monitoring themore » I/O access patterns, network access patterns, as well as payload program timing characteristics, our proposed firmware-level detection mechanism can detect abnormal runtime behaviors of malicious PLC payload. Using our proof-of-concept implementation, we evaluate the memory and execution time overhead of implementing our proposed method and find that it is feasible to incorporate our method into existing PLC firmware. In addition, our evaluation results show that a wide variety of payload attacks can be effectively detected by our proposed approach. The proposed firmware-level payload attack detection scheme complements existing bumpin- the-wire solutions (e.g., external temporal-logic-based model checkers) in that it can detect payload attacks that violate realtime requirements of ICS operations and does not require any additional apparatus.« less

  19. Security and privacy in electronic health records: a systematic literature review.

    PubMed

    Fernández-Alemán, José Luis; Señor, Inmaculada Carrión; Lozoya, Pedro Ángel Oliver; Toval, Ambrosio

    2013-06-01

    To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems. Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database. Only those articles dealing with the security and privacy of EHR systems. The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth. A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems' roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy. Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  1. Mortality salience and the spreading activation of worldview-relevant constructs: exploring the cognitive architecture of terror management.

    PubMed

    Arndt, Jamie; Greenberg, Jeff; Cook, Alison

    2002-09-01

    Seven experiments assessed the hypothesis derived from terror management theory that reminding people of their mortality would increase accessibility of constructs central to their worldview. Experiment 1 found that mortality primes, relative to control primes, increased accessibility of nationalistic constructs for men but not for women. Experiment 2 replicated this finding and also found that mortality salience increased romantic accessibility for women but not for men. Four subsequent experiments supported the role of unconscious death-related ideation in producing these effects. A final experiment demonstrated that situational primes can increase the accessibility of nationalistic constructs for women after mortality salience. The roles of situational cues and individual differences in the effects of exposure to death-related stimuli on worldview-relevant construct accessibility are discussed.

  2. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  3. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  4. Towards an Approach of Semantic Access Control for Cloud Computing

    NASA Astrophysics Data System (ADS)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  5. Simple measurement-based admission control for DiffServ access networks

    NASA Astrophysics Data System (ADS)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  6. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  7. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  8. The PO.DAAC Portal and its use of the Drupal Framework

    NASA Astrophysics Data System (ADS)

    Alarcon, C.; Huang, T.; Bingham, A.; Cosic, S.

    2011-12-01

    The Physical Oceanography Distributed Active Archive Center portal (http://podaac.jpl.nasa.gov) is the primary interface for discovering and accessing oceanographic datasets collected from the vantage point of space. In addition, it provides information about NASA's satellite missions and operational activities at the data center. Recently the portal underwent a major redesign and deployment utilizing the Drupal framework. The Drupal framework was chosen as the platform for the portal due to its flexibility, open source community, and modular infrastructure. The portal features efficient content addition and management, mailing lists, forums, role based access control, and a faceted dataset browse capability. The dataset browsing was built as a custom Drupal module and integrates with a SOLR search engine.

  9. FPGA-Based Reconfigurable Processor for Ultrafast Interlaced Ultrasound and Photoacoustic Imaging

    PubMed Central

    Alqasemi, Umar; Li, Hai; Aguirre, Andrés; Zhu, Quing

    2016-01-01

    In this paper, we report, to the best of our knowledge, a unique field-programmable gate array (FPGA)-based reconfigurable processor for real-time interlaced co-registered ultrasound and photoacoustic imaging and its application in imaging tumor dynamic response. The FPGA is used to control, acquire, store, delay-and-sum, and transfer the data for real-time co-registered imaging. The FPGA controls the ultrasound transmission and ultrasound and photoacoustic data acquisition process of a customized 16-channel module that contains all of the necessary analog and digital circuits. The 16-channel module is one of multiple modules plugged into a motherboard; their beamformed outputs are made available for a digital signal processor (DSP) to access using an external memory interface (EMIF). The FPGA performs a key role through ultrafast reconfiguration and adaptation of its structure to allow real-time switching between the two imaging modes, including transmission control, laser synchronization, internal memory structure, beamforming, and EMIF structure and memory size. It performs another role by parallel accessing of internal memories and multi-thread processing to reduce the transfer of data and the processing load on the DSP. Furthermore, because the laser will be pulsing even during ultrasound pulse-echo acquisition, the FPGA ensures that the laser pulses are far enough from the pulse-echo acquisitions by appropriate time-division multiplexing (TDM). A co-registered ultrasound and photoacoustic imaging system consisting of four FPGA modules (64-channels) is constructed, and its performance is demonstrated using phantom targets and in vivo mouse tumor models. PMID:22828830

  10. FPGA-based reconfigurable processor for ultrafast interlaced ultrasound and photoacoustic imaging.

    PubMed

    Alqasemi, Umar; Li, Hai; Aguirre, Andrés; Zhu, Quing

    2012-07-01

    In this paper, we report, to the best of our knowledge, a unique field-programmable gate array (FPGA)-based reconfigurable processor for real-time interlaced co-registered ultrasound and photoacoustic imaging and its application in imaging tumor dynamic response. The FPGA is used to control, acquire, store, delay-and-sum, and transfer the data for real-time co-registered imaging. The FPGA controls the ultrasound transmission and ultrasound and photoacoustic data acquisition process of a customized 16-channel module that contains all of the necessary analog and digital circuits. The 16-channel module is one of multiple modules plugged into a motherboard; their beamformed outputs are made available for a digital signal processor (DSP) to access using an external memory interface (EMIF). The FPGA performs a key role through ultrafast reconfiguration and adaptation of its structure to allow real-time switching between the two imaging modes, including transmission control, laser synchronization, internal memory structure, beamforming, and EMIF structure and memory size. It performs another role by parallel accessing of internal memories and multi-thread processing to reduce the transfer of data and the processing load on the DSP. Furthermore, because the laser will be pulsing even during ultrasound pulse-echo acquisition, the FPGA ensures that the laser pulses are far enough from the pulse-echo acquisitions by appropriate time-division multiplexing (TDM). A co-registered ultrasound and photoacoustic imaging system consisting of four FPGA modules (64-channels) is constructed, and its performance is demonstrated using phantom targets and in vivo mouse tumor models.

  11. The Role of International Medical Graduates in America?s Small Rural Critical Access Hospitals

    ERIC Educational Resources Information Center

    Hagopian, Amy; Thompson, Matthew J.; Kaltenbach, Emily; Hart, L. Gary

    2004-01-01

    Critical access hospitals (CAHs) are a federal Medicare category for isolated rural facilities with 15 or fewer acute care beds that receive cost-based reimbursement from Medicare. Purpose: This study examines the role of foreign-born international medical graduates (IMGs) in the staffing of CAHs. Methods: Chief executive officers (CEOs) of CAH…

  12. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  13. Provider Perspectives on School-Based Mental Health for Urban Minority Youth: Access and Services

    ERIC Educational Resources Information Center

    Gamble, Brandon E.; Lambros, Katina M.

    2014-01-01

    This article provides results from a qualitative study on the efforts of school-based mental health providers (SBMHPs) who serve students in urban, suburban, and ethnically diverse settings to help families access quality mental health services. School-based mental health plays a key role in the provision of direct and indirect intervention…

  14. State Action 5: Role-Based, Timely Access to Information for Authorized Stakeholders. State Actions to Change the Culture around Data--from Building to Using Data

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2010

    2010-01-01

    Data are only useful if people are able to access, understand and use them. Without access to the right information, stakeholders are forced to make decisions based on anecdote, experience or instinct. For information to be useful, it must be timely, readily available, and easy to understand. This brief highlights the importance of implementing…

  15. Accessibility, stabilizability, and feedback control of continuous orbital transfer.

    PubMed

    Gurfil, Pini

    2004-05-01

    This paper investigates the problem of low-thrust orbital transfer using orbital element feedback from a control-theoretic standpoint, concepts of controllability, feedback stabilizability, and their interaction. The Gauss variational equations (GVEs) are used to model the state-space dynamics. First, the notion of accessibility, a weaker form of controllability, is presented. It is then shown that the GVEs are globally accessible. Based on the accessibility result, a nonlinear feedback controller is derived that asymptotically steers a vehicle from an initial elliptic Keplerian orbit to any given elliptic Keplerian orbit. The performance of the new controller is illustrated by simulating an orbital transfer between two geosynchronous Earth orbits. It is shown that the low-thrust controller requires less fuel than an impulsive maneuver for the same transfer time. Closed-form, analytic expressions for the new orbital transfer controller are given. Finally, it is proved, based on a topological nonlinear stabilizability test, that there does not exist a continuous closed-loop controller that can transfer a spacecraft to a parabolic escape trajectory.

  16. Virtual reality: emerging role of simulation training in vascular access.

    PubMed

    Davidson, Ingemar J A; Lok, Charmaine; Dolmatch, Bart; Gallieni, Maurizio; Nolen, Billy; Pittiruti, Mauro; Ross, John; Slakey, Douglas

    2012-11-01

    Evolving new technologies in vascular access mandate increased attention to patient safety; an often overlooked yet valuable training tool is simulation. For the end-stage renal disease patient, simulation tools are effective for all aspects of creating access for peritoneal dialysis and hemodialysis. Based on aviation principles, known as crew resource management, we place equal emphasis on team training as individual training to improve interactions between team members and systems, cumulating in improved safety. Simulation allows for environmental control and standardized procedures, letting the trainee practice and correct mistakes without harm to patients, compared with traditional patient-based training. Vascular access simulators range from suture devices, to pressurized tunneled conduits for needle cannulation, to computer-based interventional simulators. Simulation training includes simulated case learning, root cause analysis of adverse outcomes, and continual update and refinement of concepts. Implementation of effective human to complex systems interaction in end-stage renal disease patients involves a change in institutional culture. Three concepts discussed in this article are as follows: (1) the need for user-friendly systems and technology to enhance performance, (2) the necessity for members to both train and work together as a team, and (3) the team assigned to use the system must test and practice it to a proficient level before safely using the system on patients. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Evolving provider payment models and patient access to innovative medical technology.

    PubMed

    Long, Genia; Mortimer, Richard; Sanzenbacher, Geoffrey

    2014-12-01

    Abstract Objective: To investigate the evolving use and expected impact of pay-for-performance (P4P) and risk-based provider reimbursement on patient access to innovative medical technology. Structured interviews with leading private payers representing over 110 million commercially-insured lives exploring current and planned use of P4P provider payment models, evidence requirements for technology assessment and new technology coverage, and the evolving relationship between the two topics. Respondents reported rapid increases in the use of P4P and risk-sharing programs, with roughly half of commercial lives affected 3 years ago, just under two-thirds today, and an expected three-quarters in 3 years. All reported well-established systems for evaluating new technology coverage. Five of nine reported becoming more selective in the past 3 years in approving new technologies; four anticipated that in the next 3 years there will be a higher evidence requirement for new technology access. Similarly, four expected it will become more difficult for clinically appropriate but costly technologies to gain coverage. All reported planning to rely more on these types of provider payment incentives to control costs, but didn't see them as a substitute for payer technology reviews and coverage limitations; they each have a role to play. Interviews limited to nine leading payers with models in place; self-reported data. Likely implications include a more uncertain payment environment for providers, and indirectly for innovative medical technology and future investment, greater reliance on quality and financial metrics, and increased evidence requirements for favorable coverage and utilization decisions. Increasing provider financial risk may challenge the traditional technology adoption paradigm, where payers assumed a 'gatekeeping' role and providers a countervailing patient advocacy role with regard to access to new technology. Increased provider financial risk may result in an additional hurdle to the adoption of new technology, rather than substitution of provider- for payer-based gatekeeping.

  18. Uses of cancer registries for public health and clinical research in Europe: Results of the European Network of Cancer Registries survey among 161 population-based cancer registries during 2010-2012.

    PubMed

    Siesling, S; Louwman, W J; Kwast, A; van den Hurk, C; O'Callaghan, M; Rosso, S; Zanetti, R; Storm, H; Comber, H; Steliarova-Foucher, E; Coebergh, J W

    2015-06-01

    To provide insight into cancer registration coverage, data access and use in Europe. This contributes to data and infrastructure harmonisation and will foster a more prominent role of cancer registries (CRs) within public health, clinical policy and cancer research, whether within or outside the European Research Area. During 2010-12 an extensive survey of cancer registration practices and data use was conducted among 161 population-based CRs across Europe. Responding registries (66%) operated in 33 countries, including 23 with national coverage. Population-based oncological surveillance started during the 1940-50s in the northwest of Europe and from the 1970s to 1990s in other regions. The European Union (EU) protection regulations affected data access, especially in Germany and France, but less in the Netherlands or Belgium. Regular reports were produced by CRs on incidence rates (95%), survival (60%) and stage for selected tumours (80%). Evaluation of cancer control and quality of care remained modest except in a few dedicated CRs. Variables evaluated were support of clinical audits, monitoring adherence to clinical guidelines, improvement of cancer care and evaluation of mass cancer screening. Evaluation of diagnostic imaging tools was only occasional. Most population-based CRs are well equipped for strengthening cancer surveillance across Europe. Data quality and intensity of use depend on the role the cancer registry plays in the politico, oncomedical and public health setting within the country. Standard registration methodology could therefore not be translated to equivalent advances in cancer prevention and mass screening, quality of care, translational research of prognosis and survivorship across Europe. Further European collaboration remains essential to ensure access to data and comparability of the results. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. A Document-Based EHR System That Controls the Disclosure of Clinical Documents Using an Access Control List File Based on the HL7 CDA Header.

    PubMed

    Takeda, Toshihiro; Ueda, Kanayo; Nakagawa, Akito; Manabe, Shirou; Okada, Katsuki; Mihara, Naoki; Matsumura, Yasushi

    2017-01-01

    Electronic health record (EHR) systems are necessary for the sharing of medical information between care delivery organizations (CDOs). We developed a document-based EHR system in which all of the PDF documents that are stored in our electronic medical record system can be disclosed to selected target CDOs. An access control list (ACL) file was designed based on the HL7 CDA header to manage the information that is disclosed.

  20. Does land ownership make a difference? Women's roles in agriculture in Kerala, India.

    PubMed

    Arun, S

    1999-11-01

    Drawing on a 12-month study, this paper explores the role of women in agriculture in Kerala, India. Despite claims that women enjoy high status in Kerala, economic, social, and cultural factors interplay to reinforce gender differences in ownership, control over, and access to critical agricultural resources, including land. Although women may gain access to land through inheritance, marriage, or informal networks, none of this guarantee effective control over it. The traditional rights of women to land have not been adequately recognized: the gender gap in the ownership and control of property is the only most significant contributor to the gender gap in the economic well-being, social status, and empowerment of women. The existing socioeconomic changes and crisis which render agricultural land as a main source of livelihood, is leading nair women's share of land being sold, with gains going to men, thus decreasing women¿s ownership of land to the status of male-controlled dowry. The case of the Christian succession laws in Kerala illustrate that legal provisions alone can have a limited impact on changing gendered power structures. The role of women in agriculture needs to be recognized, and institutional support must be increased in order for women to gain access to agricultural inputs and technology, which in turn, leads to better agricultural practices and a higher income from farming in the country. Most importantly, there should be a concerted effort to enable women to function as independent farmers who control their own land.

  1. Security middleware infrastructure for DICOM images in health information systems.

    PubMed

    Kallepalli, Vijay N V; Ehikioya, Sylvanus A; Camorlinga, Sergio; Rueda, Jose A

    2003-12-01

    In health care, it is mandatory to maintain the privacy and confidentiality of medical data. To achieve this, a fine-grained access control and an access log for accessing medical images are two important aspects that need to be considered in health care systems. Fine-grained access control provides access to medical data only to authorized persons based on priority, location, and content. A log captures each attempt to access medical data. This article describes an overall middleware infrastructure required for secure access to Digital Imaging and Communication in Medicine (DICOM) images, with an emphasis on access control and log maintenance. We introduce a hybrid access control model that combines the properties of two existing models. A trust relationship between hospitals is used to make the hybrid access control model scalable across hospitals. We also discuss events that have to be logged and where the log has to be maintained. A prototype of security middleware infrastructure is implemented.

  2. "Just Dance": The Effects of Exergame Feedback and Controller Use on Physical Activity and Psychological Outcomes.

    PubMed

    Lin, Jih-Hsuan

    2015-06-01

    In Asia, dance games are among the most popular types of exergames. Whereas traditional dance-based games emphasize step movements on a dance pad, more recent dance games emphasize intuitive dance movements using simple controllers or players' own bodies to "just dance." However, because of limited space and access, young adults in Taiwan often do not use these games. Popular dance videos on YouTube are more readily available to students because these videos can be accessed on a computer. Therefore, the current study examines the effects of interactivity (the role of feedback) and controller use on participants' physiological and psychological outcomes during exergames. The dance game "Just Dance 3" (Ubisoft, Montreuil, France) was chosen as the stimulus for this study. Participants danced through one song for rehearsal and warm-up, followed by three songs for the experiment, which lasted approximately 12 minutes. One hundred twenty-nine college students participated in a 2×2×2 (interactivity, feedback versus no feedback; controller, with versus without; sex, male versus female) between-subject factorial design. A series of 2×2×2 (interactivity, controller, and sex) analyses of variance showed no significant differences in interaction effects on participants' heart rates, blood pressures, body movements, step counts, or perceived psychological outcomes. Dance game videos without feedback are also effective tools for achieving moderate-level exercise intensity. These videos can supplement the limited access to games in Asian countries, such as Taiwan.

  3. Teens' Survey of Stores in the District of Columbia on Accessibility of Family Planning Methods.

    ERIC Educational Resources Information Center

    Center for Population Options, Washington, DC.

    Access to and availability of contraceptive methods in stores play an important role in the prevention of AIDS, unwanted pregnancies, and other sexually transmitted diseases. Although teens are generally knowledgable about birth control, many encounter barriers when attempting to obtain contraceptive. Forty-five drug stores and 15 convenience…

  4. Method and device for maximizing memory system bandwidth by accessing data in a dynamically determined order

    NASA Technical Reports Server (NTRS)

    Schwab, Andrew J. (Inventor); Aylor, James (Inventor); Hitchcock, Charles Young (Inventor); Wulf, William A. (Inventor); McKee, Sally A. (Inventor); Moyer, Stephen A. (Inventor); Klenke, Robert (Inventor)

    2000-01-01

    A data processing system is disclosed which comprises a data processor and memory control device for controlling the access of information from the memory. The memory control device includes temporary storage and decision ability for determining what order to execute the memory accesses. The compiler detects the requirements of the data processor and selects the data to stream to the memory control device which determines a memory access order. The order in which to access said information is selected based on the location of information stored in the memory. The information is repeatedly accessed from memory and stored in the temporary storage until all streamed information is accessed. The information is stored until required by the data processor. The selection of the order in which to access information maximizes bandwidth and decreases the retrieval time.

  5. Obesity and government.

    PubMed

    Kahan, Scott; Zvenyach, Tracy

    2016-10-01

    Despite much effort, obesity prevalence and disease severity continues to worsen. The purpose of this review is to describe the leading government supported food and nutrition interventions and policies to prevent and address obesity in the USA. The review also summarizes obesity interventions and policies that the government plays a role in, but further development is warranted. The government's role in obesity has largely focused on interventions and policies such as national surveillance, obesity education and awareness, grant-based food subsidy programs, zoning for food access, school-based nutrition programs, dietary guidelines, nutrition labeling, and food marketing and pricing policies. The government has played a lesser role in obesity interventions and policies that provide access to evidence-based obesity care to people affected by the disease. Given the magnitude of the obesity epidemic, the government should explore multiple evidence-based interventions and policies across prevention and clinical care.

  6. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  7. Simulation-based Randomized Comparative Assessment of Out-of-Hospital Cardiac Arrest Resuscitation Bundle Completion by Emergency Medical Service Teams Using Standard Life Support or an Experimental Automation-assisted Approach.

    PubMed

    Choi, Bryan; Asselin, Nicholas; Pettit, Catherine C; Dannecker, Max; Machan, Jason T; Merck, Derek L; Merck, Lisa H; Suner, Selim; Williams, Kenneth A; Jay, Gregory D; Kobayashi, Leo

    2016-12-01

    Effective resuscitation of out-of-hospital cardiac arrest (OHCA) patients is challenging. Alternative resuscitative approaches using electromechanical adjuncts may improve provider performance. Investigators applied simulation to study the effect of an experimental automation-assisted, goal-directed OHCA management protocol on EMS providers' resuscitation performance relative to standard protocols and equipment. Two-provider (emergency medical technicians (EMT)-B and EMT-I/C/P) teams were randomized to control or experimental group. Each team engaged in 3 simulations: baseline simulation (standard roles); repeat simulation (standard roles); and abbreviated repeat simulation (reversed roles, i.e., basic life support provider performing ALS tasks). Control teams used standard OHCA protocols and equipment (with high-performance cardiopulmonary resuscitation training intervention); for second and third simulations, experimental teams performed chest compression, defibrillation, airway, pulmonary ventilation, vascular access, medication, and transport tasks with goal-directed protocol and resuscitation-automating devices. Videorecorders and simulator logs collected resuscitation data. Ten control and 10 experimental teams comprised 20 EMT-B's; 1 EMT-I, 8 EMT-C's, and 11 EMT-P's; study groups were not fully matched. Both groups suboptimally performed chest compressions and ventilations at baseline. For their second simulations, control teams performed similarly except for reduced on-scene time, and experimental teams improved their chest compressions (P=0.03), pulmonary ventilations (P<0.01), and medication administration (P=0.02); changes in their performance of chest compression, defibrillation, airway, and transport tasks did not attain significance against control teams' changes. Experimental teams maintained performance improvements during reversed-role simulations. Simulation-based investigation into OHCA resuscitation revealed considerable variability and improvable deficiencies in small EMS teams. Goal-directed, automation-assisted OHCA management augmented select resuscitation bundle element performance without comprehensive improvement.

  8. A model of roles and responsibilities in oral health promotion based on perspectives of a community-based initiative for pre-school children in the U.K.

    PubMed

    Henderson, E; Rubin, G

    2014-03-01

    (i) To explore dental, school and family perspectives of an oral health promotion (OHP) initiative to improve access for pre-school children in deprived communities; (ii) to develop a model of roles and responsibilities for OHP in community settings. Semi-structured focus groups (n = 6) with dental practice staff (n = 24), and semi-structured interviews with school staff (n = 9) and parents and children (n = 4) who were involved in an OHP initiative for pre-school children. Framework analysis was applied to identify themes. Themes were used to develop a model of roles and responsibilities for OHP, based on the WHO Planning and evaluating health promotion model. Respondents subscribed to a community-based approach to improving access to dental services for pre-school children in deprived areas, with an emphasis on shared responsibility and communication. In addition to macro-level actions in directing health policy and services, commissioners were held responsible for investing in micro-level actions, such as funding OHP training and involving parents, and meso-level actions such as reducing barriers to access. The model we have developed builds on WHO recommendations on health promotion to identify the key roles and responsibilities that should be incorporated into further initiatives in OHP.

  9. Efficient Authorization of Rich Presence Using Secure and Composed Web Services

    NASA Astrophysics Data System (ADS)

    Li, Li; Chou, Wu

    This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.

  10. Readily Accessible and Highly Efficient Ferrocene-Based Amino-Phosphine-Alcohol (f-Amphol) Ligands for Iridium-Catalyzed Asymmetric Hydrogenation of Simple Ketones.

    PubMed

    Yu, Jianfei; Duan, Meng; Wu, Weilong; Qi, Xiaotian; Xue, Peng; Lan, Yu; Dong, Xiu-Qin; Zhang, Xumu

    2017-01-18

    We have successfully developed a series of novel and modular ferrorence-based amino-phosphine-alcohol (f-Amphol) ligands, and applied them to iridium-catalyzed asymmetric hydrogenation of various simple ketones to afford the corresponding chiral alcohols with excellent enantioselectivities and conversions (98-99.9 % ee, >99 % conversion, turnover number up to 200 000). Control experiments and density functional theory (DFT) calculations have shown that the hydroxyl group of our f-Amphol ligands played a key role in this asymmetric hydrogenation. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. One-session computer-based exposure treatment for spider-fearful individuals--efficacy of a minimal self-help intervention in a randomised controlled trial.

    PubMed

    Müller, Birgit H; Kull, Sandra; Wilhelm, Frank H; Michael, Tanja

    2011-06-01

    Computer-based self-help treatments have been proposed to provide greater access to treatment while requiring minimum input from a therapist. The authors employed a randomised controlled trial to investigate the efficacy of one-session computer-based exposure (CBE) as a self-help treatment for spider-fearful individuals. Spider-fearful participants in a CBE group underwent one 27-min session of standardised exposure to nine fear-eliciting spider pictures. Treatment outcome was compared to spider-fearful control participants exposed to nine neutral pictures. Fear reduction was quantified on a subjective level by the Fear of Spiders Questionnaire (FSQ) and complemented with a behavioural approach test (BAT). Results demonstrate that compared to control participants, CBE participants showed greater fear reduction from pre- to posttreatment on both the subjective level (FSQ) and the behavioural level (BAT). Moreover, in contrast to the control group, the obtained subjective fear reduction effect remained stable in the CBE group at 1-month follow-up. These findings highlight the role of computer-based self-help as a minimal but effective intervention to reduce fear of spiders. Copyright © 2010 Elsevier Ltd. All rights reserved.

  12. An end-to-end secure patient information access card system.

    PubMed

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  13. Doing Your Science While You're in Orbit

    NASA Astrophysics Data System (ADS)

    Green, Mark L.; Miller, Stephen D.; Vazhkudai, Sudharshan S.; Trater, James R.

    2010-11-01

    Large-scale neutron facilities such as the Spallation Neutron Source (SNS) located at Oak Ridge National Laboratory need easy-to-use access to Department of Energy Leadership Computing Facilities and experiment repository data. The Orbiter thick- and thin-client and its supporting Service Oriented Architecture (SOA) based services (available at https://orbiter.sns.gov) consist of standards-based components that are reusable and extensible for accessing high performance computing, data and computational grid infrastructure, and cluster-based resources easily from a user configurable interface. The primary Orbiter system goals consist of (1) developing infrastructure for the creation and automation of virtual instrumentation experiment optimization, (2) developing user interfaces for thin- and thick-client access, (3) provide a prototype incorporating major instrument simulation packages, and (4) facilitate neutron science community access and collaboration. The secure Orbiter SOA authentication and authorization is achieved through the developed Virtual File System (VFS) services, which use Role-Based Access Control (RBAC) for data repository file access, thin-and thick-client functionality and application access, and computational job workflow management. The VFS Relational Database Management System (RDMS) consists of approximately 45 database tables describing 498 user accounts with 495 groups over 432,000 directories with 904,077 repository files. Over 59 million NeXus file metadata records are associated to the 12,800 unique NeXus file field/class names generated from the 52,824 repository NeXus files. Services that enable (a) summary dashboards of data repository status with Quality of Service (QoS) metrics, (b) data repository NeXus file field/class name full text search capabilities within a Google like interface, (c) fully functional RBAC browser for the read-only data repository and shared areas, (d) user/group defined and shared metadata for data repository files, (e) user, group, repository, and web 2.0 based global positioning with additional service capabilities are currently available. The SNS based Orbiter SOA integration progress with the Distributed Data Analysis for Neutron Scattering Experiments (DANSE) software development project is summarized with an emphasis on DANSE Central Services and the Virtual Neutron Facility (VNF). Additionally, the DANSE utilization of the Orbiter SOA authentication, authorization, and data transfer services best practice implementations are presented.

  14. The role of mothers-in-law in antenatal care decision-making in Nepal: a qualitative study.

    PubMed

    Simkhada, Bibha; Porter, Maureen A; van Teijlingen, Edwin R

    2010-07-01

    Antenatal care (ANC) has been recognised as a way to improve health outcomes for pregnant women and their babies. However, only 29% of pregnant women receive the recommended four antenatal visits in Nepal but reasons for such low utilisation are poorly understood. As in many countries of South Asia, mothers-in-law play a crucial role in the decisions around accessing health care facilities and providers. This paper aims to explore the mother-in-law's role in (a) her daughter-in-law's ANC uptake; and (b) the decision-making process about using ANC services in Nepal. In-depth interviews were conducted with 30 purposively selected antenatal or postnatal mothers (half users, half non-users of ANC), 10 husbands and 10 mothers-in-law in two different (urban and rural) communities. Our findings suggest that mothers-in-law sometime have a positive influence, for example when encouraging women to seek ANC, but more often it is negative. Like many rural women of their generation, all mothers-in-law in this study were illiterate and most had not used ANC themselves. The main factors leading mothers-in-law not to support/encourage ANC check ups were expectations regarding pregnant women fulfilling their household duties, perceptions that ANC was not beneficial based largely on their own past experiences, the scarcity of resources under their control and power relations between mothers-in-law and daughters-in-law. Individual knowledge and social class of the mothers-in-law of users and non-users differed significantly, which is likely to have had an effect on their perceptions of the benefits of ANC. Mothers-in-law have a strong influence on the uptake of ANC in Nepal. Understanding their role is important if we are to design and target effective community-based health promotion interventions. Health promotion and educational interventions to improve the use of ANC should target women, husbands and family members, particularly mothers-in-law where they control access to family resources.

  15. The role of gender in housing for individuals with severe mental illness: a qualitative study of the Canadian service context

    PubMed Central

    Kidd, Sean A; Virdee, Gursharan; Krupa, Terry; Burnham, Darrell; Hemingway, Dawn; Margolin, Indrani; Patterson, Michelle; Zabkiewicz, Denise

    2013-01-01

    Objective This study was undertaken to examine the role of gender as it relates to access to housing among individuals with severe mental illness (SMI) in Canada. Design An exploratory, qualitative approach was used to assess the perspectives of Canadian housing experts. The focus of inquiry was on the role of gender and associated intersections (eg, ethnicity) in pathways to housing access and housing needs for individuals with SMI. Setting A purposeful sampling strategy was undertaken to access respondents across all Canadian geographic regions, with diversity across settings (urban and rural) and service sectors (hospital based and community based). Participants –29 individuals (6 men and 23 women) considered to be experts in a housing service context as it pertains to SMI were recruited. On average, participants had worked for 15 years in services that specialised in the support and delivery of housing services to people with SMI. Measures Semistructured interviews with participants focused on the role gender plays in access to housing in their specific context. Barriers and facilitators were examined as were intersections with other relevant factors, such as ethnicity, poverty and parenthood. Quantitative ratings of housing accessibility as a function of gender were also collected. Results Participants across geographic contexts described a lack of shelter facilities for women, leading to a reliance on exploitative circumstances. Other findings included a compounding of discrimination for ethnic minority women, the unique resource problems faced in rural contexts, and the difficulties that attend access to shelter and housing for parents with SMI. Conclusions These findings suggest that, along with a generally poor availability of housing stock for individuals with SMI, access problems are compounded by a lack of attention to the unique needs and illness trajectories that attend gender. PMID:23794544

  16. Model of load distribution for earth observation satellite

    NASA Astrophysics Data System (ADS)

    Tu, Shumin; Du, Min; Li, Wei

    2017-03-01

    For the system of multiple types of EOS (Earth Observing Satellites), it is a vital issue to assure that each type of payloads carried by the group of EOS can be used efficiently and reasonably for in astronautics fields. Currently, most of researches on configuration of satellite and payloads focus on the scheduling for launched satellites. However, the assignments of payloads for un-launched satellites are bit researched, which are the same crucial as the scheduling of tasks. Moreover, the current models of satellite resources scheduling lack of more general characteristics. Referring the idea about roles-based access control (RBAC) of information system, this paper brings forward a model based on role-mining of RBAC to improve the generality and foresight of the method of assignments of satellite-payload. By this way, the assignment of satellite-payload can be mapped onto the problem of role-mining. A novel method will be introduced, based on the idea of biclique-combination in graph theory and evolutionary algorithm in intelligence computing, to address the role-mining problem of satellite-payload assignments. The simulation experiments are performed to verify the novel method. Finally, the work of this paper is concluded.

  17. Experience with ActiveX control for simple channel access

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  18. Embedded controller for GEM detector readout system

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Byszuk, Adrian; Chernyshova, Maryna; Cieszewski, Radosław; Czarski, Tomasz; Dominik, Wojciech; Jakubowska, Katarzyna L.; Kasprowicz, Grzegorz; Poźniak, Krzysztof; Rzadkiewicz, Jacek; Scholz, Marek

    2013-10-01

    This paper describes the embedded controller used for the multichannel readout system for the GEM detector. The controller is based on the embedded Mini ITX mainboard, running the GNU/Linux operating system. The controller offers two interfaces to communicate with the FPGA based readout system. FPGA configuration and diagnostics is controlled via low speed USB based interface, while high-speed setup of the readout parameters and reception of the measured data is handled by the PCI Express (PCIe) interface. Hardware access is synchronized by the dedicated server written in C. Multiple clients may connect to this server via TCP/IP network, and different priority is assigned to individual clients. Specialized protocols have been implemented both for low level access on register level and for high level access with transfer of structured data with "msgpack" protocol. High level functionalities have been split between multiple TCP/IP servers for parallel operation. Status of the system may be checked, and basic maintenance may be performed via web interface, while the expert access is possible via SSH server. System was designed with reliability and flexibility in mind.

  19. Internet addiction: definition, assessment, epidemiology and clinical management.

    PubMed

    Shaw, Martha; Black, Donald W

    2008-01-01

    Internet addiction is characterized by excessive or poorly controlled preoccupations, urges or behaviours regarding computer use and internet access that lead to impairment or distress. The condition has attracted increasing attention in the popular media and among researchers, and this attention has paralleled the growth in computer (and Internet) access. Prevalence estimates vary widely, although a recent random telephone survey of the general US population reported an estimate of 0.3-0.7%. The disorder occurs worldwide, but mainly in countries where computer access and technology are widespread. Clinical samples and a majority of relevant surveys report a male preponderance. Onset is reported to occur in the late 20s or early 30s age group, and there is often a lag of a decade or more from initial to problematic computer usage. Internet addiction has been associated with dimensionally measured depression and indicators of social isolation. Psychiatric co-morbidity is common, particularly mood, anxiety, impulse control and substance use disorders. Aetiology is unknown, but probably involves psychological, neurobiological and cultural factors. There are no evidence-based treatments for internet addiction. Cognitive behavioural approaches may be helpful. There is no proven role for psychotropic medication. Marital and family therapy may help in selected cases, and online self-help books and tapes are available. Lastly, a self-imposed ban on computer use and Internet access may be necessary in some cases.

  20. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

    PubMed

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-05-17

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional "encrypt-then-sign" or "sign-then-encrypt" strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation.

  1. Internet-based modular program BADI for adjustment disorder: protocol of a randomized controlled trial.

    PubMed

    Skruibis, Paulius; Eimontas, Jonas; Dovydaitiene, Migle; Mazulyte, Egle; Zelviene, Paulina; Kazlauskas, Evaldas

    2016-07-26

    Adjustment disorder is one of the most common mental health diagnoses. Still it receives relatively little attention from researchers trying to establish best interventions to treat it. With high prevalence of stressful life events, which might be leading to adjustment disorder, and limited resources of mental health service providers, online interventions could be a very practical way of helping people who have these disorders or are in the risk to develop them. The proposed study protocol is aimed to describe a randomized controlled trial of an internet-based modular intervention for adjustment disorder as it is defined in a proposal for the ICD-11. This study is a two-armed Randomized Controlled Trial (RCT) to examine the effectiveness of a web-based intervention BADI (Brief Adjustment Disorder Intervention) for adjustment disorder symptoms. BADI has four modules: Relaxation, Time management, Mindfulness and Strengthening relationships. It is based on stress and coping research and integrates evidence-based treatment approaches such as Cognitive Behavioural therapy (CBT), mindfulness and body-mind practices, as well as exercises for enhancing social support. Primary outcome of the study are symptoms of adjustment disorder and well-being. Engagement into the program and motivation for change is a secondary outcome. All participants after completing the baseline assessment are randomly assigned to one of the two groups: either to the one in which participant will instantly gain access to the BADI intervention or a group in which participants will be given access to the BADI program after waiting one month. Participants of BADI can choose exercises of the program flexibly. There is no particular order in which the exercises should be completed. Study will provide new insights of modular internet-based interventions efficacy for adjustment disorders. The study will also provide information about the role of motivation and expectancies on engagement in modular internet-based interventions. In case this RCT supports effectiveness of fully automated version of BADI, it could be used very broadly. It could become a cost-effective and accessible intervention for adjustment disorder. The study was retrospectively registered with the Australian and New Zealand Clinical Trials Registry with the registration number ACTRN12616000883415 . Registered 5 July, 2016.

  2. A community based approach to linking injection drug users with needed services through pharmacies: An evaluation of a pilot intervention in New York City

    PubMed Central

    Rudolph, AE; Standish, K; Amesty, S; Crawford, ND; Stern, RJ; Badillo, WE; Boyer, A; Brown, D; Ranger, N; Orduna, JM Garcia; Lasenburg, L; Lippek, Sarah; Fuller, CM

    2010-01-01

    Studies suggest that community-based approaches could help pharmacies expand their public health role, particularly pertaining to HIV prevention. Thirteen pharmacies participating in New York’s Expanded Syringe Access Program, which permits non-prescription syringe sales to reduce syringe-sharing among injection drug users (IDUs), were enrolled in an intervention to link IDU syringe customers to medical/social services. Sociodemographics, injection practices, beliefs about and experiences with pharmacy use, and medical/social service utilization were compared among 29 IDUs purchasing syringes from intervention pharmacies and 66 IDUs purchasing syringes from control pharmacies using chi-square tests. Intervention IDUs reported more positive experiences in pharmacies than controls; both groups were receptive to a greater public health pharmacist role. These data provide evidence that CBPR aided in the implementation of a pilot structural intervention to promote understanding of drug use and HIV prevention among pharmacy staff, and facilitated expansion of pharmacy services beyond syringe sales in marginalized, drug-using communities. PMID:20528131

  3. Implementation and Operational Analysis of an Interactive Intensive Care Unit within a Smart Health Context.

    PubMed

    Lopez-Iturri, Peio; Aguirre, Erik; Trigo, Jesús Daniel; Astrain, José Javier; Azpilicueta, Leyre; Serrano, Luis; Villadangos, Jesús; Falcone, Francisco

    2018-01-29

    In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework.

  4. Multiple memory stores and operant conditioning: a rationale for memory's complexity.

    PubMed

    Meeter, Martijn; Veldkamp, Rob; Jin, Yaochu

    2009-02-01

    Why does the brain contain more than one memory system? Genetic algorithms can play a role in elucidating this question. Here, model animals were constructed containing a dorsal striatal layer that controlled actions, and a ventral striatal layer that controlled a dopaminergic learning signal. Both layers could gain access to three modeled memory stores, but such access was penalized as energy expenditure. Model animals were then selected on their fitness in simulated operant conditioning tasks. Results suggest that having access to multiple memory stores and their representations is important in learning to regulate dopamine release, as well as in contextual discrimination. For simple operant conditioning, as well as stimulus discrimination, hippocampal compound representations turned out to suffice, a counterintuitive result given findings that hippocampal lesions tend not to affect performance in such tasks. We argue that there is in fact evidence to support a role for compound representations and the hippocampus in even the simplest conditioning tasks.

  5. Internet Mindfulness Meditation Intervention for the General Public: Pilot Randomized Controlled Trial

    PubMed Central

    2016-01-01

    Background Mindfulness meditation interventions improve a variety of health conditions and quality of life, are inexpensive, easy to implement, have minimal if any side effects, and engage patients to take an active role in their treatment. However, the group format can be an obstacle for many to take structured meditation programs. Internet Mindfulness Meditation Intervention (IMMI) is a program that could make mindfulness meditation accessible to all people who want and need to receive it. However, the feasibility, acceptability, and ability of IMMI to increase meditation practice have yet to be evaluated. Objectives The primary objectives of this pilot randomized controlled study were to (1) evaluate the feasibility and acceptability of IMMIs in the general population and (2) to evaluate IMMI’s ability to change meditation practice behavior. The secondary objective was to collect preliminary data on health outcomes. Methods Potential participants were recruited from online and offline sources. In a randomized controlled trial, participants were allocated to IMMI or Access to Guided Meditation arm. IMMI included a 1-hour Web-based training session weekly for 6 weeks along with daily home practice guided meditations between sessions. The Access to Guided Meditation arm included a handout on mindfulness meditation and access to the same guided meditation practices that the IMMI participants received, but not the 1-hour Web-based training sessions. The study activities occurred through the participants’ own computer and Internet connection and with research-assistant telephone and email contact. Feasibility and acceptability were measured with enrollment and completion rates and participant satisfaction. The ability of IMMI to modify behavior and increase meditation practice was measured by objective adherence of daily meditation practice via Web-based forms. Self-report questionnaires of quality of life, self-efficacy, depression symptoms, sleep disturbance, perceived stress, and mindfulness were completed before and after the intervention period via Web-based surveys. Results We enrolled 44 adults were enrolled and 31 adults completed all study activities. There were no group differences on demographics or important variables at baseline. Participants rated the IMMI arm higher than the Access to Guided Meditation arm on Client Satisfaction Questionnaire. IMMI was able to increase home practice behavior significantly compared to the Access to Guided Meditation arm: days practiced (P=.05), total minutes (P=.01), and average minutes (P=.05). As expected, there were no significant differences on health outcomes. Conclusions In conclusion, IMMI was found to be feasible and acceptable. The IMMI arm had increased daily meditation practice compared with the Access to Guided Meditation control group. More interaction through staff and/or through built-in email or text reminders may increase daily practice even more. Future studies will examine IMMI’s efficacy at improving health outcomes in the general population and also compare it directly to the well-studied mindfulness-based group interventions to evaluate relative efficacy. Trial Registration Clinicaltrials.gov NCT02655835; http://clinicaltrials.gov/ct2/show/NCT02655835 (Archived by WebCite at http://www.webcitation/ 6jUDuQsG2) PMID:27502759

  6. Lexical access changes in patients with multiple sclerosis: a two-year follow-up study.

    PubMed

    Sepulcre, Jorge; Peraita, Herminia; Goni, Joaquin; Arrondo, Gonzalo; Martincorena, Inigo; Duque, Beatriz; Velez de Mendizabal, Nieves; Masdeu, Joseph C; Villoslada, Pablo

    2011-02-01

    The aim of the study was to analyze lexical access strategies in patients with multiple sclerosis (MS) and their changes over time. We studied lexical access strategies during semantic and phonemic verbal fluency tests and also confrontation naming in a 2-year prospective cohort of 45 MS patients and 20 healthy controls. At baseline, switching lexical access strategy (both in semantic and in phonemic verbal fluency tests) and confrontation naming were significantly impaired in MS patients compared with controls. After 2 years follow-up, switching score decreased, and cluster size increased over time in semantic verbal fluency tasks, suggesting a failure in the retrieval of lexical information rather than an impairment of the lexical pool. In conclusion, these findings underline the significant presence of lexical access problems in patients with MS and could point out their key role in the alterations of high-level communications abilities in MS.

  7. Design of an Efficient CAC for a Broadband DVB-S/DVB-RCS Satellite Access Network

    NASA Astrophysics Data System (ADS)

    Inzerilli, Tiziano; Montozzi, Simone

    2003-07-01

    This paper deals with efficient utilization of network resources in an advanced broadband satellite access system. It proposes a technique for admission control of IP streams with guaranteed QoS which does not interfere with the particular BoD (Bandwidth on Demand) algorithm that handles access to uplink bandwidth, an essential part of a DVB- RCS architecture. This feature of the admission control greatly simplify its integration in the satellite network. The purpose of this admission control algorithm in particular is to suitably and dynamically configure the overall traffic control parameters, in the access terminal of the user and service segment, with a simple approach which does not introduces limitations and/or constraints to the BoD algorithm. Performance of the proposed algorithm is evaluated thorugh Opnet simulations using an ad-hoc platform modeling DVB-based satellite access.The results presented in this paper were obtained within SATIP6 project, which is sponsored within the 5th EU Research Programme, IST. The aims of the project are to evaluate and demonstrate key issues of the integration of satellite-based access networks into the Internet in order to support multimedia services over wide areas. The satellite link layer is based on DVB-S on the forward link and DVB-RCS on the return link. Adaptation and optimization of the DVB-RCS access standard in order to support QoS provision are central issues of the project. They are handled through an integration of Connection Admission Control (CAC), Traffic Shaping and Policing techniques.

  8. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  9. MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.

    PubMed

    Fan, Kai; Wang, Shangyang; Ren, Yanhui; Li, Hui; Yang, Yintang

    2018-06-21

    With the development of electronic information technology, electronic medical records (EMRs) have been a common way to store the patients' data in hospitals. They are stored in different hospitals' databases, even for the same patient. Therefore, it is difficult to construct a summarized EMR for one patient from multiple hospital databases due to the security and privacy concerns. Meanwhile, current EMRs systems lack a standard data management and sharing policy, making it difficult for pharmaceutical scientists to develop precise medicines based on data obtained under different policies. To solve the above problems, we proposed a blockchain-based information management system, MedBlock, to handle patients' information. In this scheme, the distributed ledger of MedBlock allows the efficient EMRs access and EMRs retrieval. The improved consensus mechanism achieves consensus of EMRs without large energy consumption and network congestion. In addition, MedBlock also exhibits high information security combining the customized access control protocols and symmetric cryptography. MedBlock can play an important role in the sensitive medical information sharing.

  10. Perspectives on Networking.

    ERIC Educational Resources Information Center

    Levy, Sue

    1992-01-01

    Presents a library automation vendor's perspective on networking based on activities at Ameritech Information Systems. Topics discussed include the information explosion; information technology; user expectations and needs; remote access; the library of the future; systems integration; ownership versus access; copyright laws; and the role of the…

  11. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    PubMed

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  12. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    PubMed Central

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-01-01

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel. PMID:27754316

  13. Data storage technology comparisons

    NASA Technical Reports Server (NTRS)

    Katti, Romney R.

    1990-01-01

    The role of data storage and data storage technology is an integral, though conceptually often underestimated, portion of data processing technology. Data storage is important in the mass storage mode in which generated data is buffered for later use. But data storage technology is also important in the data flow mode when data are manipulated and hence required to flow between databases, datasets and processors. This latter mode is commonly associated with memory hierarchies which support computation. VLSI devices can reasonably be defined as electronic circuit devices such as channel and control electronics as well as highly integrated, solid-state devices that are fabricated using thin film deposition technology. VLSI devices in both capacities play an important role in data storage technology. In addition to random access memories (RAM), read-only memories (ROM), and other silicon-based variations such as PROM's, EPROM's, and EEPROM's, integrated devices find their way into a variety of memory technologies which offer significant performance advantages. These memory technologies include magnetic tape, magnetic disk, magneto-optic disk, and vertical Bloch line memory. In this paper, some comparison between selected technologies will be made to demonstrate why more than one memory technology exists today, based for example on access time and storage density at the active bit and system levels.

  14. Promoting Crew Autonomy: Current Advances and Novel Techniques

    NASA Technical Reports Server (NTRS)

    Harris, Samantha

    2017-01-01

    Since the dawn of the era of human space flight, mission control centers around the world have played an integral role in guiding space travelers toward mission success. In the International Space Station (ISS) program, astronauts and cosmonauts have the benefit of near constant access to the expertise and resources within mission control, as well as lifeboat capability to quickly return to Earth if something were to go wrong. As we move into an era of longer duration missions to more remote locations, rapid and ready access to mission control on earth will no longer be feasible. To prepare for such missions, long duration crews must be prepared to operate more autonomously, and the mission control paradigm that has been successfully employed for decades must be re-examined. The team at NASA's Payload Operations and Integration Center (POIC) in Huntsville, Alabama is playing an integral role in the development of concepts for a more autonomous long duration crew of the future via research on the ISS.

  15. Why does asking questions change health behaviours? The mediating role of attitude accessibility

    PubMed Central

    Wood, Chantelle; Conner, Mark; Sandberg, Tracy; Godin, Gaston; Sheeran, Paschal

    2013-01-01

    Objective The question-behaviour effect (QBE) refers to the finding that measuring behavioural intentions increases performance of the relevant behaviour. This effect has been used to change health behaviours. The present research asks why the QBE occurs and evaluates one possible mediator – attitude accessibility. Design University staff and students (N = 151) were randomly assigned to an intention measurement condition where they reported their intentions to eat healthy foods, or to one of two control conditions. Main outcome measures Participants completed a response latency measure of attitude accessibility, before healthy eating behaviour was assessed unobtrusively using an objective measure of snacking. Results Intention measurement participants exhibited more accessible attitudes towards healthy foods, and were more likely to choose a healthy snack, relative to control participants. Furthermore, attitude accessibility mediated the relationship between intention measurement and behaviour. Conclusion This research demonstrates that increased attitude accessibility may explain the QBE, extending the findings of previous research to the domain of health behaviour. PMID:24245778

  16. A security architecture for interconnecting health information systems.

    PubMed

    Gritzalis, Dimitris; Lambrinoudakis, Costas

    2004-03-31

    Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.

  17. From managing access to managing care: the impact of primary care on health care delivery organizations.

    PubMed

    Hickey, M E

    1995-10-01

    Professional "revenge of the nerds" is currently taking place, as managed care evolves generalist physicians into new professional prominence. Primary care physicians are finding themselves at the center of health care market reform as health plans, insurers, and other financing organizations turn to them as the key to cost control. In short supply, they are prospering financially from the demand. As the source of patients, they are gaining in prestige from specialists and hospitals who once demeaned them. But these newfound roles are only the initial steps in the transformation of the primary care practitioner. The change that the generalists are experiencing is essentially managing access to care, not truly managing care itself. There are large and crucial differences between managing access to care and actually managing care. These differences are, in many ways, a higher calling for primary care practitioners as they refocus attention on patient outcomes, which will in itself result in a lower resource utilization above and beyond the crude controlling of access. What those differences are, what new roles they require, and what impact they will have on organizations that either house or contract with primary care physicians will be the focus of this article.

  18. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

    PubMed Central

    Xu, Qian; Tan, Chengxiang; Fan, Zhijie; Zhu, Wenye; Xiao, Ya; Cheng, Fujia

    2018-01-01

    Nowadays, fog computing provides computation, storage, and application services to end users in the Internet of Things. One of the major concerns in fog computing systems is how fine-grained access control can be imposed. As a logical combination of attribute-based encryption and attribute-based signature, Attribute-based Signcryption (ABSC) can provide confidentiality and anonymous authentication for sensitive data and is more efficient than traditional “encrypt-then-sign” or “sign-then-encrypt” strategy. Thus, ABSC is suitable for fine-grained access control in a semi-trusted cloud environment and is gaining more and more attention recently. However, in many existing ABSC systems, the computation cost required for the end users in signcryption and designcryption is linear with the complexity of signing and encryption access policy. Moreover, only a single authority that is responsible for attribute management and key generation exists in the previous proposed ABSC schemes, whereas in reality, mostly, different authorities monitor different attributes of the user. In this paper, we propose OMDAC-ABSC, a novel data access control scheme based on Ciphertext-Policy ABSC, to provide data confidentiality, fine-grained control, and anonymous authentication in a multi-authority fog computing system. The signcryption and designcryption overhead for the user is significantly reduced by outsourcing the undesirable computation operations to fog nodes. The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability. The security analysis, asymptotic complexity comparison, and implementation results indicate that our construction can balance the security goals with practical efficiency in computation. PMID:29772840

  19. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  20. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  1. Uncovering Beliefs about the Role of Faith in Curriculum Decisions: A Vignette Approach

    ERIC Educational Resources Information Center

    Stevens, Carla R.

    2014-01-01

    Accessing and assessing the controlling beliefs of teachers about the role of faith in curriculum decisions is an essential first step in efforts to address the gap between the faith integration mission of Christian schools and actual practices (Boerema, 2011). Without intervention, teachers' beliefs about teaching--shaped by early classroom…

  2. Impact of Health on Education Access and Achievement. Policy Brief Number 3

    ERIC Educational Resources Information Center

    Pridmore, P.

    2008-01-01

    Access to education is recognized as a basic human right and yet projections based on current trends show that more than 50 countries will not achieve universal primary education by 2015. This briefing paper looks at the role of malnutrition and diseases in the failure of countries to meet EFA targets. It is based on the CREATE Pathways to Access…

  3. Network support for turn-taking in multimedia collaboration

    NASA Astrophysics Data System (ADS)

    Dommel, Hans-Peter; Garcia-Luna-Aceves, Jose J.

    1997-01-01

    The effectiveness of collaborative multimedia systems depends on the regulation of access to their shared resources, such as continuous media or instruments used concurrently by multiple parties. Existing applications use only simple protocols to mediate such resource contention. Their cooperative rules follow a strict agenda and are largely application-specific. The inherent problem of floor control lacks a systematic methodology. This paper presents a general model on floor control for correct, scalable, fine-grained and fair resource sharing that integrates user interaction with network conditions, and adaptation to various media types. The motion of turn-taking known from psycholinguistics in studies on discourse structure is adapted for this framework. Viewed as a computational analogy to speech communication, online collaboration revolves around dynamically allocated access permissions called floors. The control semantics of floors derives from concurrently control methodology. An explicit specification and verification of a novel distributed Floor Control Protocol are presented. Hosts assume sharing roles that allow for efficient dissemination of control information, agreeing on a floor holder which is granted mutually exclusive access to a resource. Performance analytic aspects of floor control protocols are also briefly discussed.

  4. Dynamic control of chirality in phosphine ligands for enantioselective catalysis

    PubMed Central

    Zhao, Depeng; Neubauer, Thomas M.; Feringa, Ben L.

    2015-01-01

    Chirality plays a fundamental role in biology and chemistry and the precise control of chirality in a catalytic conversion is a key to modern synthesis most prominently seen in the production of pharmaceuticals. In enantioselective metal-based catalysis, access to each product enantiomer is commonly achieved through ligand design with chiral bisphosphines being widely applied as privileged ligands. Switchable phosphine ligands, in which chirality is modulated through an external trigger signal, might offer attractive possibilities to change enantioselectivity in a catalytic process in a non-invasive manner avoiding renewed ligand synthesis. Here we demonstrate that a photoswitchable chiral bisphosphine based on a unidirectional light-driven molecular motor, can be used to invert the stereoselectivity of a palladium-catalysed asymmetric transformation. It is shown that light-induced changes in geometry and helicity of the switchable ligand enable excellent selectivity towards the racemic or individual enantiomers of the product in a Pd-catalysed desymmetrization reaction. PMID:25806856

  5. A proxy of DICOM services

    NASA Astrophysics Data System (ADS)

    Ribeiro, Luís S.; Costa, Carlos; Oliveira, José Luís

    2010-03-01

    Diagnostic tools supported by digital medical images have increasingly become an essential aid to medical decisions. However, despite its growing importance, Picture Archiving and Communication Systems (PACS) are typically oriented to support a single healthcare institution, and the sharing of medical data across institutions is still a difficult process. This paper describes a proposal to publish and control Digital Imaging Communications in Medicine (DICOM) services in a wide domain composed of several healthcare institutions. The system creates virtual bridges between intranets enabling the exchange, search and store of the medical data within the wide domain. The service provider publishes the DICOM services following a token-based strategy. The token advertisements are public and known by all system users. However, access to the DICOM service is controlled through a role association between an access key and the service. Furthermore, in medical diagnoses, time is a crucial factor. Therefore, our system is a turnkey solution, capable of exchanging medical data across firewalls and Network Address Translation (NAT), avoiding bureaucratic issues with local network security. Security is also an important concern - in any transmission across different domains, data is encrypted by Transport Layer Security (TLS).

  6. The role of NASA's Water Resources applications area in improving access to water quality-related information and water resources management

    NASA Astrophysics Data System (ADS)

    Lee, C. M.

    2016-02-01

    The NASA Applied Sciences Program plays a unique role in facilitating access to remote sensing-based water information derived from US federal assets towards the goal of improving science and evidence-based decision-making in water resources management. The Water Resources Application Area within NASA Applied Sciences works specifically to develop and improve water data products to support improved management of water resources, with partners who are faced with real-world constraints and conditions including cost and regulatory standards. This poster will highlight the efforts and collaborations enabled by this program that have resulted in integration of remote sensing-based information for water quality modeling and monitoring within an operational context.

  7. The role of NASA's Water Resources applications area in improving access to water quality-related information and water resources management

    NASA Astrophysics Data System (ADS)

    Lee, C. M.

    2016-12-01

    The NASA Applied Sciences Program plays a unique role in facilitating access to remote sensing-based water information derived from US federal assets towards the goal of improving science and evidence-based decision-making in water resources management. The Water Resources Application Area within NASA Applied Sciences works specifically to develop and improve water data products to support improved management of water resources, with partners who are faced with real-world constraints and conditions including cost and regulatory standards. This poster will highlight the efforts and collaborations enabled by this program that have resulted in integration of remote sensing-based information for water quality modeling and monitoring within an operational context.

  8. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  9. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  10. Implementation and Operational Analysis of an Interactive Intensive Care Unit within a Smart Health Context

    PubMed Central

    Aguirre, Erik

    2018-01-01

    In the context of hospital management and operation, Intensive Care Units (ICU) are one of the most challenging in terms of time responsiveness and criticality, in which adequate resource management and signal processing play a key role in overall system performance. In this work, a context aware Intensive Care Unit is implemented and analyzed to provide scalable signal acquisition capabilities, as well as to provide tracking and access control. Wireless channel analysis is performed by means of hybrid optimized 3D Ray Launching deterministic simulation to assess potential interference impact as well as to provide required coverage/capacity thresholds for employed transceivers. Wireless system operation within the ICU scenario, considering conventional transceiver operation, is feasible in terms of quality of service for the complete scenario. Extensive measurements of overall interference levels have also been carried out, enabling subsequent adequate coverage/capacity estimations, for a set of Zigbee based nodes. Real system operation has been tested, with ad-hoc designed Zigbee wireless motes, employing lightweight communication protocols to minimize energy and bandwidth usage. An ICU information gathering application and software architecture for Visitor Access Control has been implemented, providing monitoring of the Boxes external doors and the identification of visitors via a RFID system. The results enable a solution to provide ICU access control and tracking capabilities previously not exploited, providing a step forward in the implementation of a Smart Health framework. PMID:29382148

  11. Protection of electronic health records (EHRs) in cloud.

    PubMed

    Alabdulatif, Abdulatif; Khalil, Ibrahim; Mai, Vu

    2013-01-01

    EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.

  12. Challenges in the management of breast cancer in low- and middle-income countries.

    PubMed

    Yip, Cheng-Har; Taib, Nur Aishah

    2012-12-01

    The incidence of breast cancer is rising in low- and middle-income countries (LMICs) due to 'westernization' of risk factors for developing breast cancer. However, survival remains low because of barriers in early detection and optimal access to treatment, which are the two main determinants of breast cancer outcome. A multidisciplinary approach to treatment gives the best results. An accurate diagnosis is dependent on a reliable pathology service, which will provide an adequate pathology report with prognostic and predictor information to allow optimal oncological treatment. Stratification of clinical practice guidelines based on resource level will ensure that women will have access to treatment even in a low-resource setting. Advocacy and civil society play a role in galvanizing the political will required to meet the challenge of providing opportunities for breast cancer control in LMICs. Collaboration between high-income countries and LMICs could be a strategy in facing these challenges.

  13. Who's afraid of national laws? Pesticide corporations use trade negotiations to avoid bans and undercut public health protections in Central America.

    PubMed

    Rosenthal, Erika

    2005-01-01

    The agrochemical industry is using trade agreements to block proposed bans on pesticides identified as the worst occupational health hazards by a multi-country illness surveillance program in Central America. Through privileged access to closed-door negotiations, industry inserted deregulatory mechanisms, including a regional pesticide registry that invalidates national laws, investors' rights protection, and increased intellectual property protections, into the draft Central American Customs Union and the Central American Free Trade Agreement. These agreements undermine health-based national pesticide registration requirements; weaken health ministries' role in pesticide control; block marketing of cheaper, less toxic pesticides; and have a chilling effect on future pesticide regulatory activity. So long as corporations have privileged access to the trade negotiations and civil society is excluded, the resulting agreements will benefit special interests at the expense of public health.

  14. Neighborhood social capital and adult health: an empirical test of a Bourdieu-based model.

    PubMed

    Carpiano, Richard M

    2007-09-01

    Drawing upon Bourdieu's [1986. The forms of capital. In: Richardson, J.G. (Ed.), Handbook of Theory and Research for the Sociology of Education. Greenwood, New York, pp. 241-258.] social capital theory, I test a conceptual model of neighborhood conditions and social capital - considering relationships between neighborhood social capital forms (social support, social leverage, informal social control, and neighborhood organization participation) and adult health behaviors (smoking, binge drinking) and perceived health, as well as interactions between neighborhood social capital and individuals' access to that social capital. Analyzing Los Angeles Family and Neighborhood Survey data linked with tract level census data, results suggest that specific social capital forms were directly associated with both positive and negative health outcomes. Additionally, residents' neighborhood attachment moderated relationships between various social capital forms and health. Future studies should consider social capital resources and the role of differential access to such resources for promoting or compromising health.

  15. Refreshing memory traces: thinking of an item improves retrieval from visual working memory.

    PubMed

    Souza, Alessandra S; Rerko, Laura; Oberauer, Klaus

    2015-03-01

    This article provides evidence that refreshing, a hypothetical attention-based process operating in working memory (WM), improves the accessibility of visual representations for recall. "Thinking of", one of several concurrently active representations, is assumed to refresh its trace in WM, protecting the representation from being forgotten. The link between refreshing and WM performance, however, has only been tenuously supported by empirical evidence. Here, we controlled which and how often individual items were refreshed in a color reconstruction task by presenting cues prompting participants to think of specific WM items during the retention interval. We show that the frequency with which an item is refreshed improves recall of this item from visual WM. Our study establishes a role of refreshing in recall from visual WM and provides a new method for studying the impact of refreshing on the amount of information we can keep accessible for ongoing cognition. © 2014 New York Academy of Sciences.

  16. An Analysis of Website Accessibility in Higher Education in Indonesia Based on WCAG 2.0 Guidelines

    NASA Astrophysics Data System (ADS)

    Arasid, W.; Abdullah, A. G.; Wahyudin, D.; Abdullah, C. U.; Widiaty, I.; Zakaria, D.; Amelia, N.; Juhana, A.

    2018-02-01

    Website accessibility is a simple way to access a website by everyone so that information on the website can be easily understood. This study aims to improve the accessibility of universities’ website to analyze website accessibility problems based on WCAG 2.0 guidelines. This study analyzed 13 universities’ websites in West Java, Indonesia by using TAW as an evaluation tool. The evaluation results were presented in a graph showing the error rate of each university’s website. The same errors that occurred in almost all websites were: non-text content, info and relationships, page title, link purpose, language of page, on input, labels and instructions, parsing, and name, role, value criteria. This study was expected to provide information to the university and to perform as guidelines for website accessibility improvements.

  17. An existentialist view on mortality salience effects: personal hardiness, death-thought accessibility, and cultural worldview defence.

    PubMed

    Florian, V; Mikulincer, M; Hirschberger, G

    2001-09-01

    Two studies examined the possible moderating role of hardiness on reactions to mortality salience inductions. A sample of 240 Israeli undergraduate students completed a hardiness scale, were exposed to a mortality salience or control induction, and then either rated the severity and punishment of 10 social transgressions (Study 1, N = 120) or performed a word-stem completion task, which tapped the accessibility of death-related thoughts (Study 2, N = 120). Results indicated that a mortality salience induction led to more severe judgments of social transgressions as well as to more severe punishments than a control induction only among participants scoring low in the hardiness scale. However, a mortality salience induction led to a higher cognitive accessibility of death-related thoughts than a control condition regardless of participants' hardiness scores. The discussion emphasizes the importance of considering inner resources when examining reactions to mortality reminders.

  18. Qualitative analysis of a nurse's responses to stroke caregivers on a web-based supportive intervention.

    PubMed

    Pierce, Linda L; Steiner, Victoria; de Dios, Ann Margaret Vergel; Vollmer, Megan; Govoni, Amy L; Thompson, Teresa L Cervantez

    2015-04-01

    Approximately 800 000 people experience a stroke every year; most are cared for by unpaid family members in home settings. Web-based interventions provide 24/7 access to education/support services and have been explored in the literature with family caregivers dealing with chronic conditions. Current research into nurses' web-based interactions with caregivers in these interventions is lacking. The aim of this qualitative secondary data analysis was to examine a nurse specialist's responses and advice that she gave in a web-based supportive intervention for stroke family caregivers used in a randomized controlled trial for 1 year. Using a qualitative research design, caregivers were recruited from rehabilitation facilities in Ohio and Michigan (n = 36). They accessed the intervention's email forum and discussion group facilitated by the nurse. These email message data were examined using rigorous content analysis. The caregivers were primarily white women caring for a spouse, with an average age of 54 years. From the 2148 email messages between the nurse and caregivers, five themes emerged and were drawn to Friedemann's Framework. These themes included: getting to know the situation (Friedemann's coherence and individuation), validating emotions (individuation), promoting self-care (individuation), assisting in role adaptation (system maintenance and individuation), and providing healthcare information (system maintenance and individuation). These caregivers of stroke survivors were asking for advice, seeking support, and looking for information from an advanced practice nurse. Nurses, and others, in supportive roles can use these findings to promote informed care and directed interventions for caregivers dealing with stroke and its outcomes.

  19. Router Agent Technology for Policy-Based Network Management

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  20. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  1. The CDC Hemophilia B mutation project mutation list: a new online resource.

    PubMed

    Li, Tengguo; Miller, Connie H; Payne, Amanda B; Craig Hooper, W

    2013-11-01

    Hemophilia B (HB) is caused by mutations in the human gene F9. The mutation type plays a pivotal role in genetic counseling and prediction of inhibitor development. To help the HB community understand the molecular etiology of HB, we have developed a listing of all F9 mutations that are reported to cause HB based on the literature and existing databases. The Centers for Disease Control and Prevention (CDC) Hemophilia B Mutation Project (CHBMP) mutation list is compiled in an easily accessible format of Microsoft Excel and contains 1083 unique mutations that are reported to cause HB. Each mutation is identified using Human Genome Variation Society (HGVS) nomenclature standards. The mutation types and the predicted changes in amino acids, if applicable, are also provided. Related information including the location of mutation, severity of HB, the presence of inhibitor, and original publication reference are listed as well. Therefore, our mutation list provides an easily accessible resource for genetic counselors and HB researchers to predict inhibitors. The CHBMP mutation list is freely accessible at http://www.cdc.gov/hemophiliamutations.

  2. Spanish-language community-based mental health treatment programs, policy-required language-assistance programming, and mental health treatment access among Spanish-speaking clients.

    PubMed

    Snowden, Lonnie R; McClellan, Sean R

    2013-09-01

    We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California's Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997-2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services.

  3. Spanish-Language Community-Based Mental Health Treatment Programs, Policy-Required Language-Assistance Programming, and Mental Health Treatment Access Among Spanish-Speaking Clients

    PubMed Central

    McClellan, Sean R.

    2013-01-01

    Objectives. We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California’s Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Methods. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997–2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. Results. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P < .05). However, the increase was insufficient to significantly reduce language-related disparities. Conclusions. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services. PMID:23865663

  4. Social Role Discovery in Human Events (Open Access)

    DTIC Science & Technology

    2013-10-03

    to all people in the videos. We also present a novel YouTube social roles dataset with ground truth role annota- tions, and introduce annotations on a... nursing home [13], making role identifi- cation a difficult human task. Ideally, we would like to auto- matically discover such interaction-based role...34# $% &’$( ! Figure 2. Sample frames from different events in the YouTube Social

  5. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  6. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... determining that such customer, based on its position in the transaction and relationship with an ultimate... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Risk management controls for... Markets § 240.15c3-5 Risk management controls for brokers or dealers with market access. (a) For the...

  7. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  8. Development and evaluation of two web-based interventions for the promotion of physical activity in older adults: study protocol for a community-based controlled intervention trial.

    PubMed

    Muellmann, Saskia; Bragina, Inna; Voelcker-Rehage, Claudia; Rost, Eric; Lippke, Sonia; Meyer, Jochen; Schnauber, Jochen; Wasmann, Merlin; Toborg, Merle; Koppelin, Frauke; Brand, Tilman; Zeeb, Hajo; Pischke, Claudia R

    2017-05-25

    Regular physical activity (PA) is a key contributor to healthy ageing. However, despite known health benefits, only one third of older adults in Germany reach the PA levels recommended for persons aged 65 years and above by the World Health Organization. The aim of the current study is to evaluate the effectiveness of two web-based interventions for the initiation and maintenance of regular PA (i.e., intervention groups 1 and 2) compared to a delayed intervention control group of older adults aged 65 to 75 years. Study participants will be randomly assigned to one of three study arms in five communities in the Bremen-Oldenburg metropolitan region: a) Participants in the first arm will receive access to a web-based intervention for 10 weeks allowing them to track their weekly PA (subjective self-monitoring, intervention group 1); b) participants in the second arm will receive access to the web-based intervention for 10 weeks and, in addition, track PA using Fitbit Zips (objective self-monitoring, intervention group 2); c) participants in the delayed intervention control group will receive access to the intervention implemented in the first study arm after completion of the 12-week follow-up in the other two groups within each community. In addition, weekly group meetings in the communities will be offered to study participants in the intervention groups providing the opportunity to address questions related to the use of the website and to practice PA in groups (e.g., neighborhood walks, strength and balance exercises). To evaluate short-term effects of the intervention on physical and psychological health, PA, physical fitness, and cognitive and psychological variables will be assessed at baseline and 12-week follow-up. This study will provide answers regarding acceptance and effectiveness of web-based interventions promoting uptake and maintenance of regular PA in persons aged 65-75 years. Study findings will contribute to a growing body of evidence in Germany concerning the role of community-based interventions for the promotion of PA and healthy ageing in older adults. German Clinical Trials Register DRKS00010052 (Date of registration 07-11-2016).

  9. A study protocol: a community pharmacy-based intervention for improving the management of sleep disorders in the community settings

    PubMed Central

    2014-01-01

    Background Sleep disorders are very common in the community and are estimated to affect up to 45% of the world’s population. Pharmacists are in a position to give advice and provide appropriate services to individuals who are unable to easily access medical care. The purpose of this study is to develop an intervention to improve the management of sleep disorders in the community. The aims are– (1) to evaluate the effectiveness of a community pharmacy-based intervention in managing sleep disorders, (2) to evaluate the role of actigraph as an objective measure in monitoring certain sleep disorders and (3) to evaluate the extended role of community pharmacists in managing sleep disorders. This intervention is developed to monitor individuals undergoing treatment and overcome the difficulties in validating self-reported feedback. Method/design This is a community-based intervention, prospective, controlled trial, with one intervention group and one control group, comparing individuals receiving a structured intervention with those receiving usual care for sleep-related disorders at community pharmacies. Discussion This study will demonstrate the utilisation and efficacy of community pharmacy-based intervention to manage sleep disorders in the community, and will assess the possibility of implementing this intervention into the community pharmacy workflow. Trial registration Australian New Zealand Clinical Trial Registry: ACTRN12612000825853 PMID:24533916

  10. Specialty Care Access in the Safety Net-the Role of Public Hospitals and Health Systems.

    PubMed

    Makaroun, Lena K; Bowman, Chelsea; Duan, Kevin; Handley, Nathan; Wheeler, Daniel J; Pierluissi, Edgar; Chen, Alice Hm

    2017-01-01

    Access to specialty care in the United States safety net, already strained, is fac-ing increasing pressure with an influx of patients following the passage of the Affordable Care Act (ACA). We surveyed 18 public hospitals and health systems across the country to describe the current state of specialty care delivery in safety-net systems. We elicited information regarding challenges, provider models, metrics of access and productivity, and strategies for improving access. Based on our findings, we propose a framework for assessing and improving specialty care access with a focus on population health planning.

  11. A Non-technical User-Oriented Display Notation for XACML Conditions

    NASA Astrophysics Data System (ADS)

    Stepien, Bernard; Felty, Amy; Matwin, Stan

    Ideally, access control to resources in complex IT systems ought to be handled by business decision makers who own a given resource (e.g., the pay and benefits section of an organization should decide and manage the access rules to the payroll system). To make this happen, the security and database communities need to develop vendor-independent access management tools, useable by decision makers, rather than technical personnel detached from a given business function. We have developed and implemented such tool, based on XACML. The XACML is an important emerging tool for managing complex access control applications. As a formal notation, based on an XML schema representing the grammar of a given application, XACML is precise and non-ambiguous. But this very property puts it out of reach of non-technical users. We propose a new notation for displaying and editing XACML rules that is independent of XML, and we develop an editor for it. Our notation combines a tree representation of logical expressions with an accessible natural language layer. Our early experience indicates that such rules can be grasped by non-technical users wishing to develop and control rules for accessing their own resources.

  12. Access and completion of a Web-based treatment in a population-based sample of tornado-affected adolescents.

    PubMed

    Price, Matthew; Yuen, Erica K; Davidson, Tatiana M; Hubel, Grace; Ruggiero, Kenneth J

    2015-08-01

    Although Web-based treatments have significant potential to assess and treat difficult-to-reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a Web-based treatment for postdisaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a Web-based treatment. The modular treatment addressed symptoms of posttraumatic stress disorder, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of Web-based treatments to provide clinical services in a postdisaster context. (c) 2015 APA, all rights reserved).

  13. Access and Completion of a Web-Based Treatment in a Population-Based Sample of Tornado-Affected Adolescents

    PubMed Central

    Price, Matthew; Yuen, Erica; Davidson, Tatiana M.; Hubel, Grace; Ruggiero, Kenneth J.

    2015-01-01

    Although web-based treatments have significant potential to assess and treat difficult to reach populations, such as trauma-exposed adolescents, the extent that such treatments are accessed and used is unclear. The present study evaluated the proportion of adolescents who accessed and completed a web-based treatment for post-disaster mental health symptoms. Correlates of access and completion were examined. A sample of 2,000 adolescents living in tornado-affected communities was assessed via structured telephone interview and invited to a web-based treatment. The modular treatment addressed symptoms of PTSD, depression, and alcohol and tobacco use. Participants were randomized to experimental or control conditions after accessing the site. Overall access for the intervention was 35.8%. Module completion for those who accessed ranged from 52.8% to 85.6%. Adolescents with parents who used the Internet to obtain health-related information were more likely to access the treatment. Adolescent males were less likely to access the treatment. Future work is needed to identify strategies to further increase the reach of web-based treatments to provide clinical services in a post-disaster context. PMID:25622071

  14. Windows on the brain: the emerging role of atlases and databases in neuroscience

    NASA Technical Reports Server (NTRS)

    Van Essen, David C.; VanEssen, D. C. (Principal Investigator)

    2002-01-01

    Brain atlases and associated databases have great potential as gateways for navigating, accessing, and visualizing a wide range of neuroscientific data. Recent progress towards realizing this potential includes the establishment of probabilistic atlases, surface-based atlases and associated databases, combined with improvements in visualization capabilities and internet access.

  15. Promoting Access: The Role of Organization and Awareness Factors. Elementary Subjects Center Series No. 1.

    ERIC Educational Resources Information Center

    Prawat, Richard S.

    This review presents a framework that accommodates static and dynamic approaches to comprehension of students' transfer of knowledge and skill. The review focuses on three sets of variables considered fundamental to students' ability to access intellectual resources in potentially relevant situations: knowledge bases, strategies, and dispositions.…

  16. Information Age Avatars.

    ERIC Educational Resources Information Center

    Peters, Paul Evan

    1995-01-01

    Considers the role of librarians in the networked information age. Topics include contributions of librarians to information technology, including bibliographic utilities, online database searching services, and public access to electronic information; future challenges, including controlling costs; considering community objectives; and the…

  17. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  18. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  19. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  20. A Web-Based Intervention for Users of Amphetamine-Type Stimulants: 3-Month Outcomes of a Randomized Controlled Trial.

    PubMed

    Tait, Robert J; McKetin, Rebecca; Kay-Lambkin, Frances; Carron-Arthur, Bradley; Bennett, Anthony; Bennett, Kylie; Christensen, Helen; Griffiths, Kathleen M

    2014-01-01

    Among illicit drugs, the prevalence of amphetamine-type stimulant (ATS) use is second only to cannabis. Currently, there are no approved pharmacotherapies for ATS problems, but some face-to-face psychotherapies are effective. Web-based interventions have proven to be effective for some substance use problems, but none has specifically targeted ATS users. The objective of the study was to evaluate the effectiveness of a Web-based intervention for ATS problems on a free-to-access site compared with a waitlist control group. We used a randomized controlled trial design. The primary outcome measure was self-reported ATS use in the past three months assessed using the Alcohol, Smoking, Substance Involvement Screening Test (ASSIST). Other measures included quality of life (EUROHIS score), psychological distress (K-10 score), days out of role, poly-drug use, general help-seeking intentions, actual help-seeking, and "readiness to change". The intervention consisted of three fully automated, self-guided modules based on cognitive behavioral therapy and motivation enhancement. The analysis was an intention-to-treat analysis using generalized estimating equation models, with a group by time interaction as the critical assessment. We randomized 160 people (intervention n=81, control n=79). At three months, 35/81 (43%) intervention and 45/79 (57%) control participants provided follow-up data. In the intervention group, 51/81 (63%) completed at least one module. The only significant group by time interaction was for days out of role. The pre/post change effect sizes showed small changes (range d=0.14 to 0.40) favoring the intervention group for poly-drug use, distress, actual help-seeking, and days out of role. In contrast, the control group was favored by reductions in ATS use, improvements in quality of life, and increases in help-seeking intentions (range d=0.09 to 0.16). This Web-based intervention for ATS use produced few significant changes in outcome measures. There were moderate, but nonsignificant reductions in poly-drug use, distress, days partially out of role, and increases in help-seeking. However, high levels of participant attrition, plus low levels of engagement with the modules, preclude firm conclusions being drawn on the efficacy of the intervention and emphasize the problems of engaging this group of clients in a fully automated program. Australian and New Zealand Clinical Trials Registry: ACTRN 12611000947909; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?ACTRN=12611000947909 (Archived by WebCite at http://www.webcitation.org/6SHTxEnzP).

  1. Multiple Memory Stores and Operant Conditioning: A Rationale for Memory's Complexity

    ERIC Educational Resources Information Center

    Meeter, Martijn; Veldkamp, Rob; Jin, Yaochu

    2009-01-01

    Why does the brain contain more than one memory system? Genetic algorithms can play a role in elucidating this question. Here, model animals were constructed containing a dorsal striatal layer that controlled actions, and a ventral striatal layer that controlled a dopaminergic learning signal. Both layers could gain access to three modeled memory…

  2. America’s Air Force, The Future Calls: An Evidentiary and Theoretical Analysis Of The Roles And Missions Of A USAF Astronaut Corps

    DTIC Science & Technology

    2016-06-01

    wT0S8qQLCOqh. ; Keith Wagstaff, “ Elon Musk Says SpaceX Will Send People to Mars By 2025,” NBC News, 29 January 2016, Accessed 22 February 2016...http://www.nbcnews.com/tech/tech-news/ elon - musk -says-spacex-will-send-people- mars-2025-n506891. 76. “About Mars One,” Mars-One.com, 2016, Accessed 22...January 2014. Accessed 22 February 2016. https://www.stratcom.mil/factsheets/11/Space_Control_and_Space_Surveillan ce/. Wagstaff, Keith. “ Elon Musk Says

  3. Designing Security-Hardened Microkernels For Field Devices

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James

    Distributed control systems (DCSs) play an essential role in the operation of critical infrastructures. Perimeter field devices are important DCS components that measure physical process parameters and perform control actions. Modern field devices are vulnerable to cyber attacks due to their increased adoption of commodity technologies and that fact that control networks are no longer isolated. This paper describes an approach for creating security-hardened field devices using operating system microkernels that isolate vital field device operations from untrusted network-accessible applications. The approach, which is influenced by the MILS and Nizza architectures, is implemented in a prototype field device. Whereas, previous microkernel-based implementations have been plagued by poor inter-process communication (IPC) performance, the prototype exhibits an average IPC overhead for protected device calls of 64.59 μs. The overall performance of field devices is influenced by several factors; nevertheless, the observed IPC overhead is low enough to encourage the continued development of the prototype.

  4. Mathematic Model of Digital Control System with PID Regulator and Regular Step of Quantization with Information Transfer via the Channel of Plural Access

    NASA Astrophysics Data System (ADS)

    Abramov, G. V.; Emeljanov, A. E.; Ivashin, A. L.

    Theoretical bases for modeling a digital control system with information transfer via the channel of plural access and a regular quantization cycle are submitted. The theory of dynamic systems with random changes of the structure including elements of the Markov random processes theory is used for a mathematical description of a network control system. The characteristics of similar control systems are received. Experimental research of the given control systems is carried out.

  5. User-centered design of a web-based self-management site for individuals with type 2 diabetes – providing a sense of control and community

    PubMed Central

    2014-01-01

    Background To design and test a web-based self-management tool for patients with type 2 diabetes for its usability and feasibility. Methods An evidence-based, theory-driven website was created for patients with type 2 diabetes. Twenty-three patients with type 2 diabetes aged ≥ 25 years were recruited from 2 diabetes care centers in Toronto, Canada. We employed focus group methodology to assess acceptability, sustainability, strengths and weaknesses of the self-management website. Based on these results, revisions were made to the website. Three cycles of individual usability testing sessions using cognitive task analysis were conducted with patients with type 2 diabetes. Revisions to the website were made based on results from this testing. Results We identified five themes concerning participants’ experiences of health care and related unmet needs: 1) Desire for information and for greater access to timely and personalized care to gain a sense of control of their disease; 2) Desire for community (sharing experiences with others) to fulfill practical and emotional needs; 3) Potential roles of an online self-management website in self-empowerment, behavior change, self-management and health care delivery; 4) Importance of a patient-centered perspective in presenting content (e.g. common assumptions, medical nomenclature, language, messaging, sociocultural context); 5) Barriers and facilitators to use of a self-management website (including perceived relevance of content, incorporation into usual routine, availability for goal-directed use, usability issues). Conclusions Participants outlined a series of unmet health care needs, and stated that they wanted timely access to tailored knowledge about their condition, mechanisms to control and track their disease, and opportunities to share experiences with other patients. These findings have implications for patients with type 2 diabetes of diverse ages, socioeconomic backgrounds, and disease severity, as well as to the design of other computer-based resources for chronic disease management. PMID:25056379

  6. User-centered design of a web-based self-management site for individuals with type 2 diabetes - providing a sense of control and community.

    PubMed

    Yu, Catherine H; Parsons, Janet A; Hall, Susan; Newton, David; Jovicic, Aleksandra; Lottridge, Danielle; Shah, Baiju R; Straus, Sharon E

    2014-07-23

    To design and test a web-based self-management tool for patients with type 2 diabetes for its usability and feasibility. An evidence-based, theory-driven website was created for patients with type 2 diabetes. Twenty-three patients with type 2 diabetes aged ≥ 25 years were recruited from 2 diabetes care centers in Toronto, Canada. We employed focus group methodology to assess acceptability, sustainability, strengths and weaknesses of the self-management website. Based on these results, revisions were made to the website. Three cycles of individual usability testing sessions using cognitive task analysis were conducted with patients with type 2 diabetes. Revisions to the website were made based on results from this testing. We identified five themes concerning participants' experiences of health care and related unmet needs: 1) Desire for information and for greater access to timely and personalized care to gain a sense of control of their disease; 2) Desire for community (sharing experiences with others) to fulfill practical and emotional needs; 3) Potential roles of an online self-management website in self-empowerment, behavior change, self-management and health care delivery; 4) Importance of a patient-centered perspective in presenting content (e.g. common assumptions, medical nomenclature, language, messaging, sociocultural context); 5) Barriers and facilitators to use of a self-management website (including perceived relevance of content, incorporation into usual routine, availability for goal-directed use, usability issues). Participants outlined a series of unmet health care needs, and stated that they wanted timely access to tailored knowledge about their condition, mechanisms to control and track their disease, and opportunities to share experiences with other patients. These findings have implications for patients with type 2 diabetes of diverse ages, socioeconomic backgrounds, and disease severity, as well as to the design of other computer-based resources for chronic disease management.

  7. The Association Between Geographic Density of Infectious Disease Physicians and Limb Preservation in Patients With Diabetic Foot Ulcers.

    PubMed

    Brennan, Meghan B; Allen, Glenn O; Ferguson, Patrick D; McBride, Joseph A; Crnich, Christopher J; Smith, Maureen A

    2017-01-01

    Avoiding major (above-ankle) amputation in patients with diabetic foot ulcers is best accomplished by multidisciplinary care teams with access to infectious disease specialists. However, access to infectious disease physicians is partially influenced by geography. We assessed the effect of living in a hospital referral region with a high geographic density of infectious disease physicians on major amputation for patients with diabetic foot ulcers. We studied geographic density, rather than infectious disease consultation, to capture both the direct and indirect (eg, informal consultation) effects of access to these providers on major amputation. We used a national retrospective cohort of 56440 Medicare enrollees with incident diabetic foot ulcers. Cox proportional hazard models were used to assess the relationship between infectious disease physician density and major amputation, while controlling for patient demographics, comorbidities, and ulcer severity. Living in hospital referral regions with high geographic density of infectious disease physicians was associated with a reduced risk of major amputation after controlling for demographics, comorbidities, and ulcer severity (hazard ratio, .83; 95% confidence interval, .75-.91; P < .001). The relationship between the geographic density of infectious disease physicians and major amputation was not different based on ulcer severity and was maintained when adjusting for socioeconomic factors and modeling amputation-free survival. Infectious disease physicians may play an important role in limb salvage. Future studies should explore whether improved access to infectious disease physicians results in fewer major amputations. © The Author 2017. Published by Oxford University Press on behalf of Infectious Diseases Society of America.

  8. 77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-17

    ... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...

  9. Evidence-Based Diabetes Prevention and Control Programs and Policies in Local Health Departments.

    PubMed

    Zwald, Marissa; Elliott, Lindsay; Brownson, Ross C; Skala, Mahree

    2015-12-01

    The purpose of this study is to: (1) assess implementation of evidence-based programs and policies (EBPPs) related to diabetes prevention and control in local health departments, (2) assess feasibility of non-implemented diabetes prevention and control EBPPs, and (3) examine individual- and organizational-level factors associated with implementation of diabetes prevention and control EBPPs. An online survey was administered in January 2015 to key representatives of all local health departments in Missouri. Descriptive statistics were used to describe implementation and perceived feasibility of 20 diabetes prevention and control EBPPs. Logistic regression was used to examine the association between individual and organizational factors and diabetes prevention and control EBPP implementation. One hundred local health departments participated (89% response rate) in the online survey. Most frequently implemented diabetes-related EBPPs in local health departments included: nutrition education for agency or community members, increased fruit and vegetable access in community settings, and community-wide campaigns to promote physical activity. Increased encouragement to others in the department to use evidence-based decision making and agency incentives to help employees use evidence-based decision making were positively associated with implementation of diabetes prevention and control EBPPs. Local health departments are on the "front line" of public health, and this study demonstrates the important role these organizations play in implementing diabetes prevention and control EBPPs. Potential leverage points for more widespread adoption of diabetes-related EBPPs in local health departments include education about and encouragement of evidence-based decision making and organizational incentives for employees to integrate evidence-based decision making into their diabetes prevention and control activities. © 2015 The Author(s).

  10. Evidence-based diabetes prevention and control programs and policies in local health departments

    PubMed Central

    Zwald, Marissa; Elliott, Lindsay; Brownson, Ross C.; Skala, Mahree

    2016-01-01

    Purpose The purpose of this study is to: (1) assess implementation of evidence-based programs and policies (EBPPs) related to diabetes prevention and control in local health departments; (2) assess feasibility of non-implemented diabetes prevention and control EBPPs; and (3) examine individual- and organizational-level factors associated with implementation of diabetes prevention and control EBPPs. Methods An online survey was administered in January 2015 to key representatives of all local health departments in Missouri. Descriptive statistics were used to describe implementation and perceived feasibility of 20 diabetes prevention and control EBPPs. Logistic regression was used to examine the association between individual and organizational factors and diabetes prevention and control EBPP implementation. Results One hundred local health departments participated (89% response rate) in the online survey. Most frequently implemented diabetes-related EBPPs in local health departments included: nutrition education for agency or community members; increased fruit and vegetable access in community settings; and community-wide campaigns to promote physical activity. Increased encouragement to others in the department to use evidence-based decision making and agency incentives to help employees use evidence-based decision making were positively associated with implementation of diabetes prevention and control EBPPs. Conclusions Local health departments are the “front line” of public health and this study demonstrates the important role these organizations play in implementing diabetes prevention and control EBPPs. Potential leverage points for more widespread adoption of diabetes-related EBPPs in local health departments include education about and encouragement of evidence-based decision making and organizational incentives for employees to integrate evidence-based decision making into their diabetes prevention and control activities. PMID:26297714

  11. 75 FR 63170 - Access to Confidential Business Information by Avanti Corporation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-14

    ... control actions. They will also provide computer data base support related to providing information on...: Access to the confidential data will occur no sooner than October 21, 2010. FOR FURTHER INFORMATION... data, including CBI, will continue until October 31, 2015. If the contract is extended, this access...

  12. Canonical formalism for modelling and control of rigid body dynamics.

    PubMed

    Gurfil, P

    2005-12-01

    This paper develops a new paradigm for stabilization of rigid-body dynamics. The state-space model is formulated using canonical elements, known as the Serret-Andoyer (SA) variables, thus far scarcely used for engineering applications. The main feature of the SA formalism is the reduction of the dynamics via the underlying symmetry stemming from conservation of angular momentum and rotational kinetic energy. The controllability of the system model is examined using the notion of accessibility, and is shown to be accessible from all points. Based on the accessibility proof, two nonlinear asymptotic feedback stabilizers are developed: a damping feedback is designed based on the Jurdjevic-Quinn method, and a Hamiltonian controller is derived by using the Hamiltonian as a natural Lyapunov function for the closed-loop dynamics. It is shown that the Hamiltonian control is both passive and inverse optimal with respect to a meaningful performance index. The performance of the new controllers is examined and compared using simulations of realistic scenarios from the satellite attitude dynamics field.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bouchier, F.; Ahrens, J.S.; Wells, G.

    One thing that all access control applications have in common is the need to identify those individuals authorized to gain access to an area. Traditionally, the identification is based on something that person possesses, such as a key or badge, or something they know, such as a PIN or password. Biometric identifiers make their decisions based on the physiological or behavioral characteristics of individuals. The potential of biometrics devices to positively identify individuals has made them attractive for use in access control and computer security applications. However, no systems perform perfectly, so it is important to understand what a biometricmore » device`s performance is under real world conditions before deciding to implement one in an access control system. This paper will describe the evaluation of a prototype biometric identifier provided by IriScan Incorporated. This identifier was developed to recognize individual human beings based on the distinctive visual characteristics of the irises of their eyes. The main goal of the evaluation was to determine whether the system has potential as an access control device within the Department of Energy (DOE). The primary interest was an estimate of the accuracy of the system in terms of false accept and false reject rates. Data was also collected to estimate throughput time and user acceptability. The performance of the system during the test will be discussed. Lessons learned during the test which may aid in further testing and simplify implementation of a production system will also be discussed.« less

  14. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as well as legacy linked datasets. We show that SAFE enables granular graph-level access control over distributed clinical RDF data cubes and efficiently reduces the source selection and overall query execution time when compared with general-purpose SPARQL query federation engines in the targeted setting.

  15. Understanding the relationship between access to care and facility-based delivery through analysis of the 2008 Ghana Demographic Health Survey.

    PubMed

    Moyer, Cheryl A; McLaren, Zoë M; Adanu, Richard M; Lantz, Paula M

    2013-09-01

    To determine the types of access to care most strongly associated with facility-based delivery among women in Ghana. Data relating to the "5 As of Access" framework were extracted from the 2008 Ghana Demographic Health Survey and analyzed using multivariate logistic regression. In all, 55.5% of a weighted sample of 1102 women delivered in a healthcare facility, whereas 45.5% delivered at home. Affordability was the strongest access factor associated with delivery location, with health insurance coverage tripling the odds of facility delivery. Availability, accessibility (except urban residence), acceptability, and social access variables were not significant factors in the final models. Social access variables, including needing permission to seek healthcare and not being involved in decisions regarding healthcare, were associated with a reduced likelihood of facility-based delivery when examined individually. Multivariate analysis suggested that these variables reflected maternal literacy, health insurance coverage, and household wealth, all of which attenuated the effects of social access. Affordability was an important determinant of facility delivery in Ghana-even among women with health insurance-but social access variables had a mediating role. Copyright © 2013 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  16. Medical Equipment Tele- and Condition-Based Maintenance with Enhanced Remote Diagnostic Access (RDA) and Computer Vision

    DTIC Science & Technology

    2010-04-01

    failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE APR 2010 2. REPORT...The second is a ‘mechanical’ part that is controlled by circuit boards and is accessible by the technician via the serial console and running...was the use of conventional remote access solution designed for telecommuters or teleworkers in the Information Technology (IT) world, such as a

  17. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  18. Assessment of Orthographical Processing in Spanish Children with Dyslexia: The Role of Lexical and Sublexical Units

    ERIC Educational Resources Information Center

    Rodrigo, Mercedes; Jimenez, Juan E.; Garcia, Eduardo; Diaz, Alicia; Ortiz, M. Rosario; Guzman, Remedios; Hernandez-Valle, Isabel; Estevez, Adelina; Hernandez, Sergio

    2004-01-01

    Introduction: The aim of this study was to examine the role of multiletter units, such as the morpheme and whole word, in accessing the lexicon, in Spanish children with dyslexia. Method: A sample of 60 participants were selected and organised i n three different groups: 1) an experimental group of 18 reading-disabled children, (2) a control group…

  19. Comparing the role of fuel breaks across southern California national forests

    USGS Publications Warehouse

    Syphard, Alexandra D.; Keeley, Jon E.; Brennan, Teresa J.

    2011-01-01

    Fuel treatment of wildland vegetation is the primary approach advocated for mitigating fire risk at the wildland-urban interface (WUI), but little systematic research has been conducted to understand what role fuel treatments play in controlling large fires, which factors influence this role, or how the role of fuel treatments may vary over space and time. We assembled a spatial database of fuel breaks and fires from the last 30 years in four southern California national forests to better understand which factors are consistently important for fuel breaks in the control of large fires. We also explored which landscape features influence where fires and fuel breaks are most likely to intersect. The relative importance of significant factors explaining fuel break outcome and number of fire and fuel break intersections varied among the forests, which reflects high levels of regional landscape diversity. Nevertheless, several factors were consistently important across all the forests. In general, fuel breaks played an important role in controlling large fires only when they facilitated fire management, primarily by providing access for firefighting activities. Fire weather and fuel break maintenance were also consistently important. Models and maps predicting where fuel breaks and fires are most likely to intersect performed well in the regions where the models were developed, but these models did not extend well to other regions, reflecting how the environmental controls of fire regimes vary even within a single ecoregion. Nevertheless, similar mapping methods could be adopted in different landscapes to help with strategic location of fuel breaks. Strategic location of fuel breaks should also account for access points near communities, where fire protection is most important.

  20. Attitude and confidence of undergraduate medical programme educators to practice and teach evidence-based healthcare: a cross-sectional survey.

    PubMed

    Young, Taryn; Esterhuizen, Tonya M; Volmink, Jimmy; Clarke, Mike

    2016-06-01

    Medical student educators play critical roles in evidence-based healthcare (EBHC) teaching and learning and as role models practicing EBHC. This study assessed their confidence to practice and teach EBHC, their attitude to EBHC and barriers to practicing and teaching EBHC. We conducted a cross-sectional online survey of educators of undergraduate medical students at a South African academic institution. STATA 12 was used for quantitative data analysis. Responses to open-ended questions were coded, and further interpretation done using thematic content analysis. Forty two (19%) educators from various departments responded to the invitation sent to everyone formally involved in teaching undergraduate medical students. They had high levels of knowledge and understanding of EBHC. Many had received training in teaching and learning approaches, although EBHC training received was mainly on enabling competencies. Limitations to practicing EBHC included lack of time, clinical workload, limited access to Internet and resources, knowledge and skills. One quarter of the respondents indicated that they teach EBHC. Perceived barriers to teaching EBHC reported related to students (e.g. lack of interest), context (e.g. access to databases) and educators (e.g. competing priorities). Respondents' suggestions for support included reliable Internet access, easy point-of-care access to databases and resources, increasing awareness of EBHC, building capacity to practice and facilitate learning of EBHC and a supportive community of practice. Educators play a critical role in facilitating EBHC learning not just in the classroom, but also in practice. Without adequate support, training and development, they are ill equipped to be the role models future healthcare professionals need.

  1. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  2. Internet-delivered treatment: its potential as a low-intensity community intervention for adults with symptoms of depression: protocol for a randomized controlled trial

    PubMed Central

    2014-01-01

    Background Depression is a high prevalence disorder, displaying high rates of lifetime incidence, early age onset, high chronicity, and role impairment. In Ireland 12-month prevalence of depression has been reported to be 10.3%. A large percentage of affected individuals have no medical diagnosis nor seek treatment. Cognitive Behavior Therapy (CBT) has established itself as an option for the treatment of depression. Many Irish adults with depression find it difficult to access evidence-based CBT, this is due to several factors, like stigma and costs. However, systematic factors including the shortage of trained professionals and the relative underdevelopment of services also make access difficult. Stepped-care can increase access to evidence-based CBT. One option is tailored internet-delivered treatment programs. Preliminary research from Ireland needs now to include large-scale studies on effectiveness. Thus the current study seeks to examine the potential of an internet-delivered low-intensity treatment for symptoms of depression in an Irish adult community sample. Method/Design The study is a randomized controlled trial of an online CBT (iCBT) program for the treatment of adults with depressive symptoms. The trial will include an active treatment group and a waiting-list control group. The active condition will consist of 8 weekly modules of iCBT, with post-session feedback support. Participants in the waiting list will receive access to the treatment at week 8. Participants will complete the Beck Depression Inventory (BDI-II) and eligibility criteria will also apply. Primary outcomes are depressive symptoms. Secondary outcomes include quality of life indicators, significant events and satisfaction with online treatment. Data will be collected at baseline and at post-treatment, week 8, and at follow-up week 20 (3-months) and week 32 (6-months). Analysis will be conducted on the intention-to-treat basis. Discussion The study seeks to evaluate the effectiveness of an online delivered treatment for depression in a community sample of Irish adults with symptoms of depression. The study will be a first contribution and depending on the sample recruited the results may be generalizable to people with similar difficulties in Ireland and may therefore give insight into the potential of low-intensity interventions for Irish people with depressive symptoms. Trial registration number Current Controlled Trials ISRCTN03704676. DOI: 10.1186/ISRCTN03704676 PMID:24886179

  3. The equipment access software for a distributed UNIX-based accelerator control system

    NASA Astrophysics Data System (ADS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Hervé

    1994-12-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain.

  4. Peptide-controlled access to the interior surface of empty virus nanoparticles.

    PubMed

    Sainsbury, Frank; Saunders, Keith; Aljabali, Alaa A A; Evans, David J; Lomonossoff, George P

    2011-11-04

    The structure of Cowpea mosaic virus (CPMV) is known to high resolution, thereby enabling the rational use of the particles in diverse applications, from vaccine design to nanotechnology. A recently devised method for the production of empty virus-like particles (eVLPs) has opened up new possibilities for CPMV capsid-based technologies, such as internal mineralisation of the particle. We have investigated the role of the carboxyl (C) terminus of the small coat (S) protein in controlling access to the interior of CPMV eVLPs by determining the efficiency of internal mineralisation. The presence of the C-terminal 24-amino acid peptide of the S protein was found to inhibit internal mineralisation, an effect that could be eliminated by enzymatic removal of this region. We have also demonstrated the amenability of the C terminus to genetic modification. Substitution with six histidine residues generated stable particles and facilitated external mineralisation by cobalt. These findings demonstrate consistent internal and external mineralisation of CPMV, and will aid the further exploration and development of the use of eVLPs for bionanotechnological and medical applications. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Trace-Authored Papers from the Annual Conference on Rehabilitation Technology (11th, Montreal, Canada, 1988). Trace Reprint Series.

    ERIC Educational Resources Information Center

    Borden, P. A.; And Others

    Summaries are presented of five conference papers on communication, control, and computer access for handicapped individuals. Papers have the following titles and authors: "Accessibility of Graphically Based User Interface Computer Systems for Individuals with Visual Impairments" (Charles Lee and Gregg Vanderheiden); "Data Base vs. Information…

  6. Evaluating the role of public health in implementation of genomics-related recommendations: a case study of hereditary cancers using the CDC Science Impact Framework.

    PubMed

    Green, Ridgely Fisk; Ari, Mary; Kolor, Katherine; Dotson, W David; Bowen, Scott; Habarta, Nancy; Rodriguez, Juan L; Richardson, Lisa C; Khoury, Muin J

    2018-06-15

    Public health plays an important role in ensuring access to interventions that can prevent disease, including the implementation of evidence-based genomic recommendations. We used the Centers for Disease Control and Prevention (CDC) Science Impact Framework to trace the impact of public health activities and partnerships on the implementation of the 2009 Evaluation of Genomic Applications in Practice and Prevention (EGAPP) Lynch Syndrome screening recommendation and the 2005 and 2013 United States Preventive Services Task Force (USPSTF) BRCA1 and BRCA2 testing recommendations.The EGAPP and USPSTF recommendations have each been cited by >300 peer-reviewed publications. CDC funds selected states to build capacity to integrate these recommendations into public health programs, through education, policy, surveillance, and partnerships. Most state cancer control plans include genomics-related goals, objectives, or strategies. Since the EGAPP recommendation, major public and private payers now provide coverage for Lynch Syndrome screening for all newly diagnosed colorectal cancers. National guidelines and initiatives, including Healthy People 2020, included similar recommendations and cited the EGAPP and USPSTF recommendations. However, disparities in implementation based on race, ethnicity, and rural residence remain challenges. Public health achievements in promoting the evidence-based use of genomics for the prevention of hereditary cancers can inform future applications of genomics in public health.

  7. HIV-infected women’s perspectives on the use of the Internet for social support: A potential role for online group-based interventions

    PubMed Central

    Blackstock, Oni J.; Shah, Pooja A.; Haughton, Lorlette J.; Horvath, Keith J.; Cunningham, Chinazo O.

    2015-01-01

    While the development and implementation of HIV-related online interventions has expanded, few have been tailored for women or have leveraged Web 2.0’s capabilities to provide social support. We conducted semi-structured interviews with 27 women with HIV at an urban community health center to understand their perspectives on the potential role of the Internet and the use of an online group format to provide social support. Data were analyzed using the constant comparative method. We identified six themes: a need for groups and increased sense of connectedness, convenience and accessibility, trust as a precondition for participating, online groups as a potential facilitator or barrier to expression, limited digital access and literacy, and privacy concerns. Overall, women were highly supportive of online group-based interventions but acknowledged the need for increased digital access and Internet navigation training. Hybrid (in-person and online) interventions may be most useful for women with HIV. PMID:25749532

  8. The new ALICE DQM client: a web access to ROOT-based objects

    NASA Astrophysics Data System (ADS)

    von Haller, B.; Carena, F.; Carena, W.; Chapeland, S.; Chibante Barroso, V.; Costa, F.; Delort, C.; Dénes, E.; Diviá, R.; Fuchs, U.; Niedziela, J.; Simonetti, G.; Soós, C.; Telesca, A.; Vande Vyvre, P.; Wegrzynek, A.

    2015-12-01

    A Large Ion Collider Experiment (ALICE) is the heavy-ion detector designed to study the physics of strongly interacting matter and the quark-gluon plasma at the CERN Large Hadron Collider (LHC). The online Data Quality Monitoring (DQM) plays an essential role in the experiment operation by providing shifters with immediate feedback on the data being recorded in order to quickly identify and overcome problems. An immediate access to the DQM results is needed not only by shifters in the control room but also by detector experts worldwide. As a consequence, a new web application has been developed to dynamically display and manipulate the ROOT-based objects produced by the DQM system in a flexible and user friendly interface. The architecture and design of the tool, its main features and the technologies that were used, both on the server and the client side, are described. In particular, we detail how we took advantage of the most recent ROOT JavaScript I/O and web server library to give interactive access to ROOT objects stored in a database. We describe as well the use of modern web techniques and packages such as AJAX, DHTMLX and jQuery, which has been instrumental in the successful implementation of a reactive and efficient application. We finally present the resulting application and how code quality was ensured. We conclude with a roadmap for future technical and functional developments.

  9. Satellite control system nucleus for the Brazilian complete space mission

    NASA Astrophysics Data System (ADS)

    Yamaguti, Wilson; Decarvalhovieira, Anastacio Emanuel; Deoliveira, Julia Leocadia; Cardoso, Paulo Eduardo; Dacosta, Petronio Osorio

    1990-10-01

    The nucleus of the satellite control system for the Brazilian data collecting and remote sensing satellites is described. The system is based on Digital Equipment Computers and the VAX/VMS operating system. The nucleus provides the access control, the system configuration, the event management, history files management, time synchronization, wall display control, and X25 data communication network access facilities. The architecture of the nucleus and its main implementation aspects are described. The implementation experience acquired is considered.

  10. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    PubMed

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  11. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing

    PubMed Central

    Yang, Yixian; Shi, Yuxiang

    2018-01-01

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269

  12. ATAC-see reveals the accessible genome by transposase-mediated imaging and sequencing.

    PubMed

    Chen, Xingqi; Shen, Ying; Draper, Will; Buenrostro, Jason D; Litzenburger, Ulrike; Cho, Seung Woo; Satpathy, Ansuman T; Carter, Ava C; Ghosh, Rajarshi P; East-Seletsky, Alexandra; Doudna, Jennifer A; Greenleaf, William J; Liphardt, Jan T; Chang, Howard Y

    2016-12-01

    Spatial organization of the genome plays a central role in gene expression, DNA replication, and repair. But current epigenomic approaches largely map DNA regulatory elements outside of the native context of the nucleus. Here we report assay of transposase-accessible chromatin with visualization (ATAC-see), a transposase-mediated imaging technology that employs direct imaging of the accessible genome in situ, cell sorting, and deep sequencing to reveal the identity of the imaged elements. ATAC-see revealed the cell-type-specific spatial organization of the accessible genome and the coordinated process of neutrophil chromatin extrusion, termed NETosis. Integration of ATAC-see with flow cytometry enables automated quantitation and prospective cell isolation as a function of chromatin accessibility, and it reveals a cell-cycle dependence of chromatin accessibility that is especially dynamic in G1 phase. The integration of imaging and epigenomics provides a general and scalable approach for deciphering the spatiotemporal architecture of gene control.

  13. The Use of Proxy Caches for File Access in a Multi-Tier Grid Environment

    NASA Astrophysics Data System (ADS)

    Brun, R.; Duellmann, D.; Ganis, G.; Hanushevsky, A.; Janyst, L.; Peters, A. J.; Rademakers, F.; Sindrilaru, E.

    2011-12-01

    The use of proxy caches has been extensively studied in the HEP environment for efficient access of database data and showed significant performance with only very moderate operational effort at higher grid tiers (T2, T3). In this contribution we propose to apply the same concept to the area of file access and analyse the possible performance gains, operational impact on site services and applicability to different HEP use cases. Base on a proof-of-concept studies with a modified XROOT proxy server we review the cache efficiency and overheads for access patterns of typical ROOT based analysis programs. We conclude with a discussion of the potential role of this new component at the different tiers of a distributed computing grid.

  14. The Use of Proxy Caches for File Access in a Multi-Tier Grid Environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brun, R.; Dullmann, D.; Ganis, G.

    2012-04-19

    The use of proxy caches has been extensively studied in the HEP environment for efficient access of database data and showed significant performance with only very moderate operational effort at higher grid tiers (T2, T3). In this contribution we propose to apply the same concept to the area of file access and analyze the possible performance gains, operational impact on site services and applicability to different HEP use cases. Base on a proof-of-concept studies with a modified XROOT proxy server we review the cache efficiency and overheads for access patterns of typical ROOT based analysis programs. We conclude with amore » discussion of the potential role of this new component at the different tiers of a distributed computing grid.« less

  15. How can the German Electronic Health Card support patient's role in care management.

    PubMed

    Pharow, Peter; Blobel, Bernd; Hildebrand, Claudia

    2008-01-01

    All types of advanced communication, collaboration, and cooperation in healthcare require a strong involvement of all addressed parties including health professionals and patients. Modern healthcare aims at involving patients having them take over responsibility for their own health status. Allowing them to take on their changed roles as emancipated partners in advanced care management, health professionals need to be educated and patients need to be empowered. From a security viewpoint, health issues have to be communicated via trusted health networks. To provide communication and cooperation between professionals and patients as well as to guarantee the required level of involvement of patients in shared care management environments, cards are widely used as person identifiers, on the one hand, and as security tokens, on the other. Being introduced as storage media and portable personalized application system, cards enable a patient controlled access to personalized health services as well as proper use and exchange of personal health data for specific purposes such as emergency. Furthermore, cards allow access to the wider electronic patient record via pointers or tickets. Cards can empower patients. The German Electronic Health Card (eGK) shall thus support care management and specific workflow processes e.g. for prescription and disease management. Regardless whether designed as data or pointer card - international standardization is a prerequisite also for national solutions. The more information patients have regarding different procedures and processes in healthcare, the more are they able to play their dedicated role within care management. Cards can and will contribute by allowing patients to get controlled access to administrative and medical data stored either on cards or in networks. Card holders determine who has access to their health information.

  16. Potential new regulatory options for e-cigarettes in New Zealand.

    PubMed

    Wilson, Nick; Edwards, Richard; Hoek, Janet; Thomson, George; Blakely, Tony; van der Deen, Frederieke Sanne; Crane, Julian

    2015-11-20

    While e-cigarette usage has grown rapidly in New Zealand and around the world, the scientific evidence base regarding the net benefits and risks of these types of products at the population level remains uncertain. The health-based policy experience is also minimal. Here, we analyse plausible future regulatory options for e-cigarettes that the New Zealand Government could explore, and that further research could help clarify. These options include: (1) a full free market (an option we doubt is desirable for multiple reasons); (2) controlled increased access through: (a) pharmacy only, (b) pharmacy only plus sales by prescription/ to licensed vapers; (c) additional controls through non-profit supply/distribution (eg, public hospital pharmacies); (3) increased restrictions compared with current (eg, adopting a complete ban on self-imports and use). In addition, we consider mechanisms to improve product quality and safety, and argue that policy makers should take great care when regulating e-cigarettes, given the scientific uncertainty and the role of commercial vested interests.

  17. The Control Unit of KM3NeT data acquisition

    NASA Astrophysics Data System (ADS)

    Bozza, Cristiano

    2016-04-01

    The KM3NeT Collaboration is building a new generation of neutrino telescopes in the Mediterranean Sea. With the telescopes, scientists will search for cosmic neutrinos to study highly energetic objects in the Universe, while one neutrino detector will be dedicated to measure the properties of the high-energy neutrino particles themselves. Control of the KM3NeT data acquisition processes is handled by the KM3NeT Control Unit, which has been designed to maximise the detector live time. The Control Unit features software programs with different roles, following the philosophy of having no single point of failure. While all programs are interconnected, each one can also work alone for most of the time in case other services are unavailable. All services run on the Common Language Runtime, which ensures portability, flexibility and automatic memory management. Each service has an embedded Web server, providing a user interface as well as programmatic access to data and functions. Data to and from detector components for monitoring and management purposes are transmitted using a custom designed protocol. The Control Unit is interfaced to one or more Message Dispatchers to control the data acquisition chain. A Data Base Interface provides fast and fault-tolerant connection to a remote Data Base.

  18. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  19. An Intelligent Information Access System Assisting a Case Based Learning Methodology Evaluated in Higher Education with Medical Students

    ERIC Educational Resources Information Center

    Aparicio, Fernando; De Buenaga, Manuel; Rubio, Margarita; Hernando, Asuncion

    2012-01-01

    In recent years there has been a shift in educational methodologies toward a student-centered approach, one which increasingly emphasizes the integration of computer tools and intelligent systems adopting different roles. In this paper we describe in detail the development of an Intelligent Information Access system used as the basis for producing…

  20. Education, Work, and Employment. Volume I--Education, Training and Access to the Labour Market.

    ERIC Educational Resources Information Center

    Hallak, Jacques; And Others

    This volume contains four studies covering various approaches and having different scopes for studying the problem of access to jobs and the role of education and training as criteria for recruitment. The first study, on the metropolitan area of Panama, covers all sectors of activity. It is based on a questionnaire administered to 80 companies to…

  1. The Role of Women's Colleges and Universities in Providing Access to Postsecondary Education

    ERIC Educational Resources Information Center

    Renn, Kristen A.

    2017-01-01

    Based on a qualitative, comparative, multiple case study of the contributions and status of 21st century women's colleges and universities, this article analyzes the topic of women's access to postsecondary education in ten nations. Despite decreasing numbers of women-only institutions in some regions (e.g., North America), the sector is growing…

  2. The Impact of Role Models on Health Outcomes for Lesbian, Gay, Bisexual and Transgender Youth

    PubMed Central

    Bird, Jason D. P.; Kuhns, Lisa; Garofalo, Robert

    2011-01-01

    Purpose There is little research on the impact of role models on health outcomes for Lesbian, Gay, Bisexual, and Transgender (LGBT) youth. This exploratory study describes the presence and availability of LGBT affirming role models and examines the relationship between the accessibility of role models and health outcomes among a community-based sample of LGBT youth. Methods A convenience sample of 496 ethnically-diverse, 16–24 year old LGBT youth was recruited to complete a computer-assisted interview using standardized instruments validated with adolescents. The prevalence and characteristics of role models was described. Differences in subgroup distribution were assessed using Pearson Chi-square (p<0.05). Differences in health outcomes for those with and without role models and the nature of those role models were determined using analysis of co-variance (ANCOVA) models, with post hoc Bonferroni tests to probe significant global findings. Results Sixty-percent of the participants reported having a role model, with younger participants significantly more likely to report having a role model. A majority of the participants reported having inaccessible role models, especially among younger participants. The presence and accessibility of a role model did not have a significant relationship to binge drinking, drug use, or STI diagnoses; however, participants with inaccessible role models showed increased psychological distress versus those with accessible or no role models. Conclusions Inaccessible role models may not be sufficient for protecting youth from negative outcomes and formal mechanisms for connecting LGBT youth with caring adults who can serve as role models, such as mentoring programs, are critical. PMID:22443838

  3. Freedom and Funding First.

    ERIC Educational Resources Information Center

    Berry, John N., III

    2001-01-01

    Previews the agenda for the American Library Association's 2002 Midwinter Meeting. Topics include the incompatibility of Bush administration national security initiatives with traditional rights of intellectual freedom; budget cuts; government funding; new roles for libraries in times of crisis; Internet access and control; and librarians'…

  4. Factors associated with second trimester abortion in rural Maharashtra and Rajasthan, India.

    PubMed

    Zavier, A J Francis; Jejeebhoy, Shireen; Kalyanwala, Shveta

    2012-01-01

    Many married women in India experience abortion in their second trimester of pregnancy. While there is an impression that second trimester abortions are now overwhelmingly used for sex selection, little is known about the extent to which second trimester abortions are indeed associated with son preference and sex selection motives, relative to other factors. Using data from a community-based study in rural Maharashtra and Rajasthan, research highlights the role of limited access in explaining second trimester abortion. While women with a single child who was a daughter were indeed more likely than other women to have terminated a pregnancy carrying a female foetus in the second trimester, more strikingly, exclusion from abortion-related decision-making, unsuccessful prior attempts to terminate the pregnancy, and distance from the facility in which their abortion was performed, were significantly associated with second trimester abortion, even after controlling for confounding factors. The study calls for greater efficiency in implementing the PCPNDT Act and addressing deep-rooted son preference. At the same time, findings that poverty and limited access to facilities are as, if not more, important drivers of second trimester abortion, highlight the need to meet commitments to ensure accessible abortion facilities for poor rural women.

  5. Wisconsin’s Environmental Public Health Tracking Network: Information Systems Design for Childhood Cancer Surveillance

    PubMed Central

    Hanrahan, Lawrence P.; Anderson, Henry A.; Busby, Brian; Bekkedal, Marni; Sieger, Thomas; Stephenson, Laura; Knobeloch, Lynda; Werner, Mark; Imm, Pamela; Olson, Joseph

    2004-01-01

    In this article we describe the development of an information system for environmental childhood cancer surveillance. The Wisconsin Cancer Registry annually receives more than 25,000 incident case reports. Approximately 269 cases per year involve children. Over time, there has been considerable community interest in understanding the role the environment plays as a cause of these cancer cases. Wisconsin’s Public Health Information Network (WI-PHIN) is a robust web portal integrating both Health Alert Network and National Electronic Disease Surveillance System components. WI-PHIN is the information technology platform for all public health surveillance programs. Functions include the secure, automated exchange of cancer case data between public health–based and hospital-based cancer registrars; web-based supplemental data entry for environmental exposure confirmation and hypothesis testing; automated data analysis, visualization, and exposure–outcome record linkage; directories of public health and clinical personnel for role-based access control of sensitive surveillance information; public health information dissemination and alerting; and information technology security and critical infrastructure protection. For hypothesis generation, cancer case data are sent electronically to WI-PHIN and populate the integrated data repository. Environmental data are linked and the exposure–disease relationships are explored using statistical tools for ecologic exposure risk assessment. For hypothesis testing, case–control interviews collect exposure histories, including parental employment and residential histories. This information technology approach can thus serve as the basis for building a comprehensive system to assess environmental cancer etiology. PMID:15471739

  6. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    ERIC Educational Resources Information Center

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  7. The Effects of a Concept Map-Based Information Display in an Electronic Portfolio System on Information Processing and Retention in a Fifth-Grade Science Class Covering the Earth's Atmosphere

    ERIC Educational Resources Information Center

    Kim, Paul; Olaciregui, Claudia

    2008-01-01

    An electronic portfolio system, designed to serve as a resource-based learning space, was tested in a fifth-grade science class. The control-group students accessed a traditional folder-based information display in the system and the experimental-group students accessed a concept map-based information display to review a science portfolio. The…

  8. Women’s Role in Disaster Management and Implications for National Security

    DTIC Science & Technology

    2017-07-11

    management policies, plans and decision making processes,” available at http://www.unisdr.org/we/ inform /publications/1037. Beijing Agenda for Global...1 WOMEN’S ROLE IN DISASTER MANAGEMENT AND IMPLICATIONS FOR NATIONAL SECURITY By Jessica Ear Introduction Disasters are increasing in...frequency and intensity. For those lacking control and access to services and resources such as education and information , disaster risks are even

  9. Examining the Roles and Experiences of Fathers of Children With Chronic Kidney Disease

    PubMed Central

    Nicholas, David B.

    2017-01-01

    This study examined roles and experiences of fathers of children with chronic kidney disease (CKD). Based on interpretive description, semistructured interviews were conducted with 22 fathers of children receiving a range of treatments (transplant, peritoneal dialysis, hemodialysis, and CKD not requiring renal replacement therapy). Fathers described various experiences and means of adjusting to shifts associated with pediatric CKD. These included loss of personal control, a sense of personal isolation, and a stance of remaining strong amidst personal suffering. Nuanced differences according to modality of CKD care were identified. Fathers engaged in strategies that fostered coping, such as remaining positive and taking charge. They conveyed deep love for their child, and demonstrated ingenuity and persistence in care. Few resources of support were accessed by fathers. Study recommendations invite holistic approaches to health care, with improved resources for families—including fathers—in addressing the needs of this population. PMID:28508021

  10. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  11. Ontology based log content extraction engine for a posteriori security control.

    PubMed

    Azkia, Hanieh; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Coatrieux, Gouenou

    2012-01-01

    In a posteriori access control, users are accountable for actions they performed and must provide evidence, when required by some legal authorities for instance, to prove that these actions were legitimate. Generally, log files contain the needed data to achieve this goal. This logged data can be recorded in several formats; we consider here IHE-ATNA (Integrating the healthcare enterprise-Audit Trail and Node Authentication) as log format. The difficulty lies in extracting useful information regardless of the log format. A posteriori access control frameworks often include a log filtering engine that provides this extraction function. In this paper we define and enforce this function by building an IHE-ATNA based ontology model, which we query using SPARQL, and show how the a posteriori security controls are made effective and easier based on this function.

  12. Distributed policy based access to networked heterogeneous ISR data sources

    NASA Astrophysics Data System (ADS)

    Bent, G.; Vyvyan, D.; Wood, David; Zerfos, Petros; Calo, Seraphin

    2010-04-01

    Within a coalition environment, ad hoc Communities of Interest (CoI's) come together, perhaps for only a short time, with different sensors, sensor platforms, data fusion elements, and networks to conduct a task (or set of tasks) with different coalition members taking different roles. In such a coalition, each organization will have its own inherent restrictions on how it will interact with the others. These are usually stated as a set of policies, including security and privacy policies. The capability that we want to enable for a coalition operation is to provide access to information from any coalition partner in conformance with the policies of all. One of the challenges in supporting such ad-hoc coalition operations is that of providing efficient access to distributed sources of data, where the applications requiring the data do not have knowledge of the location of the data within the network. To address this challenge the International Technology Alliance (ITA) program has been developing the concept of a Dynamic Distributed Federated Database (DDFD), also know as a Gaian Database. This type of database provides a means for accessing data across a network of distributed heterogeneous data sources where access to the information is controlled by a mixture of local and global policies. We describe how a network of disparate ISR elements can be expressed as a DDFD and how this approach enables sensor and other information sources to be discovered autonomously or semi-autonomously and/or combined, fused formally defined local and global policies.

  13. Cognitive-behavioral therapy for patients with irritable bowel syndrome: current insights.

    PubMed

    Kinsinger, Sarah W

    2017-01-01

    Irritable bowel syndrome (IBS) is a chronic gastrointestinal (GI) condition associated with significant health care utilization and quality-of-life impairment. Latest research indicates that the brain-gut axis plays a key role in the disorder, and the presence of psychological factors and central processing deficits contribute to symptom severity and disability. Psychological therapies as a whole have demonstrated good efficacy in reducing the severity of IBS symptoms. Cognitive-behavioral therapy (CBT) has been tested most rigorously in multiple randomized controlled trials and consistently demonstrates significant and durable effects on IBS symptoms and quality of life. Various protocols for treating IBS have been developed, and most recent advances in the field include exposure-based treatments to target symptom-specific anxiety as well as modified delivery methods, including internet-based treatment models. Despite the well-documented advantages of CBT for IBS, it has been poorly disseminated and few patients have access to this treatment. The primary barrier to dissemination is the limited number of therapists with adequate training in GI psychology to provide this evidence-based intervention. Future developments in the field need to focus on training opportunities to equip more therapists to competently provide CBT for this population. Further efforts to develop telemedicine platforms for delivering this intervention will also improve accessibility for patients.

  14. Hopes for the Future of Pain Control.

    PubMed

    Bannister, Kirsty; Kucharczyk, Mateusz; Dickenson, Anthony H

    2017-12-01

    Here we aim to present an accessible review of the pharmacological targets for pain management, and succinctly discuss the newest trends in pain therapy. A key task for current pain pharmacotherapy is the identification of receptors and channels orchestrating nociception. Notwithstanding peripheral alterations in the receptors and channels following pathophysiological events, the modulatory mechanisms in the central nervous system are also fundamental to the regulation of pain perception. Bridging preclinical and clinical studies of peripheral and central components of pain modulation, we present the different types of pain and relate these to pharmacological interventions. We firstly highlight the roles of several peripheral nociceptors, such as NGF, CGRP, sodium channels, and TRP-family channels that may become novel targets for therapies. In the central nervous system, the roles of calcium channels and gabapentinoids as well as NMDA receptors in generating excitability are covered including ideas on central sensitization. We then turn to central modulatory systems and discuss opioids and monoamines. We aim to explain the importance of central sensitization and the dialogue of the spinal circuits with the brain descending modulatory controls before discussing a mechanism-based effectiveness of antidepressants in pain therapy and their potential to modulate the descending controls. Emphasizing the roles of conditioned pain modulation and its animal's equivalent, diffuse noxious inhibitory controls, we discuss these unique descending modulations as a potential tool for understanding mechanisms in patients suffering from pain. Mechanism-based therapy is the key to picking the correct treatments and recent clinical studies using sensory symptoms of patients as surrogates for underlying mechanisms can be used to subgroup patients and reveal actions of drugs that may be lost when studying heterogenous groups of patients. Key advances in the understanding of basic pain principles will impact our thinking about therapy targets. The complexity of pain syndromes will require tailored pharmacological drugs, often in combination or through drugs with more than one action, and often psychotherapy, to fully control pain.

  15. Enhancing the primary care team to provide redesigned care: the roles of practice facilitators and care managers.

    PubMed

    Taylor, Erin Fries; Machta, Rachel M; Meyers, David S; Genevro, Janice; Peikes, Deborah N

    2013-01-01

    Efforts to redesign primary care require multiple supports. Two potential members of the primary care team-practice facilitator and care manager-can play important but distinct roles in redesigning and improving care delivery. Facilitators, also known as quality improvement coaches, assist practices with coordinating their quality improvement activities and help build capacity for those activities-reflecting a systems-level approach to improving quality, safety, and implementation of evidence-based practices. Care managers provide direct patient care by coordinating care and helping patients navigate the system, improving access for patients, and communicating across the care team. These complementary roles aim to help primary care practices deliver coordinated, accessible, comprehensive, and patient-centered care.

  16. Cyber physical systems role in manufacturing technologies

    NASA Astrophysics Data System (ADS)

    Al-Ali, A. R.; Gupta, Ragini; Nabulsi, Ahmad Al

    2018-04-01

    Empowered by the recent development in single System-on-Chip, Internet of Things, and cloud computing technologies, cyber physical systems are evolving as a major controller during and post the manufacturing products process. In additional to their real physical space, cyber products nowadays have a virtual space. A product virtual space is a digital twin that is attached to it to enable manufacturers and their clients to better manufacture, monitor, maintain and operate it throughout its life time cycles, i.e. from the product manufacturing date, through operation and to the end of its lifespan. Each product is equipped with a tiny microcontroller that has a unique identification number, access code and WiFi conductivity to access it anytime and anywhere during its life cycle. This paper presents the cyber physical systems architecture and its role in manufacturing. Also, it highlights the role of Internet of Things and cloud computing in industrial manufacturing and factory automation.

  17. Laughter as a scientific problem: An adventure in sidewalk neuroscience.

    PubMed

    Provine, Robert R

    2016-06-01

    Laughter is a stereotyped, innate, human play vocalization that provides an ideal simple system for neurobehavioral analyses of the sort usually associated with such animal models as walking, wing-flapping, and bird song. Laughter research is in its early stages, where the frontiers are near and accessible to simple observational procedures termed "sidewalk neuroscience." The basic, nontechnical approach of describing the act of laughter and when humans do it has revealed a variety of phenomena of social and neurological significance. Findings include the acoustic structure of laughter, the minimal voluntary control of laughter, contagiousness, the "punctuation effect" that describes the placement of laughter in conversation, the dominance of speech over laughter, the role of breath control in the evolution of speech, the evolutionary trajectory of laughter in primates, and the role of laughter in human matching and mating. If one knows where to look and how to see, advances in neuroscience are accessible to anyone and require minimal resources. © 2015 Wiley Periodicals, Inc.

  18. Patient-Controlled Attribute-Based Encryption for Secure Electronic Health Records System.

    PubMed

    Eom, Jieun; Lee, Dong Hoon; Lee, Kwangsu

    2016-12-01

    In recent years, many countries have been trying to integrate electronic health data managed by each hospital to offer more efficient healthcare services. Since health data contain sensitive information of patients, there have been much research that present privacy preserving mechanisms. However, existing studies either require a patient to perform various steps to secure the data or restrict the patient to exerting control over the data. In this paper, we propose patient-controlled attribute-based encryption, which enables a patient (a data owner) to control access to the health data and reduces the operational burden for the patient, simultaneously. With our method, the patient has powerful control capability of his/her own health data in that he/she has the final say on the access with time limitation. In addition, our scheme provides emergency medical services which allow the emergency staffs to access the health data without the patient's permission only in the case of emergencies. We prove that our scheme is secure under cryptographic assumptions and analyze its efficiency from the patient's perspective.

  19. The Role of Patient-Reported Outcome Measures in Value-Based Payment Reform.

    PubMed

    Squitieri, Lee; Bozic, Kevin J; Pusic, Andrea L

    2017-06-01

    The U.S. health care system is currently experiencing profound change. Pressure to improve the quality of patient care and control costs have caused a rapid shift from traditional volume-driven fee-for-service reimbursement to value-based payment models. Under the 2015 Medicare Access and Children's Health Insurance Program Reauthorization Act, providers will be evaluated on the basis of quality and cost efficiency and ultimately receive adjusted reimbursement as per their performance. Although current performance metrics do not incorporate patient-reported outcome measures (PROMs), many wonder whether and how PROMs will eventually fit into value-based payment reform. On November 17, 2016, the second annual Patient-Reported Outcomes in Healthcare Conference brought together international stakeholders across all health care disciplines to discuss the potential role of PROs in value-based health care reform. The purpose of this article was to summarize the findings from this conference in the context of recent literature and guidelines to inform implementation of PROs in value-based payment models. Recommendations for evaluating key perspectives and measurement goals are made to facilitate appropriate use of PROMs to best benefit and amplify the voice of our patients. Copyright © 2017 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  20. A development framework for artificial intelligence based distributed operations support systems

    NASA Technical Reports Server (NTRS)

    Adler, Richard M.; Cottman, Bruce H.

    1990-01-01

    Advanced automation is required to reduce costly human operations support requirements for complex space-based and ground control systems. Existing knowledge based technologies have been used successfully to automate individual operations tasks. Considerably less progress has been made in integrating and coordinating multiple operations applications for unified intelligent support systems. To fill this gap, SOCIAL, a tool set for developing Distributed Artificial Intelligence (DAI) systems is being constructed. SOCIAL consists of three primary language based components defining: models of interprocess communication across heterogeneous platforms; models for interprocess coordination, concurrency control, and fault management; and for accessing heterogeneous information resources. DAI applications subsystems, either new or existing, will access these distributed services non-intrusively, via high-level message-based protocols. SOCIAL will reduce the complexity of distributed communications, control, and integration, enabling developers to concentrate on the design and functionality of the target DAI system itself.

  1. Attitude and confidence of undergraduate medical programme educators to practice and teach evidence-based healthcare: a cross-sectional survey

    PubMed Central

    Young, Taryn; Esterhuizen, Tonya M.; Volmink, Jimmy; Clarke, Mike

    2016-01-01

    ABSTRACT Aim: Medical student educators play critical roles in evidence-based healthcare (EBHC) teaching and learning and as role models practicing EBHC. This study assessed their confidence to practice and teach EBHC, their attitude to EBHC and barriers to practicing and teaching EBHC. Methods: We conducted a cross-sectional online survey of educators of undergraduate medical students at a South African academic institution. STATA 12 was used for quantitative data analysis. Responses to open-ended questions were coded, and further interpretation done using thematic content analysis. Results: Forty two (19%) educators from various departments responded to the invitation sent to everyone formally involved in teaching undergraduate medical students. They had high levels of knowledge and understanding of EBHC. Many had received training in teaching and learning approaches, although EBHC training received was mainly on enabling competencies. Limitations to practicing EBHC included lack of time, clinical workload, limited access to Internet and resources, knowledge and skills. One quarter of the respondents indicated that they teach EBHC. Perceived barriers to teaching EBHC reported related to students (e.g. lack of interest), context (e.g. access to databases) and educators (e.g. competing priorities). Respondents’ suggestions for support included reliable Internet access, easy point-of-care access to databases and resources, increasing awareness of EBHC, building capacity to practice and facilitate learning of EBHC and a supportive community of practice. Conclusion: Educators play a critical role in facilitating EBHC learning not just in the classroom, but also in practice. Without adequate support, training and development, they are ill equipped to be the role models future healthcare professionals need. PMID:26626283

  2. Introducing keytagging, a novel technique for the protection of medical image-based tests.

    PubMed

    Rubio, Óscar J; Alesanco, Álvaro; García, José

    2015-08-01

    This paper introduces keytagging, a novel technique to protect medical image-based tests by implementing image authentication, integrity control and location of tampered areas, private captioning with role-based access control, traceability and copyright protection. It relies on the association of tags (binary data strings) to stable, semistable or volatile features of the image, whose access keys (called keytags) depend on both the image and the tag content. Unlike watermarking, this technique can associate information to the most stable features of the image without distortion. Thus, this method preserves the clinical content of the image without the need for assessment, prevents eavesdropping and collusion attacks, and obtains a substantial capacity-robustness tradeoff with simple operations. The evaluation of this technique, involving images of different sizes from various acquisition modalities and image modifications that are typical in the medical context, demonstrates that all the aforementioned security measures can be implemented simultaneously and that the algorithm presents good scalability. In addition to this, keytags can be protected with standard Cryptographic Message Syntax and the keytagging process can be easily combined with JPEG2000 compression since both share the same wavelet transform. This reduces the delays for associating keytags and retrieving the corresponding tags to implement the aforementioned measures to only ≃30 and ≃90ms respectively. As a result, keytags can be seamlessly integrated within DICOM, reducing delays and bandwidth when the image test is updated and shared in secure architectures where different users cooperate, e.g. physicians who interpret the test, clinicians caring for the patient and researchers. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Toward Optimization of Gaze-Controlled Human-Computer Interaction: Application to Hindi Virtual Keyboard for Stroke Patients.

    PubMed

    Meena, Yogesh Kumar; Cecotti, Hubert; Wong-Lin, Kongfatt; Dutta, Ashish; Prasad, Girijesh

    2018-04-01

    Virtual keyboard applications and alternative communication devices provide new means of communication to assist disabled people. To date, virtual keyboard optimization schemes based on script-specific information, along with multimodal input access facility, are limited. In this paper, we propose a novel method for optimizing the position of the displayed items for gaze-controlled tree-based menu selection systems by considering a combination of letter frequency and command selection time. The optimized graphical user interface layout has been designed for a Hindi language virtual keyboard based on a menu wherein 10 commands provide access to type 88 different characters, along with additional text editing commands. The system can be controlled in two different modes: eye-tracking alone and eye-tracking with an access soft-switch. Five different keyboard layouts have been presented and evaluated with ten healthy participants. Furthermore, the two best performing keyboard layouts have been evaluated with eye-tracking alone on ten stroke patients. The overall performance analysis demonstrated significantly superior typing performance, high usability (87% SUS score), and low workload (NASA TLX with 17 scores) for the letter frequency and time-based organization with script specific arrangement design. This paper represents the first optimized gaze-controlled Hindi virtual keyboard, which can be extended to other languages.

  4. The Role of Community Health Centers in Reducing Racial Disparities in Spatial Access to Primary Care.

    PubMed

    Seymour, Jane W; Polsky, Daniel E; Brown, Elizabeth J; Barbu, Corentin M; Grande, David

    2017-07-01

    Racial minorities are more likely to live in primary care shortage areas. We sought to understand community health centers' (CHCs) role in reducing disparities. We surveyed all primary care practices in an urban area, identified low access areas, and examined how CHCs influence spatial accessibility. Census tracts with higher rates of public insurance (≥40% vs <10%, odds ratio [OR] = 31.06, P < .001; 30-39% vs 10%, OR = 7.84, P = 0.001) were more likely to be near a CHC and those with moderate rates of uninsurance (10%-19% vs <10%, OR = 0.42, P = .045) were less likely. Racial composition was not associated with proximity. Tracts close to a CHC were less likely (OR = 0.11, P < .0001) to be in a low access area. This association did not differ based on racial composition. Although CHCs were more likely to be in areas with a greater fraction of racial minorities, location was more strongly influenced by public insurance rates. CHCs reduced the likelihood of being in low access areas but the effect did not vary by tract racial composition.

  5. ViSA: a neurodynamic model for visuo-spatial working memory, attentional blink, and conscious access.

    PubMed

    Simione, Luca; Raffone, Antonino; Wolters, Gezinus; Salmas, Paola; Nakatani, Chie; Belardinelli, Marta Olivetti; van Leeuwen, Cees

    2012-10-01

    Two separate lines of study have clarified the role of selectivity in conscious access to visual information. Both involve presenting multiple targets and distracters: one simultaneously in a spatially distributed fashion, the other sequentially at a single location. To understand their findings in a unified framework, we propose a neurodynamic model for Visual Selection and Awareness (ViSA). ViSA supports the view that neural representations for conscious access and visuo-spatial working memory are globally distributed and are based on recurrent interactions between perceptual and access control processors. Its flexible global workspace mechanisms enable a unitary account of a broad range of effects: It accounts for the limited storage capacity of visuo-spatial working memory, attentional cueing, and efficient selection with multi-object displays, as well as for the attentional blink and associated sparing and masking effects. In particular, the speed of consolidation for storage in visuo-spatial working memory in ViSA is not fixed but depends adaptively on the input and recurrent signaling. Slowing down of consolidation due to weak bottom-up and recurrent input as a result of brief presentation and masking leads to the attentional blink. Thus, ViSA goes beyond earlier 2-stage and neuronal global workspace accounts of conscious processing limitations. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  6. When Does Model-Based Control Pay Off?

    PubMed

    Kool, Wouter; Cushman, Fiery A; Gershman, Samuel J

    2016-08-01

    Many accounts of decision making and reinforcement learning posit the existence of two distinct systems that control choice: a fast, automatic system and a slow, deliberative system. Recent research formalizes this distinction by mapping these systems to "model-free" and "model-based" strategies in reinforcement learning. Model-free strategies are computationally cheap, but sometimes inaccurate, because action values can be accessed by inspecting a look-up table constructed through trial-and-error. In contrast, model-based strategies compute action values through planning in a causal model of the environment, which is more accurate but also more cognitively demanding. It is assumed that this trade-off between accuracy and computational demand plays an important role in the arbitration between the two strategies, but we show that the hallmark task for dissociating model-free and model-based strategies, as well as several related variants, do not embody such a trade-off. We describe five factors that reduce the effectiveness of the model-based strategy on these tasks by reducing its accuracy in estimating reward outcomes and decreasing the importance of its choices. Based on these observations, we describe a version of the task that formally and empirically obtains an accuracy-demand trade-off between model-free and model-based strategies. Moreover, we show that human participants spontaneously increase their reliance on model-based control on this task, compared to the original paradigm. Our novel task and our computational analyses may prove important in subsequent empirical investigations of how humans balance accuracy and demand.

  7. Scholarly Electronic Full-Text Publications via the Internet: Issues and Impacts

    NASA Technical Reports Server (NTRS)

    Kosmin, Linda J.

    1999-01-01

    On-line access to complete texts of scholarly journal articles, conference papers, and books is facilitated by rapidly developing World-wide Web Internet access and capabilities. Meanwhile, print publications continue to be produced and read in spite of the proliferation of many networked electronic publications. The purpose of this presentation is to highlight fundamental issues impacting stakeholder groups, as the trend continues towards migration from paper to affordable ubiquitous networked full-text publications. Librarians, publishers, authors and end-users have various viewpoints, interests, and concerns. There are many issues challenging all stakeholder groups. For instance, all share concerns about administering copyright compliance and enforcing fair use. Uncontrollable electronic downstreaming could result in infringed copyright, while limiting a publisher's entitled revenue stream. Moreover, metered fee-based access may hamper scholarly information research. And, self-authoring on the Internet without peer filtering could lead to information clutter. Many related issues challenge librarians in particular. Among these are rising journal subscription prices, regardless if offered in print or electronic. Some electronic offerings are independent of print, others supplement or duplicate print; several publishers presently require subscribing to print in order to access electronic. Furthermore, numbers of publications are n'ow being marketed via the Internet directly to end-users, which can be viewed as encouraging users to bypass the traditional library. A key issue challenging publishers today is the rapidly expanding electronic user base that is demanding delivery of added-value full-text to desktop computers. Also of growing concern appears to be the decline in print sales to libraries, thereby reducing traditional revenue stream potential. Nowadays, publishers are more hesitant about investing in the production of publications geared toward small niche subjects, since these tend to require higher pricing and carry limited sales potential. Both electronic and print publications necessitate similar editorial, production, operating, and marketing dollars. Tradeoffs owing to delivery format difference do not necessarily mean less dollars need to be spent. Authors wishing to publish books are facing a decline in the role of scholarly monographs in electronic media. However, they are witnessing increased roles of electronic preprints and electronic journal articles. Moreover, the Internet fosters self-publishing without peer monitoring or formal review. Issues challenging end-users include electronic barriers to peer-reviewed formal published works (i.e., fee-based subscriptions to journal literature vs. traditional free-library concept). This often means password only access or IP address controlled site-licensed access. Also, in an uncontrolled Internet environment, sometimes there is a blurring of publication authorship/ownership, as various pieces of publications are cut/pasted into/re-posted on various, disconnected Web searchable home pages.

  8. Association of Access to Publicly Funded Family Planning Services With Adolescent Birthrates in California Counties

    PubMed Central

    Chabot, Marina J.; Navarro, Sandy; Swann, Diane; Darney, Philip; Thiel de Bocanegra, Heike

    2014-01-01

    Objectives. We examined the association of adolescent birthrates (ABRs) with access to and receipt of publicly funded family planning services in California counties provided through 2 state programs: Medi-Cal, California’s Medicaid program, and the Family Planning, Access, Care, and Treatment (Family PACT) program. Methods. Our key data sources included the California Health Interview Survey and California Women’s Health Survey, Medi-Cal and Family PACT claims data, and the Birth Statistical Master File. We constructed a linear regression analysis measuring the relationship of access to and receipt of family planning services with ABRs when controlling for counties’ select covariates. Results. The regression analysis indicated that a higher access rate to Family PACT in a county was associated with a lower ABR (B = −0.19; P < .01) when controlling for unemployment rate, percentage of foreign-born adolescents, and percentage of adult low-income births. Conclusions. Efforts to reduce ABRs, specifically in counties that had persistently high rates are critical to achieving a healthy future for the state and the nation. Family PACT played a crucial role in helping adolescents avoid unintended and early childbearing. PMID:24354841

  9. Academic Patents and Access to Medicines in Developing Countries

    PubMed Central

    2009-01-01

    There is a widespread and growing concern that patents hinder access to life-saving drugs in developing countries. Recent student movements and legislative initiatives emphasize the potential role that research universities in developed countries could have in ameliorating this “access gap.” These efforts are based on the assumption that universities own patents on a substantial number of drugs and that patents on these drugs are currently filed in developing countries. I provide empirical evidence regarding these issues and explore the feasibility and desirability of proposals to change university patenting and licensing practices to promote access to medicines in the developing world. PMID:19008514

  10. A personally controlled electronic health record for Australia

    PubMed Central

    Pearce, Christopher; Bainbridge, Michael

    2014-01-01

    Objective On July 1, 2012 Australia launched a personally controlled electronic health record (PCEHR) designed around the needs of consumers. Using a distributed model and leveraging key component national eHealth infrastructure, the PCEHR is designed to enable sharing of any health information about a patient with them and any other health practitioner involved in their care to whom the patient allows access. This paper discusses the consumer-facing part of the program. Method Design of the system was through stakeholder consultation and the development of detailed requirements, followed by clinical design assurance. Results Patients are able to access any posted information through a web-accessible ‘consumer portal.’ Within the portal they are able to assert access controls on all or part of their record. The portal includes areas for consumers to record their own personal information. Discussion The PCEHR has the potential to transform the ability of patients to actively engage in their own healthcare, and to enable the emerging partnership model of health and healthcare in medicine. The ability to access health information traditionally kept within the closed walls of institutions also raises challenges for the profession, both in the language clinicians choose and the ethical issues raised by the changed roles and responsibilities. Conclusions The PCEHR is aimed at connecting all participants and their interventions, and is intended to become a system-wide activity. PMID:24650635

  11. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    DTIC Science & Technology

    2015-03-01

    a hotel and a hospital. 2. Event handler for emergency policies (item 2 above): this has been implemented in two UG projects, one project developed a...Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia, Brazil , September 2014. Electronic Notes in Theoretical Computer Science (to...Brasilia, Brazil , September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on

  12. An integrated set of UNIX based system tools at control room level

    NASA Astrophysics Data System (ADS)

    Potepan, F.; Scafuri, C.; Bortolotto, C.; Surace, G.

    1994-12-01

    The design effort of providing a simple point-and-click approach to the equipment access has led to the definition and realization of a modular set of software tools to be used at the ELETTRA control room level. Point-to-point equipment access requires neither programming nor specific knowledge of the control system architecture. The development and integration of communication, graphic, editing and global database modules are described in depth, followed by a report of their use in the first commissioning period.

  13. The Role of Guidance, Navigation, and Control in Hypersonic Vehicle Multidisciplinary Design and Optimization

    NASA Technical Reports Server (NTRS)

    Ouzts, Peter J.; Soloway, Donald I.; Moerder, Daniel D.; Wolpert, David H.; Benavides, Jose Victor

    2009-01-01

    Airbreathing hypersonic systems offer distinct performance advantages over rocket-based systems for space access vehicles. However, these performance advantages are dependent upon advances in current state-of-the-art technologies in many areas such as ram/scramjet propulsion integration, high temperature materials, aero-elastic structures, thermal protection systems, transition to hypersonics and hypersonic control elements within the framework of complex physics and new design methods. The complex interactions between elements of an airbreathing hypersonic vehicle represent a new paradigm in vehicle design to achieve the optimal performance necessary to meet space access mission objectives. In the past, guidance, navigation, and control (GNC) analysis often follows completion of the vehicle conceptual design process. Individual component groups design subsystems which are then integrated into a vehicle configuration. GNC is presented the task of developing control approaches to meet vehicle performance objectives given that configuration. This approach may be sufficient for vehicles where significant performance margins exist. However, for higher performance vehicles engaging the GNC discipline too late in the design cycle has been costly. For example, the X-29 experimental flight vehicle was built as a technology demonstrator. One of the many technologies to be demonstrated was the use of light-weight material composites for structural components. The use of light-weight materials increased the flexibility of the X- 29 beyond that of conventional metal alloy constructed aircraft. This effect was not considered when the vehicle control system was designed and built. The impact of this is that the control system did not have enough control authority to compensate for the effects of the first fundamental structural mode of the vehicle. As a result, the resulting pitch rate response of the vehicle was below specification and no post-design changes could recover the desired capability.

  14. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  15. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    NASA Astrophysics Data System (ADS)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  16. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  17. Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363.

    PubMed

    Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao

    2010-11-01

    Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.

  18. Role of the international organisation for animal health (Office International des Epizooties: OIE) in the control of foot and mouth disease.

    PubMed

    Vallat, B

    2002-10-01

    The author describes activities conducted by the International Organisation for Animal Health (OIE: Office International des Epizooties) to control foot and mouth disease (FMD) world-wide. These activities fall within the framework of the principal missions of the OIE. The first of these missions is the collection and dissemination of epidemiological information and of scientific knowledge on animal diseases, the socio-economic or disease implications of which can be particularly serious. The implementation of the measures required to control the disease and to protect countries threatened by FMD depends on the quality and rapidity of the transmission of this information. The co-ordination of studies, research and control programmes against FMD is equally important for the OIE. This work is based, in particular, on work conducted by the OlE foot and mouth disease and other epizootics Commission. OIE Member Countries not only have access to the most recent data on the diagnosis, surveillance and control of FMD but also have recourse to the official recognition procedure for disease-free status provided by this Commission. Finally, through the standardisation of health recommendations, diagnostic tests, manufacture protocols and the control of biological products, made available by the OIE International Animal Health Code Commission in regard to the former and by the OIE Standards Commission in regard to the latter, the OIE provides the reference for international trade in animals and animal products, and is recognised in this role by the World Trade Organization.

  19. Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs

    PubMed Central

    Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin

    2017-01-01

    Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590

  20. A PC-Based Controller for Dextrous Arms

    NASA Technical Reports Server (NTRS)

    Fiorini, Paolo; Seraji, Homayoun; Long, Mark

    1996-01-01

    This paper describes the architecture and performance of a PC-based controller for 7-DOF dextrous manipulators. The computing platform is a 486-based personal computer equipped with a bus extender to access the robot Multibus controller, together with a single board computer as the graphical engine, and with a parallel I/O board to interface with a force-torque sensor mounted on the manipulator wrist.

  1. When Does Model-Based Control Pay Off?

    PubMed Central

    2016-01-01

    Many accounts of decision making and reinforcement learning posit the existence of two distinct systems that control choice: a fast, automatic system and a slow, deliberative system. Recent research formalizes this distinction by mapping these systems to “model-free” and “model-based” strategies in reinforcement learning. Model-free strategies are computationally cheap, but sometimes inaccurate, because action values can be accessed by inspecting a look-up table constructed through trial-and-error. In contrast, model-based strategies compute action values through planning in a causal model of the environment, which is more accurate but also more cognitively demanding. It is assumed that this trade-off between accuracy and computational demand plays an important role in the arbitration between the two strategies, but we show that the hallmark task for dissociating model-free and model-based strategies, as well as several related variants, do not embody such a trade-off. We describe five factors that reduce the effectiveness of the model-based strategy on these tasks by reducing its accuracy in estimating reward outcomes and decreasing the importance of its choices. Based on these observations, we describe a version of the task that formally and empirically obtains an accuracy-demand trade-off between model-free and model-based strategies. Moreover, we show that human participants spontaneously increase their reliance on model-based control on this task, compared to the original paradigm. Our novel task and our computational analyses may prove important in subsequent empirical investigations of how humans balance accuracy and demand. PMID:27564094

  2. Authoring Tools

    NASA Astrophysics Data System (ADS)

    Treviranus, Jutta

    Authoring tools that are accessible and that enable authors to produce accessible Web content play a critical role in web accessibility. Widespread use of authoring tools that comply to the W3C Authoring Tool Accessibility Guidelines (ATAG) would ensure that even authors who are neither knowledgeable about nor particularly motivated to produce accessible content do so by default. The principles and techniques of ATAG are discussed. Some examples of accessible authoring tools are described including authoring tool content management components such as TinyMCE. Considerations for creating an accessible collaborative environment are also covered. As part of providing accessible content, the debate between system-based personal optimization and one universally accessible site configuration is presented. The issues and potential solutions to address the accessibility crisis presented by the advent of rich internet applications are outlined. This challenge must be met to ensure that a large segment of the population is able to participate in the move toward the web as a two-way communication mechanism.

  3. Culture, category salience, and inductive reasoning.

    PubMed

    Choi, I; Nisbett, R E; Smith, E E

    1997-12-01

    The role of category salience in category-based induction was demonstrated in two ways: (i) temporarily increasing category salience facilitated category-based induction, and (ii) this effect was moderated by cultural differences that we predicted would be related to chronic category salience. Subjects for whom categories were presumed to be more accessible (Americans) were not as much influenced by manipulations to increase category salience as subjects who were presumed to have lower chronic accessibility of categories (Koreans). However, as anticipated, this pattern was reversed for inferences about behavioral properties of social categories. Due to the 'interdependent' nature of their culture, Koreans presumably have relatively higher chronic accessibility for social categories than do relatively 'independent' Americans, and hence were not influenced as much by increasing category salience.

  4. A Model for Trust-based Access Control and Delegation in Mobile Clouds (Post Print)

    DTIC Science & Technology

    2013-10-01

    the access-granter knowing the identity of access requester beforehand and authenticating the requester, can no longer be applied. Mobile Wallet Cloud...TktC) for a reservation and con- tacts the user’s mobile wallet provider (MobWC) to purchase the ticket from TktC. For accessing different services...receiving regular services. For example, the human user in our scenario can be an elite member with the mobile wallet service provider that

  5. Confidentiality, electronic health records, and the clinician.

    PubMed

    Graves, Stuart

    2013-01-01

    The advent of electronic health records (EHRs) to improve access and enable research in the everyday clinical world has simultaneously made medical information much more vulnerable to illicit, non-beneficent uses. This wealth of identified, aggregated data has and will attract attacks by domestic governments for surveillance and protection, foreign governments for espionage and sabotage, organized crime for illegal profits, and large corporations for "legal" profits. Against these powers with almost unlimited resources no security scheme is likely to prevail, so the design of such systems should include appropriate security measures. Unlike paper records, where the person maintaining and controlling the existence of the records also controls access to them, these two functions can be separated for EHRs. By giving physical control over access to individual records to their individual owners, the aggregate is dismantled, thereby protecting the nation's identified health information from large-scale data mining or tampering. Control over the existence and integrity of all the records--yet without the ability to examine their contents--would be left with larger institutions. This article discusses the implications of all of the above for the role of the clinician in assuring confidentiality (a cornerstone of clinical practice), for research and everyday practice, and for current security designs.

  6. Designing of smart home automation system based on Raspberry Pi

    NASA Astrophysics Data System (ADS)

    Saini, Ravi Prakash; Singh, Bhanu Pratap; Sharma, Mahesh Kumar; Wattanawisuth, Nattapol; Leeprechanon, Nopbhorn

    2016-03-01

    Locally networked or remotely controlled home automation system becomes a popular paradigm because of the numerous advantages and is suitable for academic research. This paper proposes a method for an implementation of Raspberry Pi based home automation system presented with an android phone access interface. The power consumption profile across the connected load is measured accurately through programming. Users can access the graph of total power consumption with respect to time worldwide using their Dropbox account. An android application has been developed to channelize the monitoring and controlling operation of home appliances remotely. This application facilitates controlling of operating pins of Raspberry Pi by pressing the corresponding key for turning "on" and "off" of any desired appliance. Systems can range from the simple room lighting control to smart microcontroller based hybrid systems incorporating several other additional features. Smart home automation systems are being adopted to achieve flexibility, scalability, security in the sense of data protection through the cloud-based data storage protocol, reliability, energy efficiency, etc.

  7. Designing of smart home automation system based on Raspberry Pi

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saini, Ravi Prakash; Singh, Bhanu Pratap; Sharma, Mahesh Kumar

    Locally networked or remotely controlled home automation system becomes a popular paradigm because of the numerous advantages and is suitable for academic research. This paper proposes a method for an implementation of Raspberry Pi based home automation system presented with an android phone access interface. The power consumption profile across the connected load is measured accurately through programming. Users can access the graph of total power consumption with respect to time worldwide using their Dropbox account. An android application has been developed to channelize the monitoring and controlling operation of home appliances remotely. This application facilitates controlling of operating pinsmore » of Raspberry Pi by pressing the corresponding key for turning “on” and “off” of any desired appliance. Systems can range from the simple room lighting control to smart microcontroller based hybrid systems incorporating several other additional features. Smart home automation systems are being adopted to achieve flexibility, scalability, security in the sense of data protection through the cloud-based data storage protocol, reliability, energy efficiency, etc.« less

  8. Differential Responses of Vanilla Accessions to Root Rot and Colonization by Fusarium oxysporum f. sp. radicis-vanillae.

    PubMed

    Koyyappurath, Sayuj; Conéjéro, Geneviève; Dijoux, Jean Bernard; Lapeyre-Montès, Fabienne; Jade, Katia; Chiroleu, Frédéric; Gatineau, Frédéric; Verdeil, Jean Luc; Besse, Pascale; Grisoni, Michel

    2015-01-01

    Root and stem rot (RSR) disease caused by Fusarium oxysporum f. sp. radicis-vanillae (Forv) is the most damaging disease of vanilla (Vanilla planifolia and V. × tahitensis, Orchidaceae). Breeding programs aimed at developing resistant vanilla varieties are hampered by the scarcity of sources of resistance to RSR and insufficient knowledge about the histopathology of Forv. In this work we have (i) identified new genetic resources resistant to RSR including V. planifolia inbreds and vanilla relatives, (ii) thoroughly described the colonization pattern of Forv into selected vanilla accessions, confirming its necrotic non-vascular behavior in roots, and (iii) evidenced the key role played by hypodermis, and particularly lignin deposition onto hypodermal cell walls, for resistance to Forv in two highly resistant vanilla accessions. Two hundred and fifty-four vanilla accessions were evaluated in the field under natural conditions of infection and in controlled conditions using in vitro plants root-dip inoculated by the highly pathogenic isolate Fo072. For the 26 accessions evaluated in both conditions, a high correlation was observed between field evaluation and in vitro assay. The root infection process and plant response of one susceptible and two resistant accessions challenged with Fo072 were studied using wide field and multiphoton microscopy. In susceptible V. planifolia, hyphae penetrated directly into the rhizodermis in the hairy root region then invaded the cortex through the passage cells where it induced plasmolysis, but never reached the vascular region. In the case of the resistant accessions, the penetration was stopped at the hypodermal layer. Anatomical and histochemical observations coupled with spectral analysis of the hypodermis suggested the role of lignin deposition in the resistance to Forv. The thickness of lignin constitutively deposited onto outer cell walls of hypodermis was highly correlated with the level of resistance for 21 accessions tested. The accumulation of p-coumaric and sinapic acids, two phenolic precursors of lignin, was observed in the resistant plants inoculated with Fo072, but not in the susceptible one. Altogether, our analyses enlightened the mechanisms at work in RSR resistant genotypes and should enhance the development of novel breeding strategies aimed at improving the genetic control of RSR of vanilla.

  9. Government, Coercive Power and the Perceived Legitimacy of Canadian Post-Secondary Institutions

    ERIC Educational Resources Information Center

    McQuarrie, Fiona A. E.; Kondra, Alex Z.; Lamertz, Kai

    2013-01-01

    Governments regulate and control organizations, yet their role in determining organizational legitimacy is largely unexamined. In the changing Canadian post-secondary landscape, legitimacy is an increasingly important issue for post-secondary institutions as they compete amongst themselves for access to ever-shrinking resources. Using an…

  10. Asia's Four Little Tigers: A Comparison of the Role of Education in Their Development.

    ERIC Educational Resources Information Center

    Morris, Paul

    1996-01-01

    In four rapidly developing east Asian nations, educational similarities include strong national curricula and highly competitive selective systems. However, the countries differ in educational funding sources; access to education, particularly tertiary education; extent of state control; relative emphasis on general and technical education; nature…

  11. Commentary

    ERIC Educational Resources Information Center

    Heller, Monica

    2014-01-01

    The subject of multilingualism in institutions has long been a central interest in sociolinguistics, and it is worth asking why. The answer lies in the role of institutions in the modern nation state, a point made over and over again by Michel Foucault. Institutions control access to all the resources a state can distribute; it distributes them…

  12. Building v/s Exploring Models: Comparing Learning of Evolutionary Processes through Agent-based Modeling

    NASA Astrophysics Data System (ADS)

    Wagh, Aditi

    Two strands of work motivate the three studies in this dissertation. Evolutionary change can be viewed as a computational complex system in which a small set of rules operating at the individual level result in different population level outcomes under different conditions. Extensive research has documented students' difficulties with learning about evolutionary change (Rosengren et al., 2012), particularly in terms of levels slippage (Wilensky & Resnick, 1999). Second, though building and using computational models is becoming increasingly common in K-12 science education, we know little about how these two modalities compare. This dissertation adopts agent-based modeling as a representational system to compare these modalities in the conceptual context of micro-evolutionary processes. Drawing on interviews, Study 1 examines middle-school students' productive ways of reasoning about micro-evolutionary processes to find that the specific framing of traits plays a key role in whether slippage explanations are cued. Study 2, which was conducted in 2 schools with about 150 students, forms the crux of the dissertation. It compares learning processes and outcomes when students build their own models or explore a pre-built model. Analysis of Camtasia videos of student pairs reveals that builders' and explorers' ways of accessing rules, and sense-making of observed trends are of a different character. Builders notice rules through available blocks-based primitives, often bypassing their enactment while explorers attend to rules primarily through the enactment. Moreover, builders' sense-making of observed trends is more rule-driven while explorers' is more enactment-driven. Pre and posttests reveal that builders manifest a greater facility with accessing rules, providing explanations manifesting targeted assembly. Explorers use rules to construct explanations manifesting non-targeted assembly. Interviews reveal varying degrees of shifts away from slippage in both modalities, with students who built models not incorporating slippage explanations in responses. Study 3 compares these modalities with a control using traditional activities. Pre and posttests reveal that the two modalities manifested greater facility with accessing and assembling rules than the control. The dissertation offers implications for the design of learning environments for evolutionary change, design of the two modalities based on their strengths and weaknesses, and teacher training for the same.

  13. A systematic review of the role of school-based healthcare in adolescent sexual, reproductive, and mental health

    PubMed Central

    2012-01-01

    Background Accessible sexual, reproductive, and mental healthcare services are crucial for adolescent health and wellbeing. It has been reported that school-based healthcare (SBHC) has the potential to improve the availability of services particularly for young people who are normally underserved. Locating health services in schools has the potential to reduce transport costs, increase accessibility and provide links between schools and communities. Methods A systematic review of the literature was undertaken. Pubmed, Psychinfo, Psychnet, Cochrane CENTRAL, and Web of Science were searched for English language papers published between January 1990 and March 2012 Results Twenty-seven studies were found which fitted the criteria, of which, all but one were from North America. Only three measured adolescent sexual, reproductive, or mental health outcomes related to SBHC and none of the studies were randomized controlled trials. The remaining studies explored accessibility of services and clinic utilization or described pertinent contextual factors. Conclusions There is a paucity of high quality research which evaluates SBHC and its effects on adolescent sexual, reproductive, and mental health. However, there is evidence that SBHC is popular with young people, and provides important mental and reproductive health services. Services also appear to have cost benefits in terms of adolescent health and society as a whole by reducing health disparities and attendance at secondary care facilities. However, clearer definitions of what constitutes SBHC and more high quality research is urgently needed. PMID:23098138

  14. Evaluation of Standards for Access Control Enabling PHR-S Federation.

    PubMed

    Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan

    2017-01-01

    The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.

  15. The Role and Implications of the Internet in Healthcare Delivery

    NASA Astrophysics Data System (ADS)

    Broom, Alex

    Drawing on a study of the Internet usage of Australian men with prostate cancer, this chapter investigates how access to information and online support affects men’s experiences of disease and, in particular, the possible implications of Internet-informed patients for the doctor/patient relationship. The data reveal that accessing information and/or support online can have a profound effect on men’s experiences of prostate cancer, providing a method of taking some control over their disease and limiting inhibitions experienced in face-to-face encounters. However, it is also clear that some medical specialists view Internet-informed patients as a challenge to their power within medical encounters and, as a result, employ disciplinary strategies that reinforce traditional patient roles and alienate patients who use the Internet.

  16. Data visualisation in surveillance for injury prevention and control: conceptual bases and case studies

    PubMed Central

    Martinez, Ramon; Ordunez, Pedro; Soliz, Patricia N; Ballesteros, Michael F

    2016-01-01

    Background The complexity of current injury-related health issues demands the usage of diverse and massive data sets for comprehensive analyses, and application of novel methods to communicate data effectively to the public health community, decision-makers and the public. Recent advances in information visualisation, availability of new visual analytic methods and tools, and progress on information technology provide an opportunity for shaping the next generation of injury surveillance. Objective To introduce data visualisation conceptual bases, and propose a visual analytic and visualisation platform in public health surveillance for injury prevention and control. Methods The paper introduces data visualisation conceptual bases, describes a visual analytic and visualisation platform, and presents two real-world case studies illustrating their application in public health surveillance for injury prevention and control. Results Application of visual analytic and visualisation platform is presented as solution for improved access to heterogeneous data sources, enhance data exploration and analysis, communicate data effectively, and support decision-making. Conclusions Applications of data visualisation concepts and visual analytic platform could play a key role to shape the next generation of injury surveillance. Visual analytic and visualisation platform could improve data use, the analytic capacity, and ability to effectively communicate findings and key messages. The public health surveillance community is encouraged to identify opportunities to develop and expand its use in injury prevention and control. PMID:26728006

  17. Patient choice, Internet based information sources, and perceptions of health care: Evidence from Sweden using survey data from 2010 and 2013.

    PubMed

    Wahlstedt, Emma; Ekman, Björn

    2016-08-01

    Several countries have increased patients' abilities to choose their health care providers, frequently under the assumption that patients are themselves the best agents to make such decisions. In parallel, national and regional health authorities have enhanced access to Internet based information sources (IBIS) to assist patients in making an informed choice. Relatively little, however, is known about the effect that the use of such sources has on key outcomes, including patients' perceptions of care. The aim of this study is to analyze the role of the Internet for patients' confidence in the provider and perceived access to care in the context of choice based reforms in Sweden. The study uses a regional, population health survey from the southern part of Sweden. Non-parametric chi-square tests are used to assess the nature of Internet users, including their gender, age and socioeconomic status. Logistic regression models are specified to analyze the role of IBIS on patient perceptions of care while controlling for other factors. Actual use of Internet based information sources for health care was relatively low in 2010 and only somewhat higher in 2013. The characteristics of IBIS users varied significantly across different population groups, such that they were younger, more educated, female, and also considered themselves to be in better health compared with those who reported not using this source of health care information. Finally, the average IBIS user was less likely to report having a high level of satisfaction with respect to their primary care use; OR 0.69 [95 % CI: 0.54-0,87] and OR 0.52 [95 % CI: 0,41-0,66], for confidence in provider and perceived access to care, respectively, in 2013. Despite health agencies' attempts to make information on health care providers available on the Internet, this source of health care information is not used to any large extent in the current sample. The fact that some people use this source of information more compared with others suggests the need to consider alternative ways of informing the general public about choice options. The use of Internet based sources may also be linked with the experience of actually using health services, which suggests a need to further analyze this complex consumer behavior process.

  18. Community-based interventions for enhancing access to or consumption of fruit and vegetables among five to 18-year olds: a scoping review

    PubMed Central

    2012-01-01

    Background Low fruit and vegetable ( FV) consumption is a key risk factor for morbidity and mortality. Consumption of FV is limited by a lack of access to FV. Enhanced understanding of interventions and their impact on both access to and consumption of FV can provide guidance to public health decision-makers. The purpose of this scoping review is to identify and map literature that has evaluated effects of community-based interventions designed to increase FV access or consumption among five to 18-year olds. Methods The search included 21 electronic bibliographic databases, grey literature, targeted organization websites, and 15 key journals for relevant studies published up to May 2011. Retrieved citations were screened in duplicate for relevance. Data extracted from included studies covered: year, country, study design, target audience, intervention setting, intervention strategies, interventionists, and reported outcomes. Results The search located 19,607 unique citations. Full text relevance screening was conducted on 1,908 studies. The final 289 unique studies included 30 knowledge syntheses, 27 randomized controlled trials, 55 quasi-experimental studies, 113 cluster controlled studies, 60 before-after studies, one mixed method study, and three controlled time series studies. Of these studies, 46 included access outcomes and 278 included consumption outcomes. In terms of target population, 110 studies focused on five to seven year olds, 175 targeted eight to 10 year olds, 192 targeted 11 to 14 year olds, 73 targeted 15 to 18 year olds, 55 targeted parents, and 30 targeted teachers, other service providers, or the general public. The most common intervention locations included schools, communities or community centres, and homes. Most studies implemented multi-faceted intervention strategies to increase FV access or consumption. Conclusions While consumption measures were commonly reported, this review identified a small yet important subset of literature examining access to FV. This is a critically important issue since consumption is contingent upon access. Future research should examine the impact of interventions on direct outcome measures of FV access and a focused systematic review that examines these interventions is also needed. In addition, research on interventions in low- and middle-income countries is warranted based on a limited existing knowledge base. PMID:22931474

  19. Rethinking unmet need: Determinants of contraceptive use in Santiago, the Dominican Republic.

    PubMed

    DeGette, R Lipinsky; Jennings, A; Goyal, V

    2015-04-01

    Inadequate access to contraceptives is often considered the primary source of unmet need among women who desire to prevent pregnancy. This study evaluates two potential determinants of contraceptive use among Dominican women: (1) perceived access to family planning and (2) perceived personal reproductive control, a measure based in psychological theories of locus of control. Sexually active women aged 18-45 who did not desire fertility were surveyed to assess influences on contraceptive use. In-depth interviews were conducted among a subset of participants to contextualise survey results. Fewer than half (49%) of the 80 survey respondents had used contraception in the last 3 months. Higher personal reproductive control was significantly related to contraceptive use (aOR 1.18, 95% CI 1.04-1.34), however, higher perceived access to contraceptives was not (aOR 1.09, 95% CI 0.97-1.23). Male partner influence was identified as a barrier to contraceptive use. In this population, high personal reproductive control is a better predictor of contraceptive use than perceived access.

  20. Separation control in a hypersonic shock wave / turbulent boundary-layer interaction

    NASA Astrophysics Data System (ADS)

    Schreyer, Anne-Marie; Bermejo-Moreno, Ivan; Kim, Jeonglae; Urzay, Javier

    2016-11-01

    Hypersonic vehicles play a key role for affordable access to space. The associated flow fields are strongly affected by shock wave/turbulent boundary-layer interactions, and the inherent separation causes flow distortion and low-frequency unsteadiness. Microramp sub-boundary layer vortex generators are a promising means to control separation and diminish associated detrimental effects. We investigate the effect of a microramp on the low-frequency unsteadiness in a fully separated interaction. A large eddy simulation of a 33 ∘ -compression-ramp interaction was performed for an inflow Mach number of 7.2 and a Reynolds number based on momentum thickness of Reθ = 3500 , matching the experiment of Schreyer et al. (2011). For the control case, we introduced a counter-rotating vortex pair, as induced by a single microramp, into the boundary layer through the inflow conditions. We applied a dynamic mode decomposition (DMD) on both cases to identify coherent structures that are responsible for the dynamic behavior. Based on the DMD, we discuss the reduction of the separation zone and the stabilization of the shock motion achieved by the microramp, and contribute to the description of the governing mechanisms. Pursued during the 2016 CTR Summer Program at Stanford University.

  1. Is religion the forgotten variable in maternal and child health? Evidence from Zimbabwe.

    PubMed

    Ha, Wei; Salama, Peter; Gwavuya, Stanley; Kanjala, Chifundo

    2014-10-01

    The Apostolic faith, a rapidly growing and increasingly influential force in Zimbabwe, has received attention in the literature due to its potential role in shaping its followers' attitudes and behaviours towards health. Existing literature, however, has only examined small cross-section samples from a few confined survey sites or has failed to adequately control for the many factors that may mediate the effects of religion. This paper examines the effects of the Apostolic faith on the usage of maternal health and child immunization services in Zimbabwe. It is based on a nationally representative sample from the 2009 Multi-Indicator Monitoring Survey and employs the established Andersen model on access to health services. Well controlled multivariate logit regression models derived from these data show that an affiliation with the Apostolic faith is a substantial and significant risk factor in reducing the utilization of both maternal and child health services. Moreover, even when the services were least costly and readily available and when gaps along other social and economic factors were limited, as in the case of Bacillus Calmette-Guérin vaccination and one visit to antenatal care, women and children from Apostolic faith families still fared significantly worse than others in accessing them. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Gastroenterology-urology devices; reclassification of implanted blood access devices. Final rule.

    PubMed

    2014-07-25

    The Food and Drug Administration (FDA) is issuing a final order to reclassify implanted blood access devices, a preamendments class III device, into class II (special controls) based on new information and subject to premarket notification and to further clarify the identification.

  3. Access Control for Mobile Assessment Systems Using ID.

    PubMed

    Nakayama, Masaharu; Ishii, Tadashi; Morino, Kazuma

    2015-01-01

    The assessment of shelters during disaster is critical to ensure the health of evacuees and prevent pandemic. In the Ishinomaki area, one of the areas most damaged by the Great East Japan Earthquake, the highly organized assessment helped to successfully manage a total of 328 shelters with a total of 46,480 evacuees. The input and analysis of vast amounts of data was tedious work for staff members. However, a web-based assessment system that utilized mobile devices was thought to decrease workload and standardize the evaluation form. The necessary access of information should be controlled in order to maintain individuals' privacy. We successfully developed an access control system using IDs. By utilizing a unique numerical ID, users can access the input form or assessment table. This avoids unnecessary queries to the server, resulting in a quick response and easy availability, even with poor internet connection.

  4. Investigating the Extent to Which Patients Should Control Access to Patient Records for Research: A Deliberative Process Using Citizens’ Juries

    PubMed Central

    Bozentko, Kyle; Clement, Sarah; Hunn, Amanda; Hassan, Lamiece; Norris, Ruth; Oswald, Malcolm; Peek, Niels

    2018-01-01

    Background The secondary use of health data for research raises complex questions of privacy and governance. Such questions are ill-suited to opinion polling where citizens must choose quickly between multiple-choice answers based on little information. Objective The aim of this project was to extend knowledge about what control informed citizens would seek over the use of health records for research after participating in a deliberative process using citizens’ juries. Methods Two 3-day citizens’ juries, of 17 citizens each, were convened to reflect UK national demographics from 355 eligible applicants. Each jury addressed the mission “To what extent should patients control access to patient records for secondary use?” Jurors heard from and questioned 5 expert witnesses (chosen either to inform the jury, or to argue for and against the secondary use of data), interspersed with structured opportunities to deliberate among themselves, including discussion and role-play. Jurors voted on a series of questions associated with the jury mission, giving their rationale. Individual views were polled using questionnaires at the beginning and at end of the process. Results At the end of the process, 33 out of 34 jurors voted in support of the secondary use of data for research, with 24 wanting individuals to be able to opt out, 6 favoring opt in, and 3 voting that all records should be available without any consent process. When considering who should get access to data, both juries had very similar rationales. Both thought that public benefit was a key justification for access. Jury 1 was more strongly supportive of sharing patient records for public benefit, whereas jury 2 was more cautious and sought to give patients more control. Many jurors changed their opinion about who should get access to health records: 17 people became more willing to support wider information sharing of health data for public benefit, whereas 2 moved toward more patient control over patient records. Conclusions The findings highlight that, when informed of both risks and opportunities associated with data sharing, citizens believe an individual’s right to privacy should not prevent research that can benefit the general public. The juries also concluded that patients should be notified of any such scheme and have the right to opt out if they so choose. Many jurors changed their minds about this complex policy question when they became more informed. Many, but not all, jurors became less skeptical about health data sharing, as they became better informed of its benefits and risks. PMID:29592847

  5. How primary health care staff working in rural and remote areas access skill development and expertise to support health promotion practice.

    PubMed

    McFarlane, Kathryn A; Judd, Jenni; Wapau, Hylda; Nichols, Nina; Watt, Kerrianne; Devine, Sue

    2018-05-01

    Health promotion is a key component of comprehensive primary health care. Health promotion approaches complement healthcare management by enabling individuals to increase control over their health. Many primary healthcare staff have a role to play in health promotion practice, but their ability to integrate health promotion into practice is influenced by their previous training and experience. For primary healthcare staff working in rural and remote locations, access to professional development can be limited by what is locally available and prohibitive in terms of cost for travel and accommodation. This study provides insight into how staff at a large north Queensland Aboriginal community controlled health service access skill development and health promotion expertise to support their work. A qualitative exploratory study was conducted. Small group and individual semi-structured interviews were conducted with staff at Apunipima Cape York Health Council (n=9). A purposive sampling method was used to recruit participants from a number of primary healthcare teams that were more likely to be involved in health promotion work. Both on-the-ground staff and managers were interviewed. All participants were asked how they access skill development and expertise in health promotion practice and what approaches they prefer for ongoing health promotion support. The interviews were transcribed verbatim and analysed thematically. All participants valued access to skill development, advice and support that would assist their health promotion practice. Skill development and expertise in health promotion was accessed from a variety of sources: conferences, workshops, mentoring or shared learning from internal and external colleagues, and access to online information and resources. With limited funds and limited access to professional development locally, participants fostered external and internal organisational relationships to seek in-kind advice and support. Irrespective of where the advice came from, it needed to be applicable to work with Aboriginal and Torres Strait Islander remote communities. To improve health outcomes in rural and remote communities, the focus on health promotion and prevention approaches must be strengthened. Primary healthcare staff require ongoing access to health promotion skill development and expertise to increase their capacity to deliver comprehensive primary health care. Practice-based evidence from staff working in the field provides a greater understanding of how skill development and advice are accessed. Many of these strategies can be formalised through organisational plans and systems, which would ensure that a skilled health promotion workforce is sustained.

  6. The Role of Health Systems Factors in Facilitating Access to Psychotropic Medicines: A Cross-Sectional Analysis of the WHO-AIMS in 63 Low- and Middle-Income Countries

    PubMed Central

    McBain, Ryan; Norton, Daniel J.; Morris, Jodi; Yasamy, M. Taghi; Betancourt, Theresa S.

    2012-01-01

    Background Neuropsychiatric conditions comprise 14% of the global burden of disease and 30% of all noncommunicable disease. Despite the existence of cost-effective interventions, including administration of psychotropic medicines, the number of persons who remain untreated is as high as 85% in low- and middle-income countries (LAMICs). While access to psychotropic medicines varies substantially across countries, no studies to date have empirically investigated potential health systems factors underlying this issue. Methods and Findings This study uses a cross-sectional sample of 63 LAMICs and country regions to identify key health systems components associated with access to psychotropic medicines. Data from countries that completed the World Health Organization Assessment Instrument for Mental Health Systems (WHO-AIMS) were included in multiple regression analyses to investigate the role of five major mental health systems domains in shaping medicine availability and affordability. These domains are: mental health legislation, human rights implementations, mental health care financing, human resources, and the role of advocacy groups. Availability of psychotropic medicines was associated with features of all five mental health systems domains. Most notably, within the domain of mental health legislation, a comprehensive national mental health plan was associated with 15% greater availability; and in terms of advocacy groups, the participation of family-based organizations in the development of mental health legislation was associated with 17% greater availability. Only three measures were related with affordability of medicines to consumers: level of human resources, percentage of countries' health budget dedicated to mental health, and availability of mental health care in prisons. Controlling for country development, as measured by the Human Development Index, health systems features were associated with medicine availability but not affordability. Conclusions Results suggest that strengthening particular facets of mental health systems might improve availability of psychotropic medicines and that overall country development is associated with affordability. Please see later in the article for the Editors' Summary PMID:22303288

  7. Epigenome data release: a participant-centered approach to privacy protection.

    PubMed

    Dyke, Stephanie O M; Cheung, Warren A; Joly, Yann; Ammerpohl, Ole; Lutsik, Pavlo; Rothstein, Mark A; Caron, Maxime; Busche, Stephan; Bourque, Guillaume; Rönnblom, Lars; Flicek, Paul; Beck, Stephan; Hirst, Martin; Stunnenberg, Henk; Siebert, Reiner; Walter, Jörn; Pastinen, Tomi

    2015-07-17

    Large-scale epigenome mapping by the NIH Roadmap Epigenomics Project, the ENCODE Consortium and the International Human Epigenome Consortium (IHEC) produces genome-wide DNA methylation data at one base-pair resolution. We examine how such data can be made open-access while balancing appropriate interpretation and genomic privacy. We propose guidelines for data release that both reduce ambiguity in the interpretation of open-access data and limit immediate access to genetic variation data that are made available through controlled access.

  8. 47 CFR 90.475 - Operation of internal transmitter control systems in specially equipped systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... systems involving fixed systems whose base stations are controlled by such systems may automatically access these base stations through the microwave or operational fixed systems from positions in the PSTN, so long as the base stations and mobile units meet the requirements of § 90.483 and if a separate...

  9. eEduHeart I: A Multicenter, Randomized, Controlled Trial Investigating the Effectiveness of a Cardiac Web-Based eLearning Platform - Rationale and Study Design.

    PubMed

    Frederix, Ines; Vandenberk, Thijs; Janssen, Leen; Geurden, Anne; Vandervoort, Pieter; Dendale, Paul

    Cardiac telerehabilitation includes, in its most comprehensive format, telemonitoring, telecoaching, social interaction, and eLearning. The specific role of eLearning, however, was seldom assessed. The aim of eEduHeart I is to investigate the medium-term effectiveness of the addition of a cardiac web-based eLearing platform to conventional cardiac care. In this prospective, multicenter randomized, controlled trial, 1,000 patients with coronary artery disease will be randomized 1:1 to an intervention group (receiving 1-month unrestricted access to the cardiac eLearning platform in addition to conventional cardiac care) or to conventional cardiac care alone. The primary endpoint is health-related quality of life, assessed by the HeartQoL questionnaire at the 1- and 3-month follow-ups. Secondary endpoints include pathology-specific knowledge and self-reported eLearning platform user experience. Data on the eLearning platform usage will be gathered through web logging during the study period. eEduHeart I will be one of the first studies to report on the added value of eLearning. If the intervention is proven effective, current cardiac telerehabilitation programs can be augmented by including eLearning, too. The platform can then be used as a model for other chronic diseases in which patient education plays a key role. © 2016 S. Karger AG, Basel.

  10. Insight: An ontology-based integrated database and analysis platform for epilepsy self-management research.

    PubMed

    Sahoo, Satya S; Ramesh, Priya; Welter, Elisabeth; Bukach, Ashley; Valdez, Joshua; Tatsuoka, Curtis; Bamps, Yvan; Stoll, Shelley; Jobst, Barbara C; Sajatovic, Martha

    2016-10-01

    We present Insight as an integrated database and analysis platform for epilepsy self-management research as part of the national Managing Epilepsy Well Network. Insight is the only available informatics platform for accessing and analyzing integrated data from multiple epilepsy self-management research studies with several new data management features and user-friendly functionalities. The features of Insight include, (1) use of Common Data Elements defined by members of the research community and an epilepsy domain ontology for data integration and querying, (2) visualization tools to support real time exploration of data distribution across research studies, and (3) an interactive visual query interface for provenance-enabled research cohort identification. The Insight platform contains data from five completed epilepsy self-management research studies covering various categories of data, including depression, quality of life, seizure frequency, and socioeconomic information. The data represents over 400 participants with 7552 data points. The Insight data exploration and cohort identification query interface has been developed using Ruby on Rails Web technology and open source Web Ontology Language Application Programming Interface to support ontology-based reasoning. We have developed an efficient ontology management module that automatically updates the ontology mappings each time a new version of the Epilepsy and Seizure Ontology is released. The Insight platform features a Role-based Access Control module to authenticate and effectively manage user access to different research studies. User access to Insight is managed by the Managing Epilepsy Well Network database steering committee consisting of representatives of all current collaborating centers of the Managing Epilepsy Well Network. New research studies are being continuously added to the Insight database and the size as well as the unique coverage of the dataset allows investigators to conduct aggregate data analysis that will inform the next generation of epilepsy self-management studies. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Ethical Issues for Control-Arm Patients After Revelation of Benefits of Experimental Therapy: A Framework Modeled in Neuroblastoma

    PubMed Central

    Unguru, Yoram; Joffe, Steven; Fernandez, Conrad V.; Yu, Alice L.

    2013-01-01

    In 2009, the Children's Oncology Group (COG) phase III randomized controlled trial, ANBL0032, found that adding immunotherapy (Ch14.18) to standard therapy significantly improved outcomes in patients with high-risk neuroblastoma when administered within 110 days after autologous stem-cell transplantation (SCT). After careful deliberation and consultation, the COG Neuroblastoma Committee decided to offer Ch14.18 to prior trial participants who had been randomly assigned to the control arm (no immunotherapy), regardless of the time that had elapsed since SCT. This decision occurred in the context of a limited supply of Ch14.18 and no data regarding its role when administered beyond 110 days. In this article, we analyze the numerous ethical challenges highlighted by the ANBL0032 trial, including the limits of researchers' reciprocity-based obligations to study participants, post-trial access to beneficial therapies, and the balance between scientific knowledge and parental hope. These deliberations may be useful to other researchers when considering their ethical obligations to control-arm participants in the wake of a positive randomized trial. PMID:23295797

  12. Reducing the distance: equity issues in distance learning in public education

    NASA Astrophysics Data System (ADS)

    Campbell, Patricia B.; Storo, Jennifer

    1996-12-01

    Distance learning and educational equity both began with an emphasis on access, on providing underserved students with an increased access to education. Today definitions of equity have gone beyond simple access to include equal or equivalent treatment and outcomes while definitions of underserved students have expanded to include girls, children of color, children with limited English proficiency and children with disabilities. At the same time the definition of distance learning has expanded to include new technologies, new audiences and new roles. Based on these new definitions and roles, the article raises a number of equity challenges for distance learning educators centering around who is taught, what is taught and how the teaching is done. To answer these challenges, a series of recommendations are suggested that educators can implement to make distance learning a leader in increasing educational equity for all students. The time to act is now.

  13. Urban search mobile platform modeling in hindered access conditions

    NASA Astrophysics Data System (ADS)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  14. Online CBT life skills programme for low mood and anxiety: study protocol for a pilot randomized controlled trial.

    PubMed

    Williams, Christopher; McClay, Carrie-Anne; Martinez, Rebeca; Morrison, Jill; Haig, Caroline; Jones, Ray; Farrand, Paul

    2016-04-27

    Low mood is a common mental health problem with significant health consequences. Studies have shown that cognitive behavioural therapy (CBT) is an effective treatment for low mood and anxiety when delivered one-to-one by an expert practitioner. However, access to this talking therapy is often limited and waiting lists can be long, although a range of low-intensity interventions that can increase access to services are available. These include guided self-help materials delivered via books, classes and online packages. This project aims to pilot a randomized controlled trial of an online CBT-based life skills course with community-based individuals experiencing low mood and anxiety. Individuals with elevated symptoms of depression will be recruited directly from the community via online and newspaper advertisements. Participants will be remotely randomized to receive either immediate access or delayed access to the Living Life to the Full guided online CBT-based life skills package, with telephone or email support provided whilst they use the online intervention. The primary end point will be at 3 months post-randomization, at which point the delayed-access group will be offered the intervention. Levels of depression, anxiety, social functioning and satisfaction will be assessed. This pilot study will test the trial design, and ability to recruit and deliver the intervention. Drop-out rates will be assessed and the completion and acceptability of the package will be investigated. The study will also inform a sample size power calculation for a subsequent substantive randomized controlled trial. ISRCTN ISRCTN12890709.

  15. RFID - based Staff Control System (SCS) in Kazakhstan

    NASA Astrophysics Data System (ADS)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  16. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    PubMed

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  17. The role of occupational participation and environment among Icelandic women with breast cancer: a qualitative study.

    PubMed

    Palmadottir, Gudrun

    2010-12-01

    Breast cancer diagnosis generally causes a disruption of occupational life. The purpose of this study was to explore the role of occupational participation and environment in the perception of health and well-being of Icelandic women with breast cancer. Eighteen women were interviewed using the main areas from the Occupational Performance History Interview as a guideline. An inductive analysis revealed seven categories that were organized under two main headings: occupational participation and environment. The categories were labelled "maintaining control and stability", "experiencing sense of self-worth", "enhancing self development", "access to information", "support and care", "refuge in community", and "rehabilitative opportunities". Through occupational participation the women were able to regain control of life and a sense of competence and development. Information, emotional support, safety, and stimulating environments were crucial in alleviating distress and facilitate satisfactory coping with the cancer experience. The results support that occupational participation in a safe and supportive environment has powerful restorative properties. Rehabilitative and supportive services should be based on a holistic perspective and emphasize the healthy aspects of a women's life. Furthermore, occupational therapists need to widen their approach when working with women with breast cancer and focus on their needs as occupational beings.

  18. Thine Own Self: True Self-Concept Accessibility and Meaning in Life

    PubMed Central

    Schlegel, Rebecca J.; Hicks, Joshua A.; Arndt, Jamie; King, Laura A.

    2016-01-01

    A number of philosophical and psychological theories suggest the true self is an important contributor to well-being. The present research examined whether the cognitive accessibility of the true self-concept would predict the experience of meaning in life. To ensure that any observed effects were due to the true self-concept rather than the self-concept more generally, we utilized actual self-concept accessibility as a control variable in all studies. True and actual self-concepts were defined as including those traits which are enacted around close others versus most others (Studies 1 through 3) or as traits that refer to “who you really are” vs. “who you are during most of your activities” (Studies 4 and 5), respectively. Studies 1 and 2 showed that individual differences in true self-concept accessibility, but not differences in actual self-concept accessibility, predicted meaning in life. Study 3 showed that priming traits related to the true self led to enhanced meaning in life. Studies 4 and 5 provided correlational and experimental support for the role of true self-concept accessibility in meaning in life, even when traits were defined without reference to social relationships and when state self-esteem and self-reported authenticity were controlled. Implications for the study of the true self-concept and authenticity are discussed. PMID:19159144

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, Cynthia Lee

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allowmore » special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal concept.« less

  20. Implementing PEHR: Design and Integration of a Consent Creator Service.

    PubMed

    Weiss, Nicolas; Aguduri, Lakshmi S; Yüksekogul, Nilay; Schreiweis, Björn; Brandner, Antje; Bronsch, Tobias; Pensold, Peter; Stein, Katharina E; Bergh, Björn; Heinze, Oliver

    2016-01-01

    Giving the patient full control over his medical data electronically remains one of the most discussed topics in healthcare today. The INFOPAT project in the Rhine-Neckar region focuses on a personal cross-enterprise electronic health record (PEHR) in which the patient plays a major role. Thus, he should be provided with the possibility of granting access to his medical data which could be realized using a consent creator service. This paper presents a user interface concept for such a service as well as aspects for the technical implementation. In addition, a pattern for integrating the service into an existing IHE based infrastructure is shown. These concepts could be further adapted for improving patient empowerment in health care projects.

  1. Effects of acute gamma irradiation on physiological traits and flavonoid accumulation of Centella asiatica.

    PubMed

    Moghaddam, Sina Siavash; Jaafar, Hawa; Ibrahim, Rusli; Rahmat, Asmah; Aziz, Maheran Abdul; Philip, Elizabeth

    2011-06-17

    In the present study, two accessions of Centella asiatica (CA03 and CA23) were subjected to gamma radiation to examine the response of these accessions in terms of survival rate, flavonoid contents, leaf gas exchange and leaf mass. Radiation Sensitivity Tests revealed that based on the survival rate, the LD(50) (gamma doses that killed 50% of the plantlets) of the plantlets were achieved at 60 Gy for CA03 and 40 Gy for CA23. The nodal segments were irradiated with gamma rays at does of 30 and 40 Gy for Centella asiatica accession 'CA03' and 20 and 30 Gy for accession 'CA23. The nodal segment response to the radiation was evaluated by recording the flavonoid content, leaf gas exchange and leaf biomass. The experiment was designed as RCBD with five replications. Results demonstrated that the irradiated plantlets exhibited greater total flavonoid contents (in eight weeks) significantly than the control where the control also exhibited the highest total flavonoid contents in the sixth week of growth; 2.64 ± 0.02 mg/g DW in CA03 and 8.94 ± 0.04 mg/g DW in CA23. The total flavonoid content was found to be highest after eight weeks of growth, and this, accordingly, stands as the best time for leaf harvest. Biochemical differentiation based on total flavonoid content revealed that irradiated plantlets in CA23 at 20 and 30 Gy after eight weeks contained the highest total flavonoid concentrations (16.827 ± 0.02; 16.837 ± 0.008 mg/g DW, respectively) whereas in CA03 exposed to 30 and 40 Gy was found to have the lowest total flavonid content (5.83 ± 0.11; 5.75 ± 0.03 mg/g DW). Based on the results gathered in this study, significant differences were found between irradiated accessions and control ones in relation to the leaf gas. The highest PN and gs were detected in CA23 as control followed by CA23 irradiated to 20Gy (CA23G20) and CA23G30 and the lowest PN and gs were observed in CA03 irradiated to 40Gy (CA03G40). Moreover, there were no significant differences in terms of PN and gs among the irradiated plants in each accession. The WUE of both irradiated accessions of Centella asiatica were reduced as compared with the control plants (p < 0.01) while Ci and E were enhanced. There were no significant differences in the gas exchange parameters among radiated plants in each accession. Moreover, malondialdehyde (MDA) of accessions after gamma treatments were significantly higher than the control, however, flavonoids which were higher concentration in irradiated plants can scavenge surplus free radicals. Therefore, the findings of this study have proven an efficient method of in vitro mutagenesis through gamma radiation based on the pharmaceutical demand to create economically superior mutants of C. asiatica. In other words, the results of this study suggest that gamma irradiation on C. asiatica can produce mutants of agricultural and economical importance.

  2. Rational Inhibitors of DNA Base Excision Repair (BER) Enzymes: New Tools for Elucidating the Role of the BER in Cancer Chemotherapy

    DTIC Science & Technology

    2005-05-01

    Revised Manuscript Received March 3, 2005 ABSTRACT: Base flipping is a highly conserved strategy used by enzymes to gain catalytic access to DNA bases that...73.13. Jencks, W. P. (1985) A primer for the bema hapothle-an between uracil and other normal DNA bases at this inter- empirical-approach to the

  3. Medication management for community palliative care patients and the role of a specialist palliative care pharmacist: A qualitative exploration of consumer and health care professional perspectives.

    PubMed

    Kuruvilla, Lisha; Weeks, Greg; Eastman, Peter; George, Johnson

    2018-05-01

    Pharmacists have a key role to play in optimisation of medication regimens and promotion of medication safety. The role of specialist pharmacists as part of the multidisciplinary palliative care team, especially in the primary care setting, is not widely recognised. To explore the perspectives of stakeholders about the gaps in the current model of community palliative care services in relation to medication management and to assess their opinions pertaining to the role of a specialist palliative care pharmacist in addressing some of those gaps. Qualitative study utilising three focus groups involving 20 stakeholders. Thematic analysis was carried out using a framework approach and interpreted in the context of the Chronic Care Model for improving primary care for patients with chronic illness. Setting was a large regional Australian palliative care service. Participants included palliative care consumers and clinicians specifically patients, caregivers, physicians, nurses and pharmacists. Five major themes emerged from the focus groups: access to resources, medicines and information; shared care; challenges of polypharmacy; informal caregiver needs and potential roles of a palliative care pharmacist. Gaps in access to medicines/resources, training for generalist practitioners, communication between treating teams and lack of support for patients and carers were cited as factors adversely impacting medication management in community-based palliative care. While community-based palliative care is an essential aspect of meeting the health care demands of an ageing society, the current model has several gaps and limitations. An appropriately qualified and skilled pharmacist within the palliative care team may help to address some of the gaps in relation to medication access and appropriateness.

  4. Online psycho-education to the treatment of bipolar disorder: protocol of a randomized controlled trial.

    PubMed

    González-Ortega, Itxaso; Ugarte, Amaia; Ruiz de Azúa, Sonia; Núñez, Nuria; Zubia, Marta; Ponce, Sara; Casla, Patricia; Llano, Josu Xabier; Faria, Ángel; González-Pinto, Ana

    2016-12-22

    Bipolar disorder patients frequently present recurrent episodes and often experience subsyndromal symptoms, cognitive impairment and difficulties in functioning, with a low quality of life, illness relapses and recurrent hospitalization. Early diagnosis and appropriate intervention may play a role in preventing neuroprogression in this disorder. New technologies represent an opportunity to develop standardized psychological treatments using internet-based tools that overcome some of the limitations of face-to-face treatments, in that they are readily accessible and the timing of therapy can be tailored to user needs and availability. However, although many psychological programs are offered through the web and mobile devices for bipolar disorder, there is a lack of high quality evidence concerning their efficacy and effectiveness due to the great variability in measures and methodology used. This clinical trial is a simple-blind randomized trial within a European project to compare an internet-based intervention with treatment as usual. Bipolar disorder patients are to be included and randomly assigned to one of two groups: 1) the experimental group (tele-care support) and 2) the control group. Participants in both groups will be evaluated at baseline (pre-treatment) and post-treatment. This study describes the design of a clinical trial based on psychoeducation intervention that may have a significant impact on both prognosis and treatment in bipolar disorder. Specifically, bringing different services together (service aggregation), it is hoped that the approach proposed will significantly increase the impact of information and communication technologies on access and adherence to treatment, quality of the service, patient safety, patient and professional satisfaction, and quality of life of patients. NCT02924415 . Retrospectively registered 27 September 2016.

  5. A Presidential Initiative on Information Policy. Number 7.

    ERIC Educational Resources Information Center

    Shattuck, John; Spence, Muriel Morisey

    Two trends have inhibited the development of information and ideas, which are vital resources in a modern technological society, First, the Federal Government is engaged in efforts to control the flow of scientific and technical information (STI) to make it less accessible to foreign competitors and hostile nations. Second, the role of government…

  6. From Web accessibility to Web adaptability.

    PubMed

    Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa

    2009-07-01

    This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of these approaches placed responsibility within the authoring/publishing domain without recognising the role the user might want to play, or the roles that other users in social networks, or even Web services might play. Adaptability shifts the emphasis and calls for greater freedom for the users to facilitate individual accessibility in the open Web environment.

  7. 75 FR 1020 - Amendments to the Export Administration Regulations (EAR) Based Upon the Accession of Albania and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-08

    ...--Commerce Country Chart [Reason for control] Countries Chemical & biological Nuclear National Security Missile Regional Stability Firearms Crime control Anti-terrorism weapons nonproliferation Tech convention...

  8. Assessing the present state and potential of Medicaid controlled substance lock-in programs.

    PubMed

    Roberts, Andrew W; Skinner, Asheley Cockrell

    2014-05-01

    Nonmedical use of prescription medications--particularly controlled substances--has risen dramatically in recent decades, resulting in alarming increases in overdose-related health care utilization, costs, and mortality. The Centers for Disease Control and Prevention estimate that 80% of abused and misused controlled substances originate as legal prescriptions. As such, policymakers and payers have the opportunity to combat nonmedical use by regulating controlled substance accessibility within legal prescribing and dispensing processes. One common policy strategy is found in Medicaid controlled substance lock-in programs. Lock-in programs identify Medicaid beneficiaries exhibiting high-risk controlled substance seeking behavior and "lock in" these patients to, typically, a single prescriber and pharmacy from which they may obtain Medicaid-covered controlled substance prescriptions. Lock-in restrictions are intended to improve care coordination between providers, reduce nonmedical use behaviors, and limit Medicaid costs stemming from nonmedical use and diversion. Peer-reviewed and gray literature have been examined to assess the current prevalence and design of Medicaid lock-in programs, as well as the current evidence base for informing appropriate program design and understanding program effectiveness. Forty-six state Medicaid agencies currently operate lock-in programs. Program design varies widely between states in terms of defining high-risk controlled substance use, the scope of actual lock-in restrictions, and length of program enrollment. Additionally, there is a remarkable dearth of peer-reviewed literature evaluating the design and effectiveness of Medicaid lock-in programs. Nearly all outcomes evidence stemmed from publicly accessible internal Medicaid program evaluations, which largely investigated cost savings to the state. Lock-in programs are highly prevalent and poised to play a meaningful role in curbing the prescription drug abuse epidemic. However, achieving these ends requires a concerted effort from the academic and policy communities to rigorously evaluate the effect of lock-in programs on patient outcomes, determine optimal program design, and explore opportunities to enhance lock-in program impact through coordination with parallel controlled substance policy efforts, namely prescription drug-monitoring programs.

  9. Remote Authentication: The Obvia Solution.

    ERIC Educational Resources Information Center

    Eckley, Tami-Jo

    1999-01-01

    This article focuses on Obvia Corporation, a New York-based company that offers remote data access (RDA) through a server software system allowing for an easy, controllable, cost-effective management solution to the remote access problem. Using Obvia's RDA service, librarians can focus on administrative and professional decisions and spend more…

  10. Researchers at the Gate: Factors Influencing Districts' Right of Entry Decisions

    ERIC Educational Resources Information Center

    Melnick, Steven A.; Henk, William A.

    2006-01-01

    Background: The No Child Left Behind legislation creates an increased need for new school-based empirical studies whose implementation will depend largely on researchers' access to various school populations and records. Access decisions are typically made by superintendents, or their designees, functioning as gatekeepers who control right of…

  11. 77 FR 2054 - Proposed Agency Information Collection

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ... Consumption Data Access and Control Questionnaire; (3) Type of Request: New; (4) Purpose: The U.S. Department of Energy (DOE) will generate a ``crowd-sourced map'' that discloses consumer access to personal... questionnaire device that captures and publishes the necessary information as a series of web-based maps upon...

  12. Interactive Sections Of An Internet-Based Intervention Increase Patient Empowerment: A Study With Chronic Back Pain Patients

    ClinicalTrials.gov

    2014-04-12

    Group 1 (Control): Access to a Static Version of the Website Containing Only Static Features (i.e. Library, First Aid, and FAQ); Group2 (Intervention) Access to an Interactive Version of the Website Containing Both Static and Interactive Features

  13. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  14. Transcriptome profiling of Kentucky bluegrass (Poa pratensis L.) accessions in response to salt stress.

    PubMed

    Bushman, B Shaun; Amundsen, Keenan L; Warnke, Scott E; Robins, Joseph G; Johnson, Paul G

    2016-01-13

    Kentucky bluegrass (Poa pratensis L.) is a prominent turfgrass in the cool-season regions, but it is sensitive to salt stress. Previously, a relatively salt tolerant Kentucky bluegrass accession was identified that maintained green colour under consistent salt applications. In this study, a transcriptome study between the tolerant (PI 372742) accession and a salt susceptible (PI 368233) accession was conducted, under control and salt treatments, and in shoot and root tissues. Sample replicates grouped tightly by tissue and treatment, and fewer differentially expressed transcripts were detected in the tolerant PI 372742 samples compared to the susceptible PI 368233 samples, and in root tissues compared to shoot tissues. A de novo assembly resulted in 388,764 transcripts, with 36,587 detected as differentially expressed. Approximately 75 % of transcripts had homology based annotations, with several differences in GO terms enriched between the PI 368233 and PI 372742 samples. Gene expression profiling identified salt-responsive gene families that were consistently down-regulated in PI 372742 and unlikely to contribute to salt tolerance in Kentucky bluegrass. Gene expression profiling also identified sets of transcripts relating to transcription factors, ion and water transport genes, and oxidation-reduction process genes with likely roles in salt tolerance. The transcript assembly represents the first such assembly in the highly polyploidy, facultative apomictic Kentucky bluegrass. The transcripts identified provide genetic information on how this plant responds to and tolerates salt stress in both shoot and root tissues, and can be used for further genetic testing and introgression.

  15. Reports of insurance-based discrimination in health care and its association with access to care.

    PubMed

    Han, Xinxin; Call, Kathleen Thiede; Pintor, Jessie Kemmick; Alarcon-Espinoza, Giovann; Simon, Alisha Baines

    2015-07-01

    We examined reports of insurance-based discrimination and its association with insurance type and access to care in the early years of the Patient Protection and Affordable Care Act. We used data from the 2013 Minnesota Health Access Survey to identify 4123 Minnesota adults aged 18 to 64 years who reported about their experiences of insurance-based discrimination. We modeled the association between discrimination and insurance type and predicted odds of having reduced access to care among those reporting discrimination, controlling for sociodemographic factors. Data were weighted to represent the state's population. Reports of insurance-based discrimination were higher among uninsured (25%) and publicly insured (21%) adults than among privately insured adults (3%), which held in the regression analysis. Those reporting discrimination had higher odds of lacking a usual source of care, lacking confidence in getting care, forgoing care because of cost, and experiencing provider-level barriers than those who did not. Further research and policy interventions are needed to address insurance-based discrimination in health care settings.

  16. Networks in ATLAS

    NASA Astrophysics Data System (ADS)

    McKee, Shawn; ATLAS Collaboration

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks. We will report on a number of networking initiatives in ATLAS including participation in the global perfSONAR network monitoring and measuring efforts of WLCG and OSG, the collaboration with the LHCOPN/LHCONE effort, the integration of network awareness into PanDA, the use of the evolving ATLAS analytics framework to better understand our networks and the changes in our DDM system to allow remote access to data. We will also discuss new efforts underway that are exploring the inclusion and use of software defined networks (SDN) and how ATLAS might benefit from: • Orchestration and optimization of distributed data access and data movement. • Better control of workflows, end to end. • Enabling prioritization of time-critical vs normal tasks • Improvements in the efficiency of resource usage

  17. Inside 'bed management': ethnographic insights from the vantage point of UK hospital nurses.

    PubMed

    Allen, Davina

    2015-03-01

    In the face of unprecedented financial and demographic challenges, optimising acute bed utilisation by the proactive management of patient flows is a pressing policy concern in high-income countries. Despite the growing literature on this topic, bed management has received scant sociological attention. Drawing on practice-based approaches, this article deploys ethnographic data to examine bed management from the perspective of UK hospital nurses. While the nursing contribution to bed management is recognised formally in their widespread employment in patient access and discharge liaison roles, nurses at all levels in the study site were enrolled in this organisational priority. Rather than the rational, centrally controlled processes promulgated by policymakers, bed management emerges as a predominantly distributed activity, described here as match-making. An example of micro-level rationing, for the most part, match-making was not informed by explicit criteria nor did it hinge on clearly identifiable decisions to grant or deny access. Rather it was embedded in the everyday practices and situated rationalities through which nurses accomplished the accommodations necessary to balance demand with resources. © 2014 Foundation for the Sociology of Health & Illness.

  18. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.

  19. Silencing of a Germin-Like Protein Gene (CchGLP) in Geminivirus-Resistant Pepper (Capsicum chinense Jacq.) BG-3821 Increases Susceptibility to Single and Mixed Infections by Geminiviruses PHYVV and PepGMV

    PubMed Central

    Mejía-Teniente, Laura; Joaquin-Ramos, Ahuizolt de Jesús; Torres-Pacheco, Irineo; Rivera-Bustamante, Rafael F.; Guevara-Olvera, Lorenzo; Rico-García, Enrique; Guevara-Gonzalez, Ramon G.

    2015-01-01

    Germin-like proteins (GLPs) are encoded by a family of genes found in all plants, and in terms of function, the GLPs are implicated in the response of plants to biotic and abiotic stresses. CchGLP is a gene encoding a GLP identified in a geminivirus-resistant Capsicum chinense Jacq accession named BG-3821, and it is important in geminivirus resistance when transferred to susceptible tobacco in transgenic experiments. To characterize the role of this GLP in geminivirus resistance in the original accession from which this gene was identified, this work aimed at demonstrating the possible role of CchGLP in resistance to geminiviruses in Capsicum chinense Jacq. BG-3821. Virus-induced gene silencing studies using a geminiviral vector based in PHYVV component A, displaying that silencing of CchGLP in accession BG-3821, increased susceptibility to geminivirus single and mixed infections. These results suggested that CchGLP is an important factor for geminivirus resistance in C. chinense BG-3821 accession. PMID:26610554

  20. Silencing of a Germin-Like Protein Gene (CchGLP) in Geminivirus-Resistant Pepper (Capsicum chinense Jacq.) BG-3821 Increases Susceptibility to Single and Mixed Infections by Geminiviruses PHYVV and PepGMV.

    PubMed

    Mejía-Teniente, Laura; Joaquin-Ramos, Ahuizolt de Jesús; Torres-Pacheco, Irineo; Rivera-Bustamante, Rafael F; Guevara-Olvera, Lorenzo; Rico-García, Enrique; Guevara-Gonzalez, Ramon G

    2015-11-25

    Germin-like proteins (GLPs) are encoded by a family of genes found in all plants, and in terms of function, the GLPs are implicated in the response of plants to biotic and abiotic stresses. CchGLP is a gene encoding a GLP identified in a geminivirus-resistant Capsicum chinense Jacq accession named BG-3821, and it is important in geminivirus resistance when transferred to susceptible tobacco in transgenic experiments. To characterize the role of this GLP in geminivirus resistance in the original accession from which this gene was identified, this work aimed at demonstrating the possible role of CchGLP in resistance to geminiviruses in Capsicum chinense Jacq. BG-3821. Virus-induced gene silencing studies using a geminiviral vector based in PHYVV component A, displaying that silencing of CchGLP in accession BG-3821, increased susceptibility to geminivirus single and mixed infections. These results suggested that CchGLP is an important factor for geminivirus resistance in C. chinense BG-3821 accession.

  1. Structural asymmetry and intersubunit communication in muscle creatine kinase.

    PubMed

    Ohren, Jeffrey F; Kundracik, Melisa L; Borders, Charles L; Edmiston, Paul; Viola, Ronald E

    2007-03-01

    The structure of a transition-state analog complex of a highly soluble mutant (R134K) of rabbit muscle creatine kinase (rmCK) has been determined to 1.65 A resolution in order to elucidate the structural changes that are required to support and regulate catalysis. Significant structural asymmetry is seen within the functional homodimer of rmCK, with one monomer found in a closed conformation with the active site occupied by the transition-state analog components creatine, MgADP and nitrate. The other monomer has the two loops that control access to the active site in an open conformation and only MgADP is bound. The N-terminal region of each monomer makes a substantial contribution to the dimer interface; however, the conformation of this region is dramatically different in each subunit. Based on this structural evidence, two mutational modifications of rmCK were conducted in order to better understand the role of the amino-terminus in controlling creatine kinase activity. The deletion of the first 15 residues of rmCK and a single point mutant (P20G) both disrupt subunit cohesion, causing the dissociation of the functional homodimer into monomers with reduced catalytic activity. This study provides support for a structural role for the amino-terminus in subunit association and a mechanistic role in active-site communication and catalytic regulation.

  2. Traffic handling capability of a broadband indoor wireless network using CDMA multiple access

    NASA Astrophysics Data System (ADS)

    Zhang, Chang G.; Hafez, H. M.; Falconer, David D.

    1994-05-01

    CDMA (code division multiple access) may be an attractive technique for wireless access to broadband services because of its multiple access simplicity and other appealing features. In order to investigate traffic handling capabilities of a future network providing a variety of integrated services, this paper presents a study of a broadband indoor wireless network supporting high-speed traffic using CDMA multiple access. The results are obtained through the simulation of an indoor environment and the traffic capabilities of the wireless access to broadband 155.5 MHz ATM-SONET networks using the mm-wave band. A distributed system architecture is employed and the system performance is measured in terms of call blocking probability and dropping probability. The impacts of the base station density, traffic load, average holding time, and variable traffic sources on the system performance are examined. The improvement of system performance by implementing various techniques such as handoff, admission control, power control and sectorization are also investigated.

  3. Exploring the experience of clients with tetraplegia utilizing assistive technology for computer access.

    PubMed

    Folan, Alyce; Barclay, Linda; Cooper, Cathy; Robinson, Merren

    2015-01-01

    Assistive technology for computer access can be used to facilitate people with a spinal cord injury to utilize mainstream computer applications, thereby enabling participation in a variety of meaningful occupations. The aim of this study was to gain an understanding of the experiences of clients with tetraplegia trialing assistive technologies for computer access during different stages in a public rehabilitation service. In order to explore the experiences of clients with tetraplegia trialing assistive technologies for computer use, qualitative methodology was selected. Data were collected from seven participants using semi-structured interviews, which were audio-taped, transcribed and analyzed thematically. Three main themes were identified. These were: getting back into life, assisting in adjusting to injury and learning new skills. The findings from this study demonstrated that people with tetraplegia can be assisted to return to previous life roles or engage in new roles, through developing skills in the use of assistive technology for computer access. Being able to use computers for meaningful activities contributed to the participants gaining an enhanced sense of self-efficacy, and thereby quality of life. Implications for Rehabilitation Findings from this pilot study indicate that people with tetraplegia can be assisted to return to previous life roles, and develop new roles that have meaning to them through the use of assistive technologies for computer use. Being able to use the internet to socialize, and complete daily tasks, contributed to the participants gaining a sense of control over their lives. Early introduction to assistive technology is important to ensure sufficient time for newly injured people to feel comfortable enough with the assistive technology to use the computers productively by the time of discharge. Further research into this important and expanding area is indicated.

  4. Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks

    PubMed Central

    Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming

    2016-01-01

    Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network. PMID:27936011

  5. Overload Control for Signaling Congestion of Machine Type Communications in 3GPP Networks.

    PubMed

    Lu, Zhaoming; Pan, Qi; Wang, Luhan; Wen, Xiangming

    2016-01-01

    Because of the limited resources on radio access channels of third generation partnership projection (3GPP) network, one of the most challenging tasks posted by 3GPP cellular-based machine type communications (MTC) is congestion due to massive requests for connection to radio access network (RAN). In this paper, an overload control algorithm in 3GPP RAN is proposed, which proactively disperses the simultaneous access attempts in evenly distributed time window. Through periodic reservation strategy, massive access requests of MTC devices are dispersed in time, which reduces the probability of confliction of signaling. By the compensation and prediction mechanism, each device can communicate with MTC server with dynamic load of air interface. Numerical results prove that proposed method makes MTC applications friendly to 3GPP cellular network.

  6. Estimating spatial accessibility to facilities on the regional scale: an extended commuting-based interaction potential model

    PubMed Central

    2011-01-01

    Background There is growing interest in the study of the relationships between individual health-related behaviours (e.g. food intake and physical activity) and measurements of spatial accessibility to the associated facilities (e.g. food outlets and sport facilities). The aim of this study is to propose measurements of spatial accessibility to facilities on the regional scale, using aggregated data. We first used a potential accessibility model that partly makes it possible to overcome the limitations of the most frequently used indices such as the count of opportunities within a given neighbourhood. We then propose an extended model in order to take into account both home and work-based accessibility for a commuting population. Results Potential accessibility estimation provides a very different picture of the accessibility levels experienced by the population than the more classical "number of opportunities per census tract" index. The extended model for commuters increases the overall accessibility levels but this increase differs according to the urbanisation level. Strongest increases are observed in some rural municipalities with initial low accessibility levels. Distance to major urban poles seems to play an essential role. Conclusions Accessibility is a multi-dimensional concept that should integrate some aspects of travel behaviour. Our work supports the evidence that the choice of appropriate accessibility indices including both residential and non-residential environmental features is necessary. Such models have potential implications for providing relevant information to policy-makers in the field of public health. PMID:21219597

  7. Developing the security culture at the SEISMED Reference Centres.

    PubMed

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  8. Cross-modal prediction changes the timing of conscious access during the motion-induced blindness.

    PubMed

    Chang, Acer Y C; Kanai, Ryota; Seth, Anil K

    2015-01-01

    Despite accumulating evidence that perceptual predictions influence perceptual content, the relations between these predictions and conscious contents remain unclear, especially for cross-modal predictions. We examined whether predictions of visual events by auditory cues can facilitate conscious access to the visual stimuli. We trained participants to learn associations between auditory cues and colour changes. We then asked whether congruency between auditory cues and target colours would speed access to consciousness. We did this by rendering a visual target subjectively invisible using motion-induced blindness and then gradually changing its colour while presenting congruent or incongruent auditory cues. Results showed that the visual target gained access to consciousness faster in congruent than in incongruent trials; control experiments excluded potentially confounding effects of attention and motor response. The expectation effect was gradually established over blocks suggesting a role for extensive training. Overall, our findings show that predictions learned through cross-modal training can facilitate conscious access to visual stimuli. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. Compulsory Licenses for Cancer Drugs: Does Circumventing Patent Rights Improve Access to Oncology Medications?

    PubMed Central

    Bognar, Cinthia Leite Frizzera Borges; Bychkovsky, Brittany L.

    2016-01-01

    Worldwide, there are enormous inequities in cancer control that cause poor outcomes among patients with cancer who live in low- and middle-income countries (LMICs). One of the biggest challenges that oncology faces today is how to increase patient access to expensive, but life-saving, therapies in LMICs. Access to cancer medications in LMICs is a major problem, especially in recent years, as the costs of these therapies continue to rise exponentially. One mechanism available to LMICs to improve access to cancer medications allows a country to pursue a compulsory license for a given drug. Here, we will review how the legal framework in the World Trade Organization's Trade-Related Aspects of Intellectual Property Rights Agreement and the Doha Declaration supports countries to circumvent patent laws and acquire compulsory licenses for essential medicines. We will also discuss the current and future role of compulsory licenses in oncology and how compulsory licenses may improve access to cancer drugs in LMICs. PMID:28717715

  10. Organization and management of heterogeneous, dispersed data bases in nuclear engineering

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eastman, C.M.

    1986-01-01

    Large, complex, multiperson engineering projects in many areas, nuclear, aerospace, electronics, and manufacturing, have inherent needs for coordination, control, and management of the related engineering data. Taken in the abstract, the notion of an integrated engineering data base (IED) for such projects is attractive. The potential capabilities of an (IED) are that all data are managed in a coordinated way, are made accessible to all users who need it, allow relations between all parts of the data to be tracked and managed, provide backup, recovery, audit trails, security and access control, and allow overall project status to be monitored andmore » managed. Common data accessing schemes and user interfaces to applications are also part of an IED. This paper describes a new software product that allows incremental realization of many of the capabilities of an IED, without the massive disruption and risk.« less

  11. Poor uptake of an online intervention in a cluster randomised controlled trial of online diabetes education for rural general practitioners.

    PubMed

    Paul, Christine L; Piterman, Leon; Shaw, Jonathan E; Kirby, Catherine; Forshaw, Kristy L; Robinson, Jennifer; Thepwongsa, Isaraporn; Sanson-Fisher, Robert W

    2017-03-23

    In Australia, rural and remote communities have high rates of diabetes-related death and hospitalisation. General practitioners (GPs) play a major role in diabetes detection and management. Education of GPs could optimise diabetes management and improve patient outcomes at a population level. The study aimed to describe the uptake of a continuing medical education intervention for rural GPs and its impact on the viability of a cluster randomised controlled trial of the effects of continuing medical education on whole-town diabetes monitoring and control. Trial design: the cluster randomised controlled trial involved towns as the unit of allocation and analysis with outcomes assessed by de-identified pathology data (not reported here). The intervention programme consisted of an online active learning module, direct electronic access to specialist advice and performance feedback. Multiple rounds of invitation were used to engage GPs with the online intervention content. Evidence-based strategies (e.g. pre-notification, rewards, incentives) were incorporated into the invitations to enrol in the programme. Recruitment to the programme was electronically monitored through the hosting software package during the study intervention period. Eleven matched pairs of towns were included in the study. There were 146 GPs in the 11 intervention towns, of whom 34 (23.3%) enrolled in the programme, and 8 (5.5%) completed the online learning module. No town had more than 10% of the resident GPs complete the learning module. There were no contacts made by GPs regarding requests for specialist advice. Consequently, the trial was discontinued. There is an ongoing need to engage primary care physicians in improving diabetes monitoring and management in rural areas. Online training options, while notionally attractive and accessible, are not likely to have high levels of uptake, even when evidence-based recruitment strategies are implemented. Australian New Zealand Clinical Trials Registry, identifier: ACTRN12611000553976 . Retrospectively registered on 31 May 2011.

  12. The Role of Communities in Mental Health Care in Low- and Middle-Income Countries: A Meta-Review of Components and Competencies.

    PubMed

    Kohrt, Brandon A; Asher, Laura; Bhardwaj, Anvita; Fazel, Mina; Jordans, Mark J D; Mutamba, Byamah B; Nadkarni, Abhijit; Pedersen, Gloria A; Singla, Daisy R; Patel, Vikram

    2018-06-16

    Community-based mental health services are emphasized in the World Health Organization’s Mental Health Action Plan , the World Bank’s Disease Control Priorities , and the Action Plan of the World Psychiatric Association. There is increasing evidence for effectiveness of mental health interventions delivered by non-specialists in community platforms in low- and middle-income countries (LMIC). However, the role of community components has yet to be summarized. Our objective was to map community interventions in LMIC, identify competencies for community-based providers, and highlight research gaps. Using a review-of-reviews strategy, we identified 23 reviews for the narrative synthesis. Motivations to employ community components included greater accessibility and acceptability compared to healthcare facilities, greater clinical effectiveness through ongoing contact and use of trusted local providers, family involvement, and economic benefits. Locations included homes, schools, and refugee camps, as well as technology-aided delivery. Activities included awareness raising, psychoeducation, skills training, rehabilitation, and psychological treatments. There was substantial variation in the degree to which community components were integrated with primary care services. Addressing gaps in current practice will require assuring collaboration with service users, utilizing implementation science methods, creating tools to facilitate community services and evaluate competencies of providers, and developing standardized reporting for community-based programs.

  13. A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms

    NASA Astrophysics Data System (ADS)

    Hassan, Ahmed A.; Bahgat, Waleed M.

    2010-01-01

    Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.

  14. Medical Cannabinoids in Children and Adolescents: A Systematic Review.

    PubMed

    Wong, Shane Shucheng; Wilens, Timothy E

    2017-11-01

    Legalization of medical marijuana in many states has led to a widening gap between the accessibility and the evidence for cannabinoids as a medical treatment. To systematically review published reports to identify the evidence base of cannabinoids as a medical treatment in children and adolescents. Based on Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines, a search of PubMed, Medline, and the Cumulative Index to Nursing and Allied Health Literature databases was conducted in May 2017. Searching identified 2743 citations, and 103 full texts were reviewed. Searching identified 21 articles that met inclusion criteria, including 22 studies with a total sample of 795 participants. Five randomized controlled trials, 5 retrospective chart reviews, 5 case reports, 4 open-label trials, 2 parent surveys, and 1 case series were identified. Evidence for benefit was strongest for chemotherapy-induced nausea and vomiting, with increasing evidence of benefit for epilepsy. At this time, there is insufficient evidence to support use for spasticity, neuropathic pain, posttraumatic stress disorder, and Tourette syndrome. The methodological quality of studies varied, with the majority of studies lacking control groups, limited by small sample size, and not designed to test for the statistical significance of outcome measures. Studies were heterogeneous in the cannabinoid composition and dosage and lacked long-term follow-up to identify potential adverse effects. Additional research is needed to evaluate the potential role of medical cannabinoids in children and adolescents, especially given increasing accessibility from state legalization and potential psychiatric and neurocognitive adverse effects identified from studies of recreational cannabis use. Copyright © 2017 by the American Academy of Pediatrics.

  15. The alcohol industry and trade agreements: a preliminary assessment.

    PubMed

    Zeigler, Donald W

    2009-02-01

    To review trade agreements, their relation to alcohol control policy and examine the role of the alcohol industry in supporting and attempting to influence trade policy. Review of peer review, public health advocacy literature (both pro and con on free trade), business, press and government documents on trade agreements, assess current and potential challenges by trade agreements to alcohol control policy and investigate the means and extent of industry influence in trade agreements. 'Free' trade agreements reduce trade barriers, increase competition, lower prices and promote alcohol consumption. However, international treaties, negotiated by free trade experts in close consultation with corporate lobbyists and without significant, if any, public health input, governments and corporations contain significant provisions that will result in increased alcohol consumption and may challenge public health measures of other nations as constraints on trade. Conversely, alcohol control measures seek to reduce access and consumption, raise prices and restrict advertising and product promotion. The prospect is for increased alcohol consumption and concomitant problems throughout the world. Trade agreements challenge effective alcohol control policies. The alcohol industry seeks to influence agreements and can be expected to work through trade agreements to reduce tariffs, increase market access and seek to restrict effective domestic regulations. Further research is needed on the impact of trade agreements and the ongoing role of the industry. Advocates must recognize the inherent conflicts between unbridled free trade and public health, work to exclude alcohol from trade agreements, counter industry influence and protect alcohol control policies.

  16. Packet spacing : an enabling mechanism for delivering multimedia content in computational grids /

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feng, A. C.; Feng, W. C.; Belford, Geneva G.

    2001-01-01

    Streaming multimedia with UDP has become increasingly popular over distributed systems like the Internet. Scientific applications that stream multimedia include remote computational steering of visualization data and video-on-demand teleconferencing over the Access Grid. However, UDP does not possess a self-regulating, congestion-control mechanism; and most best-efort traflc is served by congestion-controlled TCF! Consequently, UDP steals bandwidth from TCP such that TCP$ows starve for network resources. With the volume of Internet traffic continuing to increase, the perpetuation of UDP-based streaming will cause the Internet to collapse as it did in the mid-1980's due to the use of non-congestion-controlled TCP. To address thismore » problem, we introduce the counterintuitive notion of inter-packet spacing with control feedback to enable UDP-based applications to perform well in the next-generation Internet and computational grids. When compared with traditional UDP-based streaming, we illustrate that our approach can reduce packet loss over SO% without adversely afecting delivered throughput. Keywords: network protocol, multimedia, packet spacing, streaming, TCI: UDlq rate-adjusting congestion control, computational grid, Access Grid.« less

  17. A mobile application of breast cancer e-support program versus routine Care in the treatment of Chinese women with breast cancer undergoing chemotherapy: study protocol for a randomized controlled trial.

    PubMed

    Zhu, Jiemin; Ebert, Lyn; Liu, Xiangyu; Chan, Sally Wai-Chi

    2017-04-26

    Women with breast cancer undergoing chemotherapy suffer from a number of symptoms and report receiving inadequate support from health care professionals. Innovative and easily accessible interventions are lacking. Breast Cancer e-Support is a mobile Application program (App) that provides patients with individually tailored information and a support group of peers and health care professionals. Breast Cancer e-Support aims to promote women's self-efficacy, social support and symptom management, thus improving their quality of life and psychological well-being. A single-blinded, multi-centre, randomised, 6-month, parallel-group superiority design will be used. Based on Bandura's self-efficacy theory and the social exchange theory, Breast Cancer e-Support has four modules: 1) a Learning forum; 2) a Discussion forum; 3) an Ask-the-Expert forum; and 4) a Personal Stories forum. Women with breast cancer (n = 108) who are commencing chemotherapy will be recruited from two university-affiliated hospitals in China. They will be randomly assigned to either control group that receives routine care or intervention group that receives routine care plus access to Breast Cancer e-Support program during their four cycles of chemotherapy. Self-efficacy, social support, symptom distress, quality of life, and anxiety and depression will be measured at baseline, then one week and 12 weeks post-intervention. This is the first study of its kind in China to evaluate the use of a mobile application intervention with a rigorous research design and theoretical framework. This study will contribute to evidence regarding the effectiveness of a theory-based mobile application to support women with breast cancer undergoing chemotherapy. The results should provide a better understanding of the role of self-efficacy and social support in reducing symptom distress and of the credibility of using a theoretical framework to develop internet-based interventions. The results will provide evidence to support the implementation of an innovative and easily accessible intervention that enhances health outcomes. ACTRN: ACTRN12616000639426 , Registered 17 May, 2016.

  18. Secure web-based access to radiology: forms and databases for fast queries

    NASA Astrophysics Data System (ADS)

    McColl, Roderick W.; Lane, Thomas J.

    2002-05-01

    Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.

  19. A controlled trial of web-based diabetes disease management: the MGH diabetes primary care improvement project.

    PubMed

    Meigs, James B; Cagliero, Enrico; Dubey, Anil; Murphy-Sheehy, Patricia; Gildesgame, Catharyn; Chueh, Henry; Barry, Michael J; Singer, Daniel E; Nathan, David M

    2003-03-01

    To test effects of a web-based decision support tool, the diabetes Disease Management Application (DMA), developed to improve evidence-based management of type 2 diabetes. We conducted a group randomized controlled trial of 12 intervention and 14 control staff providers and 307 intervention and 291 control patients with type 2 diabetes in a hospital-based internal medicine clinic. Providers were randomly assigned from May 1998 through April 1999 to have access to the DMA (intervention) or not to have access (control). The DMA displays interactive patient-specific clinical data, treatment advice, and links to other web-based care resources. We compared patients in the intervention and control groups for changes in processes and outcomes of care from the year preceding the study through the year of the study by intention-to-treat analysis. The DMA was used for 42% of scheduled patient visits. The number of HbA(1c) tests obtained per year increased significantly in the intervention group (+0.3 tests/year) compared with the control group (-0.04 tests/year, P = 0.008), as did the number of LDL cholesterol tests (intervention, +0.2 tests/year; control, +0.01 tests/year; P = 0.02) and the proportions of patients undergoing at least one foot examination per year (intervention, +9.8%; control, -0.7%; P = 0.003). Levels of HbA(1c) decreased by 0.2 in the intervention group and increased by 0.1 in the control group (P = 0.09); proportions of patients with LDL cholesterol levels <130 mg/dl increased by 20.3% in the intervention group and 10.5% in the control group (P = 0.5). Web-based patient-specific decision support has the potential to improve evidence-based parameters of diabetes care.

  20. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  1. The OPL Access Control Policy Language

    NASA Astrophysics Data System (ADS)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  2. How individual traces and interactive timelines could support outage execution - Toward an outage historian concept

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Parfouru, S.; De-Beler, N.

    2012-07-01

    In the context of a project that is designing innovative ICT-based solutions for the organizational concept of outage management, we focus on the informational process of the OCR (Outage Control Room) underlying the execution of the outages. Informational process are based on structured and unstructured documents that have a key role in the collaborative processes and management of the outage. We especially track the structured and unstructured documents, electronically or not, from creation to sharing. Our analysis allows us to consider that the individual traces produced by an individual participant with a specific role could be multi-purpose and support sharingmore » between participants without creating duplication of work. The ultimate goal is to be able to generate an outage historian, that is not just focused on highly structured information, which could be useful to improve the continuity of information between participants. We study the implementation of this approach through web technologies and social media tools to address this issue. We also investigate the issue of data access through interactive visualization timelines coupled with other modality's to assist users in the navigation and exploration of the proposed historian. (authors)« less

  3. Multi-component access to a commercially available weight loss program: A randomized controlled trial

    USDA-ARS?s Scientific Manuscript database

    This study examined weight loss between a community-based, intensive behavioral counseling program (Weight Watchers PointsPlus that included three treatment access modes and a self-help condition. A total of 292 participants were randomized to a Weight Watchers (WW; n=147) or a self-help condition (...

  4. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

    PubMed

    Wang, Shangping; Zhao, Duqiao; Zhang, Yaling

    2017-01-01

    Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.

  5. A passive RFID-based location system for personnel and asset monitoring.

    PubMed

    Hsiao, Rong-Shue; Kao, Chun-Hao; Chen, Tian-Xiang; Chen, Jui-Lun

    2018-01-01

    Typical radio frequency identification (RFID) access control system can be ineffective if an unauthorized person tailgates an authorized person through an access area. To propose a system by using indoor locating and tracking techniques address this problem, which is to prevent unauthorized Alzheimer's and dementia patients from getting lost including by tailgating. To achieve accurate target location, passive RFID deployment strategy is studied and a fingerprinting based passive RFID localization algorithm is proposed. The proposed system was evaluated in a building environment to simulate the performance of access control. RFID reader was installed on ceiling near the access area and tags were stitched on both shoulders of the experiment subject's garments. The probability of the error distance within 0.3 m achieved 97% in the warning area; the location precision achieved 97% within 0.4 m in the monitoring area. The result showed that if an unauthorized person enters the restricted area, the system can initiate an alert signal accurately. Therefore, the proposed system is very suitable to be used in nursing home or hospital to prevent unauthorized personnel and assets entering/exiting a confined location.

  6. Effects of a Web-based intervention for adults with chronic conditions on patient activation: online randomized controlled trial.

    PubMed

    Solomon, Michael; Wagner, Stephen L; Goes, James

    2012-02-21

    With almost one-half of Americans projected to have at least one chronic condition before 2020, a vital role of the health care system is to develop informed, engaged individuals who are effective self-managers of their health. Self-management interventions (SMIs) delivered face-to-face or by telephone (traditional SMIs) are associated with improved self-management knowledge, skills, and self-efficacy, which are expressed by the composite construct of patient activation, a predictor of health outcomes. Web-based interventions to support self-management across the spectrum of chronic diseases have the potential to reach a broader population of patients for extended periods than do traditional SMIs. However, evidence of the effectiveness of Web-based interventions on patient activation is sparse. High-quality studies featuring controlled comparisons of patients with different chronic conditions are needed to explore the interaction of Web-based interventions and patient activation. To explore the effect of a Web-based intervention on the patient activation levels of patients with chronic health conditions, measured as attitudes toward knowledge, skills, and confidence in self-managing health. For this 12-week study, prospective participants were selected from the patient panel of a regional health care system in the United States. The 201 eligible participants were randomly assigned to two groups. Intervention group participants had access to MyHealth Online, a patient portal featuring interactive health applications accessible via the Internet. Control participants had access to a health education website featuring various topics. Patient activation was assessed pre- and posttest using the 13-item patient activation measure. Parametric statistical models (t test, analysis of variance, analysis of covariance) were applied to draw inferences. The Web-based intervention demonstrated a positive and significant effect on the patient activation levels of participants in the intervention group. A significant difference in posttest patient activation scores was found between the two groups (F(1,123) = 4.438, P = .04, r = .196). Patients starting at the most advanced development of patient activation (stage 4) in the intervention group did not demonstrate significant change compared with participants beginning at earlier stages. To our knowledge, this is the first study to measure change in patient activation when a Web-based intervention is used by patients living with different chronic conditions. Results suggest that Web-based interventions increase patient activation and have the potential to enhance the self-management capabilities of the growing population of chronically ill people. Activated patients are more likely to adhere to recommended health care practices, which in turn leads to improved health outcomes. Designing Web-based interventions to target a specific stage of patient activation may optimize their effectiveness. For Web-based interventions to reach their potential as a key component of chronic disease management, evidence is needed that this technology produces benefits for a sustained period among a diverse population.

  7. Reduced Specificity of Autobiographical Memory and Depression: The Role of Executive Control

    ERIC Educational Resources Information Center

    Dalgleish, Tim; Golden, Ann-Marie J.; Barrett, Lisa Feldman; Au Yeung, Cecilia; Murphy, Victoria; Tchanturia, Kate; Williams, J. Mark G.; Perkins, Nicola; Barnard, Phillip J.; Elward, Rachael; Watkins, Edward

    2007-01-01

    It has been widely established that depressed mood states and clinical depression, as well as a range of other psychiatric disorders, are associated with a relative difficulty in accessing specific autobiographical information in response to emotion-related cue words on an Autobiographical Memory Test (AMT; J. M. G. Williams & K. Broadbent, 1986).…

  8. Bounded and Unbounded Knowledge: Teaching and Learning in a Web 2 World

    ERIC Educational Resources Information Center

    Nagy, Judy; Bigum, Chris

    2007-01-01

    In the recent past, the proliferation of digitally available content heralded the beginning of serious problems for the business models of publishers. The ease with which content can be accessed, copied and distributed disrupts the control of those whose role has been to manage and profit from the intellectual property rights of content producers.…

  9. Theatre Curriculum in the US: A Great Tasting Sandwich on Stale Bread

    ERIC Educational Resources Information Center

    Duffy, Peter

    2016-01-01

    This essay considers the role that local control, poverty, access and policy play in providing drama/theatre education opportunities to students in the US. It examines how state and federal initiatives shape and determine the curriculum. While there are studies that suggest robust theatre education in the US, these findings are complicated when…

  10. Recoding between Two Types of STM Representation Revealed by the Dynamics of Memory Search

    ERIC Educational Resources Information Center

    Leszczynski, Marcin; Myers, Nicholas E.; Akyurek, Elkan G.; Schubo, Anna

    2012-01-01

    Visual STM (VSTM) is thought to be related to visual attention in several ways. Attention controls access to VSTM during memory encoding and plays a role in the maintenance of stored information by strengthening memorized content. We investigated the involvement of visual attention in recall from VSTM. In two experiments, we measured…

  11. Data visualisation in surveillance for injury prevention and control: conceptual bases and case studies.

    PubMed

    Martinez, Ramon; Ordunez, Pedro; Soliz, Patricia N; Ballesteros, Michael F

    2016-04-01

    The complexity of current injury-related health issues demands the usage of diverse and massive data sets for comprehensive analyses, and application of novel methods to communicate data effectively to the public health community, decision-makers and the public. Recent advances in information visualisation, availability of new visual analytic methods and tools, and progress on information technology provide an opportunity for shaping the next generation of injury surveillance. To introduce data visualisation conceptual bases, and propose a visual analytic and visualisation platform in public health surveillance for injury prevention and control. The paper introduces data visualisation conceptual bases, describes a visual analytic and visualisation platform, and presents two real-world case studies illustrating their application in public health surveillance for injury prevention and control. Application of visual analytic and visualisation platform is presented as solution for improved access to heterogeneous data sources, enhance data exploration and analysis, communicate data effectively, and support decision-making. Applications of data visualisation concepts and visual analytic platform could play a key role to shape the next generation of injury surveillance. Visual analytic and visualisation platform could improve data use, the analytic capacity, and ability to effectively communicate findings and key messages. The public health surveillance community is encouraged to identify opportunities to develop and expand its use in injury prevention and control. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  12. A Districtwide Study of Automaticity When Included in Concept-Based Elementary School Mathematics Instruction

    ERIC Educational Resources Information Center

    McGee, Daniel; Richardson, Patrick; Brewer, Meredith; Gonulates, Funda; Hodgson, Theodore; Weinel, Rebecca

    2017-01-01

    While conceptual understanding of properties, operations, and the base-ten number system is certainly associated with the ability to access math facts fluently, the role of math fact memorization to promote conceptual understanding remains contested. In order to gain insight into this question, this study looks at the results when one of three…

  13. Data Manipulation in an XML-Based Digital Image Library

    ERIC Educational Resources Information Center

    Chang, Naicheng

    2005-01-01

    Purpose: To help to clarify the role of XML tools and standards in supporting transition and migration towards a fully XML-based environment for managing access to information. Design/methodology/approach: The Ching Digital Image Library, built on a three-tier architecture, is used as a source of examples to illustrate a number of methods of data…

  14. The Role of School Based Health Centers (SBHCs) in Improving Health Equity and Reducing Health Disparities. Position Statement

    ERIC Educational Resources Information Center

    Blacksin, Beth; Gall, Gail; Feldman, Elizabeth; Miller, Elizabeth

    2010-01-01

    Health inequities exist largely among socially disadvantaged people who are denied the highest attainable standard of health available to many Americans. Access to culturally competent, high quality, first-contact primary care through school-based health centers is an effective way to reduce health inequities and, therefore, improve health…

  15. Health Professionals' Attitudes towards Evidence-Based Medicine and the Role of the Information Professional in Exploitation of the Research Evidence.

    ERIC Educational Resources Information Center

    Lewis, Ruth A.; Rolinson, Janet; Urquhart, Christine J.

    1998-01-01

    A survey of 182 doctors, nurses, and allied professionals examined health professionals' awareness of evidence-based medicine (EBM). Results show most health professionals wanted workplace access to resources, that doctors preferred to do their own searching, and that health professionals doubted librarians could find relevant articles, suggesting…

  16. Meeting the Curricular Challenges of Inclusive Assessment: The Role of Alignment, Opportunity to Learn, and Student Engagement

    ERIC Educational Resources Information Center

    Kurz, Alexander; Talapatra, Devadrita; Roach, Andrew T.

    2012-01-01

    Inclusive test-based accountability systems are intended to focus attention on the teaching and learning of important knowledge and skills for students with disabilities. Test score inferences to this end are often based on unverified assumptions of curricular alignment, access, and engagement. Focusing on students with disabilities, we discuss…

  17. The rural community care gerontologic nurse entrepreneur: role development strategies.

    PubMed

    Caffrey, Rosalie A

    2005-10-01

    Rural elderly individuals are an underserved population with limited access to health care. There is an increasing need for independent community care nurses to provide assistance to home-based elderly individuals with chronic illnesses to prevent unnecessary medical and placement decisions and, thus, allow them to maintain independence and quality of life. This article describes the rural setting and why community care nurses are needed, and explores strategies for implementing the role of the independent nurse entrepreneur in caring for community-based elderly individuals in rural settings.

  18. Decomposing Educational Inequalities in Child Mortality: A Temporal Trend Analysis of Access to Water and Sanitation in Peru

    PubMed Central

    Bohra, Tasneem; Benmarhnia, Tarik; McKinnon, Britt; Kaufman, Jay S.

    2017-01-01

    Previous studies of inequality in health and mortality have largely focused on income-based inequality. Maternal education plays an important role in determining access to water and sanitation, and inequalities in child mortality arising due to differential access, especially in low- and middle-income countries such as Peru. This article aims to explain education-related inequalities in child mortality in Peru using a regression-based decomposition of the concentration index of child mortality. The analysis combines a concentration index created along a cumulative distribution of the Demographic and Health Surveys sample ranked according to maternal education, and decomposition measures the contribution of water and sanitation to educational inequalities in child mortality. We observed a large education-related inequality in child mortality and access to water and sanitation. There is a need for programs and policies in child health to focus on ensuring equity and to consider the educational stratification of the population to target the most disadvantaged segments of the population. PMID:27821698

  19. Differential Responses of Vanilla Accessions to Root Rot and Colonization by Fusarium oxysporum f. sp. radicis-vanillae

    PubMed Central

    Koyyappurath, Sayuj; Conéjéro, Geneviève; Dijoux, Jean Bernard; Lapeyre-Montès, Fabienne; Jade, Katia; Chiroleu, Frédéric; Gatineau, Frédéric; Verdeil, Jean Luc; Besse, Pascale; Grisoni, Michel

    2015-01-01

    Root and stem rot (RSR) disease caused by Fusarium oxysporum f. sp. radicis-vanillae (Forv) is the most damaging disease of vanilla (Vanilla planifolia and V. × tahitensis, Orchidaceae). Breeding programs aimed at developing resistant vanilla varieties are hampered by the scarcity of sources of resistance to RSR and insufficient knowledge about the histopathology of Forv. In this work we have (i) identified new genetic resources resistant to RSR including V. planifolia inbreds and vanilla relatives, (ii) thoroughly described the colonization pattern of Forv into selected vanilla accessions, confirming its necrotic non-vascular behavior in roots, and (iii) evidenced the key role played by hypodermis, and particularly lignin deposition onto hypodermal cell walls, for resistance to Forv in two highly resistant vanilla accessions. Two hundred and fifty-four vanilla accessions were evaluated in the field under natural conditions of infection and in controlled conditions using in vitro plants root-dip inoculated by the highly pathogenic isolate Fo072. For the 26 accessions evaluated in both conditions, a high correlation was observed between field evaluation and in vitro assay. The root infection process and plant response of one susceptible and two resistant accessions challenged with Fo072 were studied using wide field and multiphoton microscopy. In susceptible V. planifolia, hyphae penetrated directly into the rhizodermis in the hairy root region then invaded the cortex through the passage cells where it induced plasmolysis, but never reached the vascular region. In the case of the resistant accessions, the penetration was stopped at the hypodermal layer. Anatomical and histochemical observations coupled with spectral analysis of the hypodermis suggested the role of lignin deposition in the resistance to Forv. The thickness of lignin constitutively deposited onto outer cell walls of hypodermis was highly correlated with the level of resistance for 21 accessions tested. The accumulation of p-coumaric and sinapic acids, two phenolic precursors of lignin, was observed in the resistant plants inoculated with Fo072, but not in the susceptible one. Altogether, our analyses enlightened the mechanisms at work in RSR resistant genotypes and should enhance the development of novel breeding strategies aimed at improving the genetic control of RSR of vanilla. PMID:26734032

  20. Fragaria vesca CONSTANS controls photoperiodic flowering and vegetative development.

    PubMed

    Kurokura, Takeshi; Samad, Samia; Koskela, Elli; Mouhu, Katriina; Hytönen, Timo

    2017-10-13

    According to the external coincidence model, photoperiodic flowering occurs when CONSTANS (CO) mRNA expression coincides with light in the afternoon of long days (LDs), leading to the activation of FLOWERING LOCUS T (FT). CO has evolved in Brassicaceae from other Group Ia CO-like (COL) proteins which do not control photoperiodic flowering in Arabidopsis. COLs in other species have evolved different functions as floral activators or even as repressors. To understand photoperiodic development in the perennial rosaceous model species woodland strawberry, we functionally characterized FvCO, the only Group Ia COL in its genome. We demonstrate that FvCO has a major role in the photoperiodic control of flowering and vegetative reproduction through runners. FvCO is needed to generate a bimodal rhythm of FvFT1 which encodes a floral activator in the LD accession Hawaii-4: a sharp FvCO expression peak at dawn is followed by the FvFT1 morning peak in LDs indicating possible direct regulation, but additional factors that may include FvGI and FvFKF1 are probably needed to schedule the second FvFT1 peak around dusk. These results demonstrate that although FvCO and FvFT1 play major roles in photoperiodic development, the CO-based external coincidence around dusk is not fully applicable to the woodland strawberry. © The Author 2017. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  1. Channel Access in Erlang

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nicklaus, Dennis J.

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PVmore » monitors.« less

  2. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems

    PubMed Central

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-01

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN’s MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS. PMID:28134853

  3. IEEE 802.15.4 Frame Aggregation Enhancement to Provide High Performance in Life-Critical Patient Monitoring Systems.

    PubMed

    Akbar, Muhammad Sajjad; Yu, Hongnian; Cang, Shuang

    2017-01-28

    In wireless body area sensor networks (WBASNs), Quality of Service (QoS) provision for patient monitoring systems in terms of time-critical deadlines, high throughput and energy efficiency is a challenging task. The periodic data from these systems generates a large number of small packets in a short time period which needs an efficient channel access mechanism. The IEEE 802.15.4 standard is recommended for low power devices and widely used for many wireless sensor networks applications. It provides a hybrid channel access mechanism at the Media Access Control (MAC) layer which plays a key role in overall successful transmission in WBASNs. There are many WBASN's MAC protocols that use this hybrid channel access mechanism in variety of sensor applications. However, these protocols are less efficient for patient monitoring systems where life critical data requires limited delay, high throughput and energy efficient communication simultaneously. To address these issues, this paper proposes a frame aggregation scheme by using the aggregated-MAC protocol data unit (A-MPDU) which works with the IEEE 802.15.4 MAC layer. To implement the scheme accurately, we develop a traffic patterns analysis mechanism to understand the requirements of the sensor nodes in patient monitoring systems, then model the channel access to find the performance gap on the basis of obtained requirements, finally propose the design based on the needs of patient monitoring systems. The mechanism is initially verified using numerical modelling and then simulation is conducted using NS2.29, Castalia 3.2 and OMNeT++. The proposed scheme provides the optimal performance considering the required QoS.

  4. The Role of Advanced Information System Technology in Remote Sensing for NASA's Earth Science Enterprise in the 21st Century

    NASA Technical Reports Server (NTRS)

    Prescott, Glenn; Komar, George (Technical Monitor)

    2001-01-01

    Future NASA Earth observing satellites will carry high-precision instruments capable of producing large amounts of scientific data. The strategy will be to network these instrument-laden satellites into a web-like array of sensors to facilitate the collection, processing, transmission, storage, and distribution of data and data products - the essential elements of what we refer to as "Information Technology." Many of these Information Technologies will enable the satellite and ground information systems to function effectively in real-time, providing scientists with the capability of customizing data collection activities on a satellite or group of satellites directly from the ground. In future systems, extremely large quantities of data collected by scientific instruments will require the fastest processors, the highest communication channel transfer rates, and the largest data storage capacity to insure that data flows smoothly from the satellite-based instrument to the ground-based archive. Autonomous systems will control all essential processes and play a key role in coordinating the data flow through space-based communication networks. In this paper, we will discuss those critical information technologies for Earth observing satellites that will support the next generation of space-based scientific measurements of planet Earth, and insure that data and data products provided by these systems will be accessible to scientists and the user community in general.

  5. SERVER DEVELOPMENT FOR NSLS-II PHYSICS APPLICATIONS AND PERFORMANCE ANALYSIS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen, G.; Kraimer, M.

    2011-03-28

    The beam commissioning software framework of NSLS-II project adopts a client/server based architecture to replace the more traditional monolithic high level application approach. The server software under development is available via an open source sourceforge project named epics-pvdata, which consists of modules pvData, pvAccess, pvIOC, and pvService. Examples of two services that already exist in the pvService module are itemFinder, and gather. Each service uses pvData to store in-memory transient data, pvService to transfer data over the network, and pvIOC as the service engine. The performance benchmarking for pvAccess and both gather service and item finder service are presented inmore » this paper. The performance comparison between pvAccess and Channel Access are presented also. For an ultra low emittance synchrotron radiation light source like NSLS II, the control system requirements, especially for beam control are tight. To control and manipulate the beam effectively, a use case study has been performed to satisfy the requirement and theoretical evaluation has been performed. The analysis shows that model based control is indispensable for beam commissioning and routine operation. However, there are many challenges such as how to re-use a design model for on-line model based control, and how to combine the numerical methods for modeling of a realistic lattice with the analytical techniques for analysis of its properties. To satisfy the requirements and challenges, adequate system architecture for the software framework for beam commissioning and operation is critical. The existing traditional approaches are self-consistent, and monolithic. Some of them have adopted a concept of middle layer to separate low level hardware processing from numerical algorithm computing, physics modelling, data manipulating and plotting, and error handling. However, none of the existing approaches can satisfy the requirement. A new design has been proposed by introducing service oriented architecture technology, and client interface is undergoing. The design and implementation adopted a new EPICS implementation, namely epics-pvdata [9], which is under active development. The implementation of this project under Java is close to stable, and binding to other language such as C++ and/or Python is undergoing. In this paper, we focus on the performance benchmarking and comparison for pvAccess and Channel Access, the performance evaluation for 2 services, gather and item finder respectively.« less

  6. A game-theoretical approach to multimedia social networks security.

    PubMed

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.

  7. A Game-Theoretical Approach to Multimedia Social Networks Security

    PubMed Central

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  8. Detection and response to unauthorized access to a communication device

    DOEpatents

    Smith, Rhett; Gordon, Colin

    2015-09-08

    A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.

  9. A web-based biosignal data management system for U-health data integration.

    PubMed

    Ro, Dongwoo; Yoo, Sooyoung; Choi, Jinwook

    2008-11-06

    In the ubiquitous healthcare environment, the biosignal data should be easily accessed and properly maintained. This paper describes a web-based data management system. It consists of a device interface, a data upload control, a central repository, and a web server. For the user-specific web services, a MFER Upload ActiveX Control was developed.

  10. Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2007-01-01

    This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.

  11. Memory-efficient table look-up optimized algorithm for context-based adaptive variable length decoding in H.264/advanced video coding

    NASA Astrophysics Data System (ADS)

    Wang, Jianhua; Cheng, Lianglun; Wang, Tao; Peng, Xiaodong

    2016-03-01

    Table look-up operation plays a very important role during the decoding processing of context-based adaptive variable length decoding (CAVLD) in H.264/advanced video coding (AVC). However, frequent table look-up operation can result in big table memory access, and then lead to high table power consumption. Aiming to solve the problem of big table memory access of current methods, and then reduce high power consumption, a memory-efficient table look-up optimized algorithm is presented for CAVLD. The contribution of this paper lies that index search technology is introduced to reduce big memory access for table look-up, and then reduce high table power consumption. Specifically, in our schemes, we use index search technology to reduce memory access by reducing the searching and matching operations for code_word on the basis of taking advantage of the internal relationship among length of zero in code_prefix, value of code_suffix and code_lengh, thus saving the power consumption of table look-up. The experimental results show that our proposed table look-up algorithm based on index search can lower about 60% memory access consumption compared with table look-up by sequential search scheme, and then save much power consumption for CAVLD in H.264/AVC.

  12. Current State of Value-Based Purchasing Programs.

    PubMed

    Chee, Tingyin T; Ryan, Andrew M; Wasfy, Jason H; Borden, William B

    2016-05-31

    The US healthcare system is rapidly moving toward rewarding value. Recent legislation, such as the Affordable Care Act and the Medicare Access and CHIP Reauthorization Act, solidified the role of value-based payment in Medicare. Many private insurers are following Medicare's lead. Much of the policy attention has been on programs such as accountable care organizations and bundled payments; yet, value-based purchasing (VBP) or pay-for-performance, defined as providers being paid fee-for-service with payment adjustments up or down based on value metrics, remains a core element of value payment in Medicare Access and CHIP Reauthorization Act and will likely remain so for the foreseeable future. This review article summarizes the current state of VBP programs and provides analysis of the strengths, weaknesses, and opportunities for the future. Multiple inpatient and outpatient VBP programs have been implemented and evaluated; the impact of those programs has been marginal. Opportunities to enhance the performance of VBP programs include improving the quality measurement science, strengthening both the size and design of incentives, reducing health disparities, establishing broad outcome measurement, choosing appropriate comparison targets, and determining the optimal role of VBP relative to alternative payment models. VBP programs will play a significant role in healthcare delivery for years to come, and they serve as an opportunity for providers to build the infrastructure needed for value-oriented care. © 2016 American Heart Association, Inc.

  13. Network-based production quality control

    NASA Astrophysics Data System (ADS)

    Kwon, Yongjin; Tseng, Bill; Chiou, Richard

    2007-09-01

    This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.

  14. The Role of Non-Governmental Organisations and Faith-Based Organisations in Achieving Education for All: The Case of Sierra Leone

    ERIC Educational Resources Information Center

    Nishimuko, Mikako

    2009-01-01

    Sierra Leone, one of the world's poorest countries, experienced a civil war from 1991 to 2002. The government's capacity to provide educational services remains weak, and still over 30% of children in the country are hard to reach and do not have access to primary education. This paper discusses the role of non-governmental organisations (NGOs)…

  15. 77 FR 36951 - Gastroenterology-Urology Devices; Reclassification of Implanted Blood Access Devices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-20

    ... into class II (special controls). FDA is proposing this reclassification on its own initiative based on... categories (classes) of devices, reflecting the regulatory controls needed to provide reasonable assurance of their safety and effectiveness. The three categories of devices are class I (general controls), class II...

  16. Do no harm: the role of community pharmacists in regulating public access to prescription drugs in Saudi Arabia.

    PubMed

    Bahnassi, Anas

    2016-04-01

    Pharmacists have a crucial role to ensure regulated public access to prescription drugs. The study aimed to investigate the views of community pharmacists practising in Saudi Arabia on their role in the unauthorised supply of prescription drugs, consider the possible contributory factors and report pharmacists' suggested strategies to regulate supply. One hundred community pharmacists were invited to participate in an interview-based survey, including questions on demographic characteristics, and the unauthorised supply of prescription drugs. Descriptive statistics were conducted, and associations between categorical responses tested; a P value of ≤0.05 was considered significant. Responses to open questions were analysed thematically. In Saudi Arabia, there is widespread unregulated supply of prescription drugs; pharmacists are under pressure from patients to provide prescription drugs for a wide range of clinical conditions. There are safety and appropriateness concerns when drugs are provided based on patient demand rather than clinical need. Pharmacists do not maintain patient records with information on drugs supplied and associated actions. While most pharmacists supply prescription drugs without the necessary prescriber authorisation, they also this may jeopardise patients safety. While we have many concerns about this practice its present form, we believe pharmacists should have certain prescribing privileges within their areas of competence. A legal framework is needed to guarantee proper pharmacists' training, support, mentorship and access to the tools required to provide safe pharmacy practice. © 2015 Royal Pharmaceutical Society.

  17. Paying more for faster care? Individuals' attitude toward price-based priority access in health care.

    PubMed

    Benning, Tim M; Dellaert, Benedict G C

    2013-05-01

    Increased competition in the health care sector has led hospitals and other health care institutions to experiment with new access allocation policies that move away from traditional expert based allocation of care to price-based priority access (i.e., the option to pay more for faster care). To date, little is known about individuals' attitude toward price-based priority access and the evaluation process underlying this attitude. This paper addresses the role of individuals' evaluations of collective health outcomes as an important driver of their attitude toward (price-based) allocation policies in health care. The authors investigate how individuals evaluate price-based priority access by means of scenario-based survey data collected in a representative sample from the Dutch population (N = 1464). They find that (a) offering individuals the opportunity to pay for faster care negatively affects their evaluations of both the total and distributional collective health outcome achieved, (b) however, when health care supply is not restricted (i.e., when treatment can be offered outside versus within the regular working hours of the hospital) offering price-based priority access affects total collective health outcome evaluations positively instead of negatively, but it does not change distributional collective health outcome evaluations. Furthermore, (c) the type of health care treatment (i.e., life saving liver transplantation treatment vs. life improving cosmetic ear correction treatment - priced at the same level to the individual) moderates the effect of collective health outcome evaluations on individuals' attitude toward allocation policies. For policy makers and hospital managers the results presented in this article are helpful because they provide a better understanding of what drives individuals' preferences for health care allocation policies. In particular, the results show that policies based on the "paying more for faster care" principle are more attractive to the general public when treatment takes place outside the regular working hours of a hospital. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. The secure authorization model for healthcare information system.

    PubMed

    Hsu, Wen-Shin; Pan, Jiann-I

    2013-10-01

    Exploring healthcare system for assisting medical services or transmitting patients' personal health information in web application has been widely investigated. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. In the healthcare system, not all users are allowed to access all the information. Several authorization models for restricting users to access specific information at specific permissions have been proposed. However, as the number of users and the amount of information grows, the difficulties for administrating user authorization will increase. The critical problem limits the widespread usage of the healthcare system. This paper proposes an approach for role-based and extends it to deal with the information for authorizations in the healthcare system. We propose the role-based authorization model which supports authorizations for different kinds of objects, and a new authorization domain. Based on this model, we discuss the issues and requirements of security in the healthcare systems. The security issues for services shared between different healthcare industries will also be discussed.

  19. Towards universal access to skilled birth attendance: the process of transforming the role of traditional birth attendants in Rural China.

    PubMed

    Jiang, Hong; Qian, Xu; Chen, Lili; Li, Jian; Escobar, Erin; Story, Mary; Tang, Shenglan

    2016-03-21

    Institution-based childbirth, with the ultimate goal of universal access to skilled birth attendance (SBA), has been selected as a key strategy to reduce the maternal mortality rate in many developing countries. However, the question of how to engage traditional birth attendants (TBAs) in the advocacy campaign for SBA poses a number of challenges. This paper aims to demonstrate how TBAs in rural regions of China have been integrated into the health system under a policy of institutional delivery. Research was conducted through literature and document reviews and individual in-depth interviews with stakeholders of the safe motherhood program in rural Guangxi Zhuang Autonomous Region, China. A total of 33 individual interviews were conducted with regional and local politicians, policy makers, health managers, health providers, civil society members, village cadres for women affairs, former TBAs, village maternal health workers, mothers and their mother-in-laws. Since 1998, TBA's traditional role of providing in-home care during childbirth has been restructured and their social role has been strengthened in rural Guangxi. TBAs were redesigned to function as the linkage between women and the health system. A new policy in 1999 shifted the role of TBAs to village maternal health workers whose responsibilities were mainly to promote perinatal care and institution-based delivery of pregnant women. This successful transformation involved engaging with government and other actors, training TBAs for their new role, and providing incentives and sanctions for human resources management. The China experience of transforming the role of TBAs in Guangxi rural area is an example of successfully engaging TBAs in promoting institution-based childbirth.

  20. Role Perceptions of Hispanic and Mainstream Navy Recruits.

    DTIC Science & Technology

    1982-12-01

    ACCESSION NO- 3. R9C’PI’NT’S CATALOG NUMBER 4. TITLE (and Subttl.e) S . TYPE of REPORT & PERIOO COVERED Role Perceptions of Hispanic and M4ainstream Interim...Technical Report Navy Recruits *. PERFORMING ORG. REPORT NUMBER 7. AUTHOR( s ) 6. CONTRACT OR GRANT NUMUER(a) Harry C. Triandis Judith Li3ansky Gerardo...T NU M E R S A Department of Psycholog~y University of Illinois NR 170-906 603 E. Daniel, Chamva.;vn, IL 6182__ II. CONTROLLING OFFICE NAME AND

  1. Enrollment Quota Control, Elite Selection and Access to Education in Rural China

    ERIC Educational Resources Information Center

    Zhao, Luan

    2010-01-01

    In China, the access to education is determined by not only student's demand for schooling, but also the allocation of educational resources and the schools' selection of candidate students. Based on the data obtained from the rural life level and rural social assistance household surveys in four provinces in 2005, the demand-identified bivariate…

  2. Attribute-Based Proxy Re-Encryption with Keyword Search

    PubMed Central

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for , and propose two concrete constructions for : key-policy and ciphertext-policy . In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. PMID:25549257

  3. Attribute-based proxy re-encryption with keyword search.

    PubMed

    Shi, Yanfeng; Liu, Jiqiang; Han, Zhen; Zheng, Qingji; Zhang, Rui; Qiu, Shuo

    2014-01-01

    Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.

  4. Reports of Insurance-Based Discrimination in Health Care and Its Association With Access to Care

    PubMed Central

    Call, Kathleen Thiede; Pintor, Jessie Kemmick; Alarcon-Espinoza, Giovann; Simon, Alisha Baines

    2015-01-01

    Objectives. We examined reports of insurance-based discrimination and its association with insurance type and access to care in the early years of the Patient Protection and Affordable Care Act. Methods. We used data from the 2013 Minnesota Health Access Survey to identify 4123 Minnesota adults aged 18 to 64 years who reported about their experiences of insurance-based discrimination. We modeled the association between discrimination and insurance type and predicted odds of having reduced access to care among those reporting discrimination, controlling for sociodemographic factors. Data were weighted to represent the state’s population. Results. Reports of insurance-based discrimination were higher among uninsured (25%) and publicly insured (21%) adults than among privately insured adults (3%), which held in the regression analysis. Those reporting discrimination had higher odds of lacking a usual source of care, lacking confidence in getting care, forgoing care because of cost, and experiencing provider-level barriers than those who did not. Conclusions. Further research and policy interventions are needed to address insurance-based discrimination in health care settings. PMID:25905821

  5. Randomized Controlled Trial of SuperBetter, a Smartphone-Based/Internet-Based Self-Help Tool to Reduce Depressive Symptoms.

    PubMed

    Roepke, Ann Marie; Jaffee, Sara R; Riffle, Olivia M; McGonigal, Jane; Broome, Rose; Maxwell, Bez

    2015-06-01

    Technological advances have sparked the development of computer- and smartphone-based self-help programs for depressed people, but these programs' efficacy is uncertain. This randomized controlled trial evaluated an intervention called SuperBetter (SB), which is accessed via smartphone and/or the SB Web site. Online, we recruited 283 adult iPhone(®) (Apple, Cupertino, CA) users with significant depression symptoms according to the Center for Epidemiological Studies Depression questionnaire (CES-D). They were randomly assigned to one of three conditions: (a) a version of SB using cognitive-behavioral therapy and positive psychotherapy strategies to target depression (CBT-PPT SB); (b) a general SB version focused on self-esteem and acceptance (General SB); or (c) a waiting list control group (WL). The two SB groups were instructed to use SB for 10 minutes daily for 1 month. All participants completed psychological distress and well-being measures online every 2 weeks through follow-up. An intent-to-treat analysis was conducted using hierarchical linear modeling. As hypothesized, SB participants achieved greater reductions in CES-D scores than WL participants by posttest (Cohen's d=0.67) and by follow-up (d=1.05). Contrary to prediction, CBT-PPT SB did not perform better than General SB; both versions of SB were more effective than the WL control. Differences between SB versions favored General SB but were not statistically significant. These large effect sizes should be interpreted cautiously in light of high attrition rates and the motivated, self-selected sample. Nonetheless, smartphone-based/Internet-based self-help may play an important role in treating depression.

  6. Proteomic analysis identifies a novel function for galectin-3 in the cell entry of parvovirus.

    PubMed

    Garcin, Pierre; Cohen, Sarah; Terpstra, Sanne; Kelly, Isabelle; Foster, Leonard J; Panté, Nelly

    2013-02-21

    Cellular factors associated with the parvovirus minute virus of mice (MVM) during infection are thought to play important roles in the MVM life cycle but only a few of these have been identified. Here we used a proteomic-based approach in order to identify host-binding partners of MVM. Using purified MVM as bait for immunoprecipitation assays, a total of 150 proteins were identified in MVM immunoprecipitates by quantitative liquid chromatography-tandem mass spectrometry. Galectin-3 was one of six proteins showing a statistically significant enrichment across replicates. Small interfering RNA depletion studies revealed an important role for galectin-3 in MVM endocytosis and infectivity in LA9 mouse fibroblast cells. Galectin-3-depleted cells were less susceptible to MVM infection than control cells and showed a significant reduction of MVM cellular uptake, but not of MVM binding to the cell surface. Our results indicate an important role for galectin-3 in the cellular uptake of MVM. We propose that galectin-3 facilitates the access of MVM to its receptor(s) at the plasma membrane and in this way promotes MVM endocytosis. Copyright © 2012 Elsevier B.V. All rights reserved.

  7. Emerging new practices in technology to support independent community access for people with intellectual and cognitive disabilities.

    PubMed

    Stock, Steven E; Davies, Daniel K; Wehmeyer, Michael L; Lachapelle, Yves

    2011-01-01

    The concept of community access is a multidimensional term, which may involve issues related to physical access, knowledge and information, power and control, relationships and communications, advocacy, participation and quality of life [21]. This paper discusses historical and emerging practices and interventions related to physical access to community and community based information for individuals with cognitive disabilities such as intellectual disability, autism or traumatic brain injury. While much societal attention has been paid to features of independent community access for populations such as individuals with hearing, vision or physical disabilities, less attention has focused on independent community access for people with intellectual and other significant cognitive disabilities. Attitudes and actions by families and professional service communities are often mixed for some individuals in this population. The somewhat limited research base in these areas is explored, including a case study review and results from several promising feasibility studies. The paper concludes with comments concerning future prospects and recommendations for improving independent community access for persons with significant cognitive disabilities.

  8. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    PubMed Central

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  9. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    NASA Astrophysics Data System (ADS)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  10. "This Is My Family outside of My Family": Care-Based Relating in a Model Early College High School

    ERIC Educational Resources Information Center

    Ari, Omer; Fisher-Ari, Teresa R.; Killacky, Jim; Angel, Roma

    2017-01-01

    Early college (EC) is a novel educational model in the US that combines high school and college in an effort to increase underrepresented students' access to higher education by providing engaging, hands-on instruction in a supportive learning environment. For this phenomenological inquiry, we sought to understand the role of care-based relating…

  11. Role Socialization: Designing a Web-Based Program to Orient New School Nurses

    ERIC Educational Resources Information Center

    Campbell, Tia B.

    2009-01-01

    Traditional orientation programs for school nurses may not meet the needs of nurses new to the specialty. In this era where technology is a major aspect of our daily lives, the Internet offers new school nurses an avenue where information can be accessed at anytime and from anyplace. This article explores a Web-based orientation program that has…

  12. Mixed multi-scalar methods to assess wood biomass availability on family forests in Virginia's Southside

    Treesearch

    M. D. Brinckman; J. F. Munsell

    2009-01-01

    Interest in wood-based bio-energy production systems is increasing. Multiscalar, mixed-method approaches focusing on both biophysical and social aspects of procurable feedstock are needed. Family forests will likely play an important role in supplying forest-based biomass. However, access depends in large part on the management trends among family forest owners. This...

  13. Histones and their modifications in ovarian cancer - drivers of disease and therapeutic targets.

    PubMed

    Marsh, Deborah J; Shah, Jaynish S; Cole, Alexander J

    2014-01-01

    Epithelial ovarian cancer has the highest mortality of the gynecological malignancies. High grade serous epithelial ovarian cancer (SEOC) is the most common subtype, with the majority of women presenting with advanced disease where 5-year survival is around 25%. Platinum-based chemotherapy in combination with paclitaxel remains the most effective treatment despite platinum therapies being introduced almost 40 years ago. Advances in molecular medicine are underpinning new strategies for the treatment of cancer. Major advances have been made by international initiatives to sequence cancer genomes. For SEOC, with the exception of TP53 that is mutated in virtually 100% of these tumors, there is no other gene mutated at high frequency. There is extensive copy number variation, as well as changes in methylation patterns that will influence gene expression. To date, the role of histones and their post-translational modifications in ovarian cancer is a relatively understudied field. Post-translational histone modifications play major roles in gene expression as they direct the configuration of chromatin and so access by transcription factors. Histone modifications include methylation, acetylation, and monoubiquitination, with involvement of enzymes including histone methyltransferases, histone acetyltransferases/deacetylases, and ubiquitin ligases/deubiquitinases, respectively. Complexes such as the Polycomb repressive complex also play roles in the control of histone modifications and more recently roles for long non-coding RNA and microRNAs are emerging. Epigenomic-based therapies targeting histone modifications are being developed and offer new approaches for the treatment of ovarian cancer. Here, we discuss histone modifications and their aberrant regulation in malignancy and specifically in ovarian cancer. We review current and upcoming histone-based therapies that have the potential to inform and improve treatment strategies for women with ovarian cancer.

  14. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  15. Readings in Mass Communication; Concepts and Issues in the Mass Media.

    ERIC Educational Resources Information Center

    Emery, Michael C.; Smythe, Ted Curtis

    The aim of this book of readings is to provide college students with a wide variety of articles on the rapid changes and problems of today's mass media. The problems of access, control, protection of sources, and relevance are considered crucial to the changing role of the media. Changes in the structure of both traditional media and new…

  16. Monitoring and control of amygdala neurofeedback involves distributed information processing in the human brain.

    PubMed

    Paret, Christian; Zähringer, Jenny; Ruf, Matthias; Gerchen, Martin Fungisai; Mall, Stephanie; Hendler, Talma; Schmahl, Christian; Ende, Gabriele

    2018-03-30

    Brain-computer interfaces provide conscious access to neural activity by means of brain-derived feedback ("neurofeedback"). An individual's abilities to monitor and control feedback are two necessary processes for effective neurofeedback therapy, yet their underlying functional neuroanatomy is still being debated. In this study, healthy subjects received visual feedback from their amygdala response to negative pictures. Activation and functional connectivity were analyzed to disentangle the role of brain regions in different processes. Feedback monitoring was mapped to the thalamus, ventromedial prefrontal cortex (vmPFC), ventral striatum (VS), and rostral PFC. The VS responded to feedback corresponding to instructions while rPFC activity differentiated between conditions and predicted amygdala regulation. Control involved the lateral PFC, anterior cingulate, and insula. Monitoring and control activity overlapped in the VS and thalamus. Extending current neural models of neurofeedback, this study introduces monitoring and control of feedback as anatomically dissociated processes, and suggests their important role in voluntary neuromodulation. © 2018 Wiley Periodicals, Inc.

  17. Access to Cancer Therapeutics in Low- and Middle-Income Countries.

    PubMed

    Ruff, Paul; Al-Sukhun, Sana; Blanchard, Charmaine; Shulman, Lawrence N

    2016-01-01

    Cancer is rapidly becoming a major health care problem, especially in developing countries, where 60% of the world's total new cases are diagnosed. The success of new antineoplastic medicines and modern radiation devices to cure a good proportion of patients with cancer and to alleviate the suffering of many more has been achieved at a dramatic cost. Therefore, it has become mandatory for health care authorities and pharmaceutical companies to cooperate to use and develop resources in an efficient manner to improve health care delivery to patients with cancer worldwide. Regulatory harmonization is an important key to overcome delays in the approval process, whether for antineoplastic and pain control medicines or for essential medical devices. More emphasis on the significant role of opiates in pain control among patients with cancer is needed to overcome the ingrained belief in their potential for addiction. The World Health Organization (WHO) serves an important role in guiding priorities for health care and efficiently allocating resources by providing essential medicine lists (EMLs) and device lists. However, the financial challenge for access to health care is multi-tiered and requires collaboration between key stakeholders including pharmaceutical industry, local national health authorities, WHO, and other nonprofit, patient-oriented organizations.

  18. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  19. The influence of training and experience on memory strategy.

    PubMed

    Patrick, John; Morgan, Phillip L; Smy, Victoria; Tiley, Leyanne; Seeby, Helen; Patrick, Tanya; Evans, Jonathan

    2015-07-01

    This paper investigates whether, and if so how much, prior training and experience overwrite the influence of the constraints of the task environment on strategy deployment. This evidence is relevant to the theory of soft constraints that focuses on the role of constraints in the task environment (Gray, Simms, Fu, & Schoelles, Psychological Review, 113: 461-482, 2006). The theory explains how an increase in the cost of accessing information induces a more memory-based strategy involving more encoding and planning. Experiments 1 and 3 adopt a traditional training and transfer design using the Blocks World Task in which participants were exposed to training trials involving a 2.5-s delay in accessing goal-state information before encountering transfer trials in which there was no access delay. The effect of prior training was assessed by the degree of memory-based strategy adopted in the transfer trials. Training with an access delay had a substantial carry-over effect and increased the subsequent degree of memory-based strategy adopted in the transfer environment. However, such effects do not necessarily occur if goal-state access cost in training is less costly than in transfer trials (Experiment 2). Experiment 4 used a fine-grained intra-trial design to examine the effect of experiencing access cost on one, two, or three occasions within the same trial and found that such experience on two consecutive occasions was sufficient to induce a more memory-based strategy. This paper establishes some effects of training that are relevant to the soft constraints theory and also discusses practical implications.

  20. AccessScope project: Accessible light microscope for users with upper limb mobility or visual impairments.

    PubMed

    Mansoor, Awais; Ahmed, Wamiq M; Samarapungavan, Ala; Cirillo, John; Schwarte, David; Robinson, J Paul; Duerstock, Bradley S

    2010-01-01

    A web-based application was developed to remotely view slide specimens and control all functions of a research-level light microscopy workstation, called AccessScope. Students and scientists with upper limb mobility and visual impairments are often unable to use a light microscope by themselves and must depend on others in its operation. Users with upper limb mobility impairments and low vision were recruited to assist in the design process of the AccessScope personal computer (PC) user interface. Participants with these disabilities were evaluated in their ability to use AccessScope to perform microscopical tasks. AccessScope usage was compared with inspecting prescanned slide images by grading participants' identification and understanding of histological features and knowledge of microscope operation. With AccessScope subjects were able to independently perform common light microscopy functions through an Internet browser by employing different PC pointing devices or accessibility software according to individual abilities. Subjects answered more histology and microscope usage questions correctly after first participating in an AccessScope test session. AccessScope allowed users with upper limb or visual impairments to successfully perform light microscopy without assistance. This unprecedented capability is crucial for students and scientists with disabilities to perform laboratory coursework or microscope-based research and pursue science, technology, engineering, and mathematics fields.

  1. Can your software engineer program your PLC?

    NASA Astrophysics Data System (ADS)

    Borrowman, Alastair J.; Taylor, Philip

    2016-07-01

    The use of Programmable Logic Controllers (PLCs) in the control of large physics experiments is ubiquitous1, 2, 3. The programming of these controllers is normally the domain of engineers with a background in electronics, this paper introduces PLC program development from the software engineer's perspective. PLC programs provide the link between control software running on PC architecture systems and physical hardware controlled and monitored by digital and analog signals. The higher-level software running on the PC is typically responsible for accepting operator input and from this deciding when and how hardware connected to the PLC is controlled. The PLC accepts demands from the PC, considers the current state of its connected hardware and if correct to do so (based upon interlocks or other constraints) adjusts its hardware output signals appropriately for the PC's demands. A published ICD (Interface Control Document) defines the PLC memory locations available to be written and read by the PC to control and monitor the hardware. Historically the method of programming PLCs has been ladder diagrams that closely resemble circuit diagrams, however, PLC manufacturers nowadays also provide, and promote, the use of higher-level programming languages4. Based on techniques used in the development of high-level PC software to control PLCs for multiple telescopes, this paper examines the development of PLC programs to operate the hardware of a medical cyclotron beamline controlled from a PC using the Experimental Physics and Industrial Control System (EPICS), which is also widely used in telescope control5, 6, 7. The PLC used is the new generation Siemens S7-1200 programmed using Siemens Pascal based Structured Control Language (SCL), which is their implementation of Structured Text (ST). The approach described is that from a software engineer's perspective, utilising Siemens Totally Integrated Automation (TIA) Portal integrated development environment (IDE) to create modular PLC programs based upon reusable functions capable of being unit tested without the PLC connected to hardware. Emphasis has been placed on designing an interface between EPICS and SCL that enforces correct operation of hardware through stringent separation of PC accessible PLC memory and hardware I/O addresses used only by the PLC. The paper also introduces the method used to automate the creation, from the same source document, the PLC memory structure (tag) definitions (defining memory used to access hardware I/O and that accessed by the PC) and creation of the PC program data structures (EPICS database records) used to access the permitted PLC addresses. From direct experience this paper demonstrates the advantages of PLC program development being shared between electronic and software engineers, to enable use of the most appropriate processes from both the perspective of the hardware and the higher-level software used to control it.

  2. Access management research and awareness program : phase IV final report

    DOT National Transportation Integrated Search

    1999-11-01

    Access management involves balancing the dual roles that roadways must play - through travel and access to property and economic activity. When these roles are not in proper balance, the result is a roadway system that functions sub-optimally. The Io...

  3. Environment and gender issues: need to revisit SAP.

    PubMed

    Acharya, S

    1998-01-01

    It is now recognized that environmental degradation, gender inequality, access to and control over resources, gender-based division of labor in survival and management tasks related to the environment, and the feminization of poverty are all interconnected and must be approached with an interdisciplinary, gender perspective. Because women play a vital role in managing biodiversity and socioecological systems, measures that reinforce women's lack of control over resources threaten biodiversity as well as women's position. Creation of truly sustainable and equitable development policies and practices will require a transformation in economic, social, and gender relations that will result in a proper valuing of women's roles as managers of their environments and providers to their families. Policies designed to promote environmental sustainability would also result in desirable population changes. Instead, structural adjustment programs (SAPs) have had a disastrous effect on the environment because they favor large-scale projects over energy-saving projects, are export-driven and stimulate over-exploitation of natural resources, and serve a private market that fails to reimburse environmental costs. Kutznets' Curve explains that environmental pollution is inevitable in the early stages of economic development, prolonged by SAPs, and can only be mitigated when development generates enough money. Until this happens, vulnerable women are experiencing deterioration in their living conditions, and state policies are required to improve this situation.

  4. Oscillatory mechanisms of process binding in memory.

    PubMed

    Klimesch, Wolfgang; Freunberger, Roman; Sauseng, Paul

    2010-06-01

    A central topic in cognitive neuroscience is the question, which processes underlie large scale communication within and between different neural networks. The basic assumption is that oscillatory phase synchronization plays an important role for process binding--the transient linking of different cognitive processes--which may be considered a special type of large scale communication. We investigate this question for memory processes on the basis of different types of oscillatory synchronization mechanisms. The reviewed findings suggest that theta and alpha phase coupling (and phase reorganization) reflect control processes in two large memory systems, a working memory and a complex knowledge system that comprises semantic long-term memory. It is suggested that alpha phase synchronization may be interpreted in terms of processes that coordinate top-down control (a process guided by expectancy to focus on relevant search areas) and access to memory traces (a process leading to the activation of a memory trace). An analogous interpretation is suggested for theta oscillations and the controlled access to episodic memories. Copyright (c) 2009 Elsevier Ltd. All rights reserved.

  5. The role of public policies in reducing smoking and deaths caused by smoking in Vietnam: results from the Vietnam tobacco policy simulation model.

    PubMed

    Levy, David T; Bales, Sarah; Lam, Nguyen T; Nikolayev, Leonid

    2006-04-01

    A simulation model is developed for Vietnam to project smoking prevalence and associated premature mortality. The model examines independently and as a package the effects of five types of tobacco control policies: tax increases, clean air laws, mass media campaigns, advertising bans, and youth access policies. Predictions suggest that the largest reductions in smoking rates will result from implementing a comprehensive tobacco control policy package. Significant inroads may be achieved through tax increases. A media campaign along with programs to publicize and enforce clean air laws, advertising bans and youth access laws would further reduce smoking rates. Tobacco control policies have the potential to make large dents in smoking rates, which in turn could lead to many lives saved. In the absence of these measures, deaths from smoking will increase. The model also helps to identify information gaps pertinent both to modeling and policy-making.

  6. In-home firearm access among US adolescents and the role of religious subculture: Results from a nationally representative study.

    PubMed

    Stroope, Samuel; Tom, Joshua C

    2017-09-01

    Religious participation is linked to numerous positive safety outcomes for adolescents. Scant attention, however, has been paid to associations between religious participation and safety risks among adolescents. Using data from Add Health (N = 18,449), a nationally representative school-based sample of US adolescents, this study examines the relationship between adolescents' religious affiliation and easy access to firearms at home. Regression analyses adjust for complex sampling design and compare easy firearm access at home among conservative Protestant adolescents to adolescent firearm access in other religious traditions. Conservative Protestant adolescents have a substantially greater likelihood of easy access to a gun at home compared to adolescents of all other major religious traditions in the United States. Recognizing differences in adolescent firearm access between subcultural groups can help public health interventions more effectively identify and address the needs of vulnerable populations. The paper's conclusion considers suggestions for effective policy and programmatic initiatives. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.

  8. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual. We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model. PMID:25485311

  9. Channel MAC Protocol for Opportunistic Communication in Ad Hoc Wireless Networks

    NASA Astrophysics Data System (ADS)

    Ashraf, Manzur; Jayasuriya, Aruna; Perreau, Sylvie

    2008-12-01

    Despite significant research effort, the performance of distributed medium access control methods has failed to meet theoretical expectations. This paper proposes a protocol named "Channel MAC" performing a fully distributed medium access control based on opportunistic communication principles. In this protocol, nodes access the channel when the channel quality increases beyond a threshold, while neighbouring nodes are deemed to be silent. Once a node starts transmitting, it will keep transmitting until the channel becomes "bad." We derive an analytical throughput limit for Channel MAC in a shared multiple access environment. Furthermore, three performance metrics of Channel MAC—throughput, fairness, and delay—are analysed in single hop and multihop scenarios using NS2 simulations. The simulation results show throughput performance improvement of up to 130% with Channel MAC over IEEE 802.11. We also show that the severe resource starvation problem (unfairness) of IEEE 802.11 in some network scenarios is reduced by the Channel MAC mechanism.

  10. Nesting behavior of house mice (Mus domesticus) selected for increased wheel-running activity.

    PubMed

    Carter, P A; Swallow, J G; Davis, S J; Garland, T

    2000-03-01

    Nest building was measured in "active" (housed with access to running wheels) and "sedentary" (without wheel access) mice (Mus domesticus) from four replicate lines selected for 10 generations for high voluntary wheel-running behavior, and from four randombred control lines. Based on previous studies of mice bidirectionally selected for thermoregulatory nest building, it was hypothesized that nest building would show a negative correlated response to selection on wheel-running. Such a response could constrain the evolution of high voluntary activity because nesting has also been shown to be positively genetically correlated with successful production of weaned pups. With wheel access, selected mice of both sexes built significantly smaller nests than did control mice. Without wheel access, selected females also built significantly smaller nests than did control females, but only when body mass was excluded from the statistical model, suggesting that body mass mediated this correlated response to selection. Total distance run and mean running speed on wheels was significantly higher in selected mice than in controls, but no differences in amount of time spent running were measured, indicating a complex cause of the response of nesting to selection for voluntary wheel running.

  11. Potential access to primary health care: what does the National Program for Access and Quality Improvement data show?

    PubMed Central

    Uchôa, Severina Alice da Costa; Arcêncio, Ricardo Alexandre; Fronteira, Inês Santos Estevinho; Coêlho, Ardigleusa Alves; Martiniano, Claudia Santos; Brandão, Isabel Cristina Araújo; Yamamura, Mellina; Maroto, Renata Melo

    2016-01-01

    Objective: to analyze the influence of contextual indicators on the performance of municipalities regarding potential access to primary health care in Brazil and to discuss the contribution from nurses working on this access. Method: a multicenter descriptive study based on secondary data from External Evaluation of the National Program for Access and Quality Improvement in Primary Care, with the participation of 17,202 primary care teams. The chi-square test of proportions was used to verify differences between the municipalities stratified based on size of the coverage area, supply, coordination, and integration; when necessary, the chi-square test with Yates correction or Fisher's exact test were employed. For the population variable, the Kruskal-Wallis test was used. Results: the majority of participants were nurses (n=15.876; 92,3%). Statistically significant differences were observed between the municipalities in terms of territory (p=0.0000), availability (p=0.0000), coordination of care (p=0.0000), integration (p=0.0000) and supply (p=0.0000), verifying that the municipalities that make up area 6 tend to have better performance in these dimensions. Conclusion: areas 4,5 and 6 performed better in every analyzed dimension, and the nurse had a leading role in the potential to access primary health care in Brazil. PMID:26959332

  12. The use of twin-screen-based WIMPS in spacecraft control

    NASA Astrophysics Data System (ADS)

    Klim, R. D.

    1990-10-01

    The ergonomic problems of designing a sophisticated Windows Icons Mouse Pop-up (WIMP) based twin screen workstation are outlined. These same problems will be encountered by future spacecraft controllers. The design of a modern, advanced workstation for use on a distributed multicontrol center in a multisatellite control system is outlined. The system uses access control mechanisms to ensure that only authorized personnel can undertake certain operations on the workstation. Rules governing the use of windowing features, screen attributes, icons, keyboard and mouse in spacecraft control are discussed.

  13. Bridging the gaps between research, policy and practice in low- and middle-income countries: a survey of health care providers

    PubMed Central

    Guindon, G. Emmanuel; Lavis, John N.; Becerra-Posada, Francisco; Malek-Afzali, Hossein; Shi, Guang; Yesudian, C. Ashok K.; Hoffman, Steven J.

    2010-01-01

    Background Gaps continue to exist between research-based evidence and clinical practice. We surveyed health care providers in 10 low- and middle-income countries about their use of research-based evidence and examined factors that may facilitate or impede such use. Methods We surveyed 1499 health care providers practising in one of four areas relevant to the Millennium Development Goals (prevention of malaria, care of women seeking contraception, care of children with diarrhea and care of patients with tuberculosis) in each of China, Ghana, India, Iran, Kazakhstan, Laos, Mexico, Pakistan, Senegal and Tanzania. Results The proportion of respondents who reported that research was likely to change their clinical practice if performed and published in their own country (84.6% and 86.0% respectively) was higher than the proportion who reported the same about research and publications from their region (66.4% and 63.1%) or from high-income countries (55.8% and 55.5%). Respondents who were most likely to report that the use of research-based evidence led to changes in their practice included those who reported using clinical practice guidelines in paper format (odds ratio [OR] 1.54, 95% confidence interval [CI] 1.03–2.28), using scientific journals from their own country in paper format (OR 1.70, 95% CI 1.26–2.28), viewing the quality of research performed in their country as above average or excellent (OR 1.93, 95% CI 1.16–3.22); trusting systematic reviews of randomized controlled trials (OR 1.59, 95% CI 1.08–2.35); and having easy access to the Internet (OR 1.90, 95% CI 1.19–3.02). Interpretation Locally conducted or published research has played an important role in changing the professional practice of health care providers surveyed in low- and middle-income countries. Increased investments in local research, or at least in locally adapted publications of research-based evidence from other settings, are therefore needed. Although access to the Internet was viewed as a significant factor in whether research-based evidence led to concrete changes in practice, few respondents reported having easy access to the Internet. Therefore, efforts to improve Internet access in clinical settings need to be accelerated. PMID:20439448

  14. System impact research – increasing public health and health care system performance

    PubMed Central

    Malmivaara, Antti

    2016-01-01

    Abstract Background Interventions directed to system features of public health and health care should increase health and welfare of patients and population. Aims To build a new framework for studies aiming to assess the impact of public health or health care system, and to consider the role of Randomized Controlled Trials (RCTs) and of Benchmarking Controlled Trials (BCTs). Methods The new concept is partly based on the author's previous paper on the Benchmarking Controlled Trial. The validity and generalizability considerations were based on previous methodological studies on RCTs and BCTs. Results The new concept System Impact Research (SIR) covers all the studies which aim to assess the impact of the public health system or of the health care system on patients or on population. There are two kinds of studies in System Impact Research: Benchmarking Controlled Trials (observational) and Randomized Controlled Trials (experimental). The term impact covers in particular accessibility, quality, effectiveness, safety, efficiency, and equality. Conclusions System Impact Research – creating the scientific basis for policy decision making - should be given a high priority in medical, public health and health economic research, and should also be used for improving performance. Leaders at all levels of health and social care can use the evidence from System Impact Research for the benefit of patients and population.Key messagesThe new concept of SIR is defined as a research field aiming at assessing the impacts on patients and on populations of features of public health and health and social care systems or of interventions trying to change these features.SIR covers all features of public health and health and social care system, and actions upon these features. The term impact refers to all effects caused by the public health and health and social care system or parts of it, with particular emphasis on accessibility, quality, effectiveness, adverse effects, efficiency, and equality of services.SIR creates the scientific basis for policy decisions. Leaders at all levels of health and social care can use the evidence from SIR for the benefit of the patients and the population. PMID:26977939

  15. System impact research - increasing public health and health care system performance.

    PubMed

    Malmivaara, Antti

    2016-01-01

    Interventions directed to system features of public health and health care should increase health and welfare of patients and population. To build a new framework for studies aiming to assess the impact of public health or health care system, and to consider the role of Randomized Controlled Trials (RCTs) and of Benchmarking Controlled Trials (BCTs). The new concept is partly based on the author's previous paper on the Benchmarking Controlled Trial. The validity and generalizability considerations were based on previous methodological studies on RCTs and BCTs. The new concept System Impact Research (SIR) covers all the studies which aim to assess the impact of the public health system or of the health care system on patients or on population. There are two kinds of studies in System Impact Research: Benchmarking Controlled Trials (observational) and Randomized Controlled Trials (experimental). The term impact covers in particular accessibility, quality, effectiveness, safety, efficiency, and equality. System Impact Research - creating the scientific basis for policy decision making - should be given a high priority in medical, public health and health economic research, and should also be used for improving performance. Leaders at all levels of health and social care can use the evidence from System Impact Research for the benefit of patients and population. Key messages The new concept of SIR is defined as a research field aiming at assessing the impacts on patients and on populations of features of public health and health and social care systems or of interventions trying to change these features. SIR covers all features of public health and health and social care system, and actions upon these features. The term impact refers to all effects caused by the public health and health and social care system or parts of it, with particular emphasis on accessibility, quality, effectiveness, adverse effects, efficiency, and equality of services. SIR creates the scientific basis for policy decisions. Leaders at all levels of health and social care can use the evidence from SIR for the benefit of the patients and the population.

  16. Evolving self-assembly in autonomous homogeneous robots: experiments with two physical robots.

    PubMed

    Ampatzis, Christos; Tuci, Elio; Trianni, Vito; Christensen, Anders Lyhne; Dorigo, Marco

    2009-01-01

    This research work illustrates an approach to the design of controllers for self-assembling robots in which the self-assembly is initiated and regulated by perceptual cues that are brought forth by the physical robots through their dynamical interactions. More specifically, we present a homogeneous control system that can achieve assembly between two modules (two fully autonomous robots) of a mobile self-reconfigurable system without a priori introduced behavioral or morphological heterogeneities. The controllers are dynamic neural networks evolved in simulation that directly control all the actuators of the two robots. The neurocontrollers cause the dynamic specialization of the robots by allocating roles between them based solely on their interaction. We show that the best evolved controller proves to be successful when tested on a real hardware platform, the swarm-bot. The performance achieved is similar to the one achieved by existing modular or behavior-based approaches, also due to the effect of an emergent recovery mechanism that was neither explicitly rewarded by the fitness function, nor observed during the evolutionary simulation. Our results suggest that direct access to the orientations or intentions of the other agents is not a necessary condition for robot coordination: Our robots coordinate without direct or explicit communication, contrary to what is assumed by most research works in collective robotics. This work also contributes to strengthening the evidence that evolutionary robotics is a design methodology that can tackle real-world tasks demanding fine sensory-motor coordination.

  17. Systematic plan of building Web geographic information system based on ActiveX control

    NASA Astrophysics Data System (ADS)

    Zhang, Xia; Li, Deren; Zhu, Xinyan; Chen, Nengcheng

    2003-03-01

    A systematic plan of building Web Geographic Information System (WebGIS) using ActiveX technology is proposed in this paper. In the proposed plan, ActiveX control technology is adopted in building client-side application, and two different schemas are introduced to implement communication between controls in users¡ browser and middle application server. One is based on Distribute Component Object Model (DCOM), the other is based on socket. In the former schema, middle service application is developed as a DCOM object that communicates with ActiveX control through Object Remote Procedure Call (ORPC) and accesses data in GIS Data Server through Open Database Connectivity (ODBC). In the latter, middle service application is developed using Java language. It communicates with ActiveX control through socket based on TCP/IP and accesses data in GIS Data Server through Java Database Connectivity (JDBC). The first one is usually developed using C/C++, and it is difficult to develop and deploy. The second one is relatively easy to develop, but its performance of data transfer relies on Web bandwidth. A sample application is developed using the latter schema. It is proved that the performance of the sample application is better than that of some other WebGIS applications in some degree.

  18. IT Security Support for the Spaceport Command Control System Development

    NASA Technical Reports Server (NTRS)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  19. [Stranger isolated minors and the french health care system: qualitative study].

    PubMed

    Guégan, Marion; Rivollier, Elisabeth

    2017-01-01

    While waiting for health insurance coverage, unaccompanied foreign minors (UFM) can attend PASS healthcare access clinics in French hospitals. The aim of this study was to identify UFM's representations and perceptions of the French health care system. This qualitative study was based on a series of individual, semi-structured interviews of UFMs attending a PASS clinic. The methodology was approved by the French data protection authority and an ethics committee. A total of 21 UFMs were interviewed. Participants expressed their satisfaction with health care, although the health care system was perceived as a complex system. The prescription is essential, as it enables the patient to obtain medications, the ultimate goal of health care access. Not all participants knew about the existence of national health insurance. They were unable to distinguish between PASS clinics and the hospital in general and the screening role of PASS clinics was often poorly understood. The general practitioner was not always identified and his role was poorly understood. Educators were perceived as playing a decisive role in health care access. Heath is essential for all UFMs. None of them referred to mental health issues. UFMs need better information about the health care system and their rights. The educators' health care support training, their knowledge of the rights of UFMs and the role of healthcare professionals need to be improved. Screening of mental illness needs to be developed.

  20. 48 CFR 304.1300 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...

  1. 48 CFR 304.1300 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...

  2. 48 CFR 304.1300 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...

  3. 48 CFR 304.1300 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...

  4. 48 CFR 304.1300 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...: As defined by the Computer Security Act of 1987, any data/information, “the loss, misuse, or... Project Officer determines greater access controls are necessary, an OPDIV may protect and control...)]. (c) As part of the acquisition planning process, the Project Officer shall determine whether, based...

  5. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  6. Verification of Security Policy Enforcement in Enterprise Systems

    NASA Astrophysics Data System (ADS)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  7. 77 FR 70988 - Control Date To Limit Excessive Accumulation of Control, Qualifying Landings History, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-28

    ... Landings History, and Referendum Eligibility in the Small- Mesh Multispecies Fishery AGENCY: National... history for a limited access or allocation-based management program and limits on the accumulation of..., landings history from Federal waters. DATES: November 28, 2012, shall be known as the ``control date'' for...

  8. Access to health care for undocumented migrant children and pregnant women: the paradox between values and attitudes of health care professionals.

    PubMed

    Ruiz-Casares, Mónica; Rousseau, Cécile; Laurin-Lamothe, Audrey; Rummens, Joanna Anneke; Zelkowitz, Phyllis; Crépeau, François; Steinmetz, Nicolas

    2013-02-01

    Access to health care for undocumented migrant children and pregnant women confronts human rights and professional values with political and institutional regulations that limit services. In order to understand how health care professionals deal with these diverging mandates, we assessed their attitudes toward providing care to this population. Clinicians, administrators, and support staff (n = 1,048) in hospitals and primary care centers of a large multiethnic city responded to an online survey about attitudes toward access to health care services. Analysis examined the role of personal and institutional correlates of these attitudes. Foreign-born respondents and those in primary care centers were more likely to assess the present access to care as a serious problem, and to endorse broad or full access to services, primarily based on human rights reasons. Clinicians were more likely than support staff to endorse full or broad access to health care services. Respondents who approved of restricted or no access also endorsed health as a basic human right (61.1%) and child development as a priority (68.6%). A wide gap separates attitudes toward entitlement to health care and the endorsement of principles stemming from human rights and the best interest of the child. Case-based discussions with professionals facing value dilemmas and training on children's rights are needed to promote equitable practices and advocacy against regulations limiting services.

  9. Exposure to a high-fat high-sugar diet causes strong up-regulation of proopiomelanocortin and differentially affects dopamine D1 and D2 receptor gene expression in the brainstem of rats.

    PubMed

    Alsiö, Johan; Rask-Andersen, Mathias; Chavan, Rohit A; Olszewski, Pawel K; Levine, Allen S; Fredriksson, Robert; Schiöth, Helgi B

    2014-01-24

    A strong link between obesity and dopamine (DA) has been established by studies associating body weight status to variants of genes related to DA signalling. Human and animal studies investigating this relationship have so far focused mainly on the role of DA within the mesolimbic pathway. The aim of this study was to investigate potential DA receptor dysregulation in the brainstem, where these receptors play a potential role in meal termination, during high-fat high-sugar diet (HFHS) exposure. Expression of other key genes, including proopiomelanocortin (POMC), was also analyzed. We randomized rats into three groups; ad libitum access to HFHS (n=24), restricted HFHS access (n=10), or controls (chow-fed, n=10). After 5 weeks, brainstem gene expression was investigated by qRT-PCR. We observed an increase in POMC expression in ad libitum HFHS-fed rats compared to chow-fed controls (p<0.05). Further, expression of DA D2 receptor mRNA was down-regulated in the brainstem of the HFHS ad libitum-fed rats (p<0.05), whereas expression of the DA D1 receptor was upregulated (p<0.05) in these animals compared to chow-fed rats. In control experiments, we observed no effect relative to chow-fed controls on DA-receptor or POMC gene expression in the hypothalamus of HFHS diet-exposed rats, or in the brainstem of acutely food deprived rats. The present findings suggest brainstem POMC to be responsive to palatable foods, and that DA dysregulation after access to energy-dense diets occurs not only in striatal regions, but also in the brainstem, which could be relevant for overeating and for the development and maintenance of obesity. Copyright © 2013. Published by Elsevier Ireland Ltd.

  10. The effectiveness of community-based rehabilitation programmes: an impact evaluation of a quasi-randomised trial.

    PubMed

    Mauro, Vincenzo; Biggeri, Mario; Deepak, Sunil; Trani, Jean-Francois

    2014-11-01

    Community-based rehabilitation (CBR) programmes have been described as highly effective means of promoting the rights and opportunities of persons with disabilities (PwD). Although CBR is often the main way in which PwD in low-income and middle-income countries access rehabilitation services, there is little literature providing rigorous evaluation of their impact on people's well-being. Data were collected in the Mandya and Ramanagar districts (Karnataka state, India), between December 2009 and May 2010. In total 2540 PwD were interviewed using stratified random sampling: 1919 CBR beneficiaries (who joined the programme between 1997 and 2009) and 621 persons who were living in villages not covered by the programme. We controlled for the systematic differences between people joining and not joining the programme using the propensity score matching method controlling for covariates at individual and village level. We evaluated the impact of the programme on the subgroups of PwD who are disadvantaged on the dimensions of interest: access to pensions, use of aid appliances, access to paid jobs and improvement in personal-practical autonomy after 4 and 7 years of joining the CBR. We observed a positive and significant impact of the programme on access to services, rights and opportunities of PwD. The results indicate that compared with the control group access to pensions and allowances, aid appliances, access to paid jobs and personal-practical autonomy increased by 29.7%, 9.4%, 12.3% and 36.2%, respectively, after 7 years. The CBR programme analysed has a positive impact on access to services and the well-being of PwD who are particularly deprived on outcomes of interest. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  11. Potential role of dermatologists and dermatological services in developing and sustaining the leprosy control referral system in resource constrained settings.

    PubMed

    Kawuma, Herman Joseph S

    2007-03-01

    General Health Services that pay due attention to the management of skin conditions are opportune for suspecting and diagnosing early leprosy. In many developing countries, patients with dermatological conditions can only access specialist services in the larger cities and university hospitals; unaffordable costs make the services even less accessible if they can only be provided in the private sector. The high profile of dermatologists in the health services, gives them the opportunity to facilitate the development and implementation of a referral system that includes leprosy. This potential benefit for leprosy control must be initiated by current National Leprosy Programme Managers through establishing formal relationships with the dermatologists and involving them and other partners in the re-designing of leprosy control strategies to keep them in tandem with changing epidemiological patterns, national policies and on -going health sector reforms. The same health service managers should avail of the opportunities from the dermatologists (both in public and private sectors) about the current knowledge on the management and control of leprosy.

  12. Medical-Grade Channel Access and Admission Control in 802.11e EDCA for Healthcare Applications

    PubMed Central

    Son, Sunghwa; Park, Kyung-Joon; Park, Eun-Chan

    2016-01-01

    In this paper, we deal with the problem of assuring medical-grade quality of service (QoS) for real-time medical applications in wireless healthcare systems based on IEEE 802.11e. Firstly, we show that the differentiated channel access of IEEE 802.11e cannot effectively assure medical-grade QoS because of priority inversion. To resolve this problem, we propose an efficient channel access algorithm. The proposed algorithm adjusts arbitrary inter-frame space (AIFS) in the IEEE 802.11e protocol depending on the QoS measurement of medical traffic, to provide differentiated near-absolute priority for medical traffic. In addition, based on rigorous capacity analysis, we propose an admission control scheme that can avoid performance degradation due to network overload. Via extensive simulations, we show that the proposed mechanism strictly assures the medical-grade QoS and improves the throughput of low-priority traffic by more than several times compared to the conventional IEEE 802.11e. PMID:27490666

  13. Variations in Obesity Rates between US Counties: Impacts of Activity Access, Food Environments, and Settlement Patterns.

    PubMed

    Congdon, Peter

    2017-09-07

    There is much ongoing research about the effect of the urban environment as compared with individual behaviour on growing obesity levels, including food environment, settlement patterns (e.g., sprawl, walkability, commuting patterns), and activity access. This paper considers obesity variations between US counties, and delineates the main dimensions of geographic variation in obesity between counties: by urban-rural status, by region, by area poverty status, and by majority ethnic group. Available measures of activity access, food environment, and settlement patterns are then assessed in terms of how far they can account for geographic variation. A county level regression analysis uses a Bayesian methodology that controls for spatial correlation in unmeasured area risk factors. It is found that environmental measures do play a significant role in explaining geographic contrasts in obesity.

  14. The role of spatially-derived access-to-care characteristics in melanoma prevention and control in Los Angeles county.

    PubMed

    Escobedo, Loraine A; Crew, Ashley; Eginli, Ariana; Peng, David; Cousineau, Michael R; Cockburn, Myles

    2017-05-01

    Among 10,068 incident cases of invasive melanoma, we examined the effects of patient characteristics and access-to-care on the risk of advanced melanoma. Access-to-care was defined in terms of census tract-level sociodemographics, health insurance, cost of dermatological services and appointment wait-times, clinic density and travel distance. Public health insurance and education level were the strongest predictors of advanced melanomas but were modified by race/ethnicity and poverty: Hispanic whites and high-poverty neighborhoods were worse off than non-Hispanic whites and low-poverty neighborhoods. Targeting high-risk, underserved Hispanics and high-poverty neighborhoods (easily identified from existing data) for early melanoma detection may be a cost-efficient strategy to reduce melanoma mortality. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Variations in Obesity Rates between US Counties: Impacts of Activity Access, Food Environments, and Settlement Patterns

    PubMed Central

    2017-01-01

    There is much ongoing research about the effect of the urban environment as compared with individual behaviour on growing obesity levels, including food environment, settlement patterns (e.g., sprawl, walkability, commuting patterns), and activity access. This paper considers obesity variations between US counties, and delineates the main dimensions of geographic variation in obesity between counties: by urban-rural status, by region, by area poverty status, and by majority ethnic group. Available measures of activity access, food environment, and settlement patterns are then assessed in terms of how far they can account for geographic variation. A county level regression analysis uses a Bayesian methodology that controls for spatial correlation in unmeasured area risk factors. It is found that environmental measures do play a significant role in explaining geographic contrasts in obesity. PMID:28880209

  16. InkTag: Secure Applications on an Untrusted Operating System

    PubMed Central

    Hofmann, Owen S.; Kim, Sangman; Dunn, Alan M.; Lee, Michael Z.; Witchel, Emmett

    2014-01-01

    InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification, a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes. PMID:24429939

  17. InkTag: Secure Applications on an Untrusted Operating System.

    PubMed

    Hofmann, Owen S; Kim, Sangman; Dunn, Alan M; Lee, Michael Z; Witchel, Emmett

    2013-01-01

    InkTag is a virtualization-based architecture that gives strong safety guarantees to high-assurance processes even in the presence of a malicious operating system. InkTag advances the state of the art in untrusted operating systems in both the design of its hypervisor and in the ability to run useful applications without trusting the operating system. We introduce paraverification , a technique that simplifies the InkTag hypervisor by forcing the untrusted operating system to participate in its own verification. Attribute-based access control allows trusted applications to create decentralized access control policies. InkTag is also the first system of its kind to ensure consistency between secure data and metadata, ensuring recoverability in the face of system crashes.

  18. TaylorActive--Examining the effectiveness of web-based personally-tailored videos to increase physical activity: a randomised controlled trial protocol.

    PubMed

    Vandelanotte, C; Short, C; Plotnikoff, R C; Hooker, C; Canoy, D; Rebar, A; Alley, S; Schoeppe, S; Mummery, W K; Duncan, M J

    2015-10-05

    Physical inactivity levels are unacceptably high and effective interventions that can increase physical activity in large populations at low cost are urgently needed. Web-based interventions that use computer-tailoring have shown to be effective, though people tend to 'skim' and 'scan' text on the Internet rather than thoroughly read it. The use of online videos is, however, popular and engaging. Therefore, the aim of this 3-group randomised controlled trial is to examine whether a web-based physical activity intervention that provides personally-tailored videos is more effective when compared with traditional personally-tailored text-based intervention and a control group. In total 510 Australians will be recruited through social media advertisements, e-mail and third party databases. Participants will be randomised to one of three groups: text-tailored, video-tailored, or control. All groups will gain access to the same web-based platform and a library containing brief physical activity articles. The text-tailored group will additionally have access to 8 sessions of personalised physical activity advice that is instantaneously generated based on responses to brief online surveys. The theory-based advice will be provided over a period of 3 months and address constructs such as self-efficacy, motivation, goal setting, intentions, social support, attitudes, barriers, outcome expectancies, relapse prevention and feedback on performance. Text-tailored participants will also be able to complete 7 action plans to help them plan what, when, where, who with, and how they will become more active. Participants in the video-tailored group will gain access to the same intervention content as those in the text-tailored group, however all sessions will be provided as personalised videos rather than text on a webpage. The control group will only gain access to the library with generic physical activity articles. The primary outcome is objectively measured physical activity. Secondary outcomes include website engagement and retention, quality of life, depression, anxiety, stress, sitting time, sleep and psychosocial correlates of physical activity. Outcomes will be measured at baseline, 3, and 9 months. This study presents an ideal opportunity to study the effectiveness of an isolated feature within a web-based physical activity intervention and the knowledge generated from this study will help to increase intervention effectiveness. Australian New-Zealand Clinical Trial Registry: ACTRN12615000057583 . Registered 22 January 2015. CQUniversity Ethics Project Number: H14/07-163.

  19. The Design of an Interactive Computer Based System for the Training of Signal Corps Officers in Communications Network Management

    DTIC Science & Technology

    1985-08-01

    from the mainframe to the terminals is approximately 56k bits per second (21:3). Score: 8. Expandability. The number of terminals available to the 0...the systems controllers may access any files. For modem link up, a callback system is to be implemented to prevent unauthorized off post access (10:2

  20. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    PubMed Central

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  1. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    PubMed

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  2. The Role of Genome Accessibility in Transcription Factor Binding in Bacteria.

    PubMed

    Gomes, Antonio L C; Wang, Harris H

    2016-04-01

    ChIP-seq enables genome-scale identification of regulatory regions that govern gene expression. However, the biological insights generated from ChIP-seq analysis have been limited to predictions of binding sites and cooperative interactions. Furthermore, ChIP-seq data often poorly correlate with in vitro measurements or predicted motifs, highlighting that binding affinity alone is insufficient to explain transcription factor (TF)-binding in vivo. One possibility is that binding sites are not equally accessible across the genome. A more comprehensive biophysical representation of TF-binding is required to improve our ability to understand, predict, and alter gene expression. Here, we show that genome accessibility is a key parameter that impacts TF-binding in bacteria. We developed a thermodynamic model that parameterizes ChIP-seq coverage in terms of genome accessibility and binding affinity. The role of genome accessibility is validated using a large-scale ChIP-seq dataset of the M. tuberculosis regulatory network. We find that accounting for genome accessibility led to a model that explains 63% of the ChIP-seq profile variance, while a model based in motif score alone explains only 35% of the variance. Moreover, our framework enables de novo ChIP-seq peak prediction and is useful for inferring TF-binding peaks in new experimental conditions by reducing the need for additional experiments. We observe that the genome is more accessible in intergenic regions, and that increased accessibility is positively correlated with gene expression and anti-correlated with distance to the origin of replication. Our biophysically motivated model provides a more comprehensive description of TF-binding in vivo from first principles towards a better representation of gene regulation in silico, with promising applications in systems biology.

  3. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach

    PubMed Central

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-01-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges. PMID:26997936

  4. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    PubMed

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  5. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    PubMed

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  6. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  7. Nutrient demand and fungal access to resources control the carbon allocation to the symbiotic partners in tripartite interactions of Medicago truncatula.

    PubMed

    Kafle, Arjun; Garcia, Kevin; Wang, Xiurong; Pfeffer, Philip E; Strahan, Gary D; Bücking, Heike

    2018-06-02

    Legumes form tripartite interactions with arbuscular mycorrhizal (AM) fungi and rhizobia, and both root symbionts exchange nutrients against carbon from their host. The carbon costs of these interactions are substantial, but our current understanding of how the host controls its carbon allocation to individual root symbionts is limited. We examined nutrient uptake and carbon allocation in tripartite interactions of Medicago truncatula under different nutrient supply conditions, and when the fungal partner had access to nitrogen, and followed the gene expression of several plant transporters of the SUT and SWEET family. Tripartite interactions led to synergistic growth responses and stimulated the phosphate and nitrogen uptake of the plant. Plant nutrient demand but also fungal access to nutrients played an important role for the carbon transport to different root symbionts, and the plant allocated more carbon to rhizobia under nitrogen demand, but more carbon to the fungal partner when nitrogen was available. These changes in carbon allocation were consistent with changes in the SUT and SWEET expression. Our study provides important insights into how the host plant controls its carbon allocation under different nutrient supply conditions and changes its carbon allocation to different root symbionts to maximize its symbiotic benefits. This article is protected by copyright. All rights reserved.

  8. Advantages and Disadvantages for Receiving Internet-Based HIV/AIDS Interventions at Home or at Community Based Organization

    PubMed Central

    Green, Shana M.; Lockhart, Elizabeth; Marhefka, Stephanie L.

    2015-01-01

    Within recent years public health interventions have become technologically based to reflect the digital age we currently live in and appeal to the public in innovative and novel ways. The Internet breaks down boundaries distance imposes and increases our ability to reach and connect with people. Internet-based interventions have the potential to expand access to effective behavioral interventions. The US National HIV/AIDS Strategy states that people living with HIV should have access to effective behavioral interventions like Healthy Relationships (HR) to help them develop safe sex and disclosure skills. However, access to HR is limited across the country, especially for people in remote or rural areas. Internet-based Healthy Relationships Video Groups (HR-VG) delivered at home or community based organizations (CBOs) can possibly expand access. This study assesses the preferences of women living with HIV (WLH) for participation in HR-VG among 21 WLH who participated in a randomized control trial (RCT) testing HR-VG and completed open-ended semi-structured telephone interviews. Transcripts were thematically analyzed to determine advantages, disadvantages and overall preference for home or agency delivery of HR-VG. Themes relating to convenience, technology access, privacy, distractions, HIV serostatus disclosure and social opportunities were identified as advantages or disadvantages to participating in HR-VG at each location. Overall privacy was the most salient concern of accessing HR-VG at home or at a CBO. Considering the concerns expressed by WLH, further studies are needed to assess how an Internet-based intervention delivered at home for WLH can maintain privacy while being cost effective. PMID:26357907

  9. Advantages and disadvantages for receiving Internet-based HIV/AIDS interventions at home or at community-based organizations.

    PubMed

    Green, Shana M; Lockhart, Elizabeth; Marhefka, Stephanie L

    2015-01-01

    Within recent years, public health interventions have become technology based to reflect the digital age we currently live in and appeal to the public in innovative and novel ways. The Internet breaks down boundaries distance imposes and increases our ability to reach and connect with people. Internet-based interventions have the potential to expand access to effective behavioral interventions (EBIs). The US National HIV/AIDS Strategy states that people living with HIV should have access to EBIs such as healthy relationships (HR) to help them develop safe sex and disclosure skills. However, access to HR is limited across the country, especially for people in remote or rural areas. Internet-based healthy relationships video groups (HR-VG) delivered at home or community-based organizations (CBOs) can possibly expand access. This study assesses the preferences of women living with HIV (WLH) for participation in HR-VG among 21 WLH who participated in a randomized control trial (RCT) testing HR-VG and completed open-ended semi-structured telephone interviews. Transcripts were thematically analyzed to determine advantages and disadvantages of home or CBO delivery of HR-VG. Themes relating to convenience, technology access, privacy, distractions, HIV serostatus disclosure, and social opportunities were identified as advantages or disadvantages to participating in HR-VG at each location. Overall, privacy was the most salient concern of accessing HR-VG at home or at a CBO. Considering the concerns expressed by WLH, further studies are needed to assess how an Internet-based intervention delivered at home for WLH can maintain privacy while being cost effective.

  10. Non-target Site Tolerance Mechanisms Describe Tolerance to Glyphosate in Avena sterilis.

    PubMed

    Fernández-Moreno, Pablo T; Alcantara-de la Cruz, Ricardo; Cruz-Hipólito, Hugo E; Rojano-Delgado, Antonia M; Travlos, Ilias; De Prado, Rafael

    2016-01-01

    Sterile wild oat (Avena sterilis L.) is an autogamous grass established in warm climate regions. This species has been used as a cover crop in Mediterranean perennial crops during the spring period prior to initiating competition with the main crop for water and nutrients. However, such cover crops need to be controlled (by glyphosate or tillage) before the beginning of summer period (due to the possibility of intense drought stress). In 2011, the olive grove farmers of southern Spain expressed dissatisfaction because of the ineffective control with glyphosate on A. sterilis. Experiments were conducted to determine whether the continued use of glyphosate over a 5 year period had selected a new resistant or tolerant species. The GR50 values obtained for A. sterilis were 297.12 and 245.23 g ae ha(-1) for exposed (E) and un-exposed (UE) glyphosate accessions, respectively. The spray retention and shikimic acid accumulation exhibited a non-significant difference between the two accessions. The results of (14)C- glyphosate absorption was the same in the two accessions (E and UE), while the translocation from the treated leaf to the rest of the shoots and roots was similar in A. sterilis accessions. Glyphosate metabolism to aminomethylphosphonic acid (AMPA) and glyoxylate was similar in both accessions, but increased after treatment with glyphosate, indicating that metabolism plays an important role in tolerance. Both A. sterilis accessions, present similarity in the 5-enolpyruvylshikimate-3-phosphate synthase (EPSPS) activity enzyme with different glyphosate concentrations and without glyphosate, confirming that both accessions present the same genomic characteristics. The above-mentioned results indicate that innate tolerance to glyphosate in A. sterilis is probably and partly due to reduced herbicide absorption and translocation and metabolism compared to the susceptibility of other grasses weeds like Chloris inflata, Eleusine indica, and Lolium rigidum.

  11. High-fat hyperphagia in neurotrophin-4 deficient mice reveals potential role of vagal intestinal sensory innervation in long-term controls of food intake.

    PubMed

    Byerly, Mardi S; Fox, Edward A

    2006-06-12

    Neurotrophin-4 (NT-4) deficient mice exhibit substantial loss of intestinal vagal afferent innervation and short-term deficits in feeding behavior, suggesting reduced satiation. However, they do not show long-term changes in feeding or body weight because of compensatory behaviors. The present study examined whether high-fat hyperphagia induction would overcome compensation and reveal long-term effects associated with the reduced vagal sensory innervation of NT-4 mutants. First, modifications of a feeding schedule previously developed in rats were examined in wild-type mice to identify the regimen most effective at producing hyperphagia. The most successful schedule, which was run for 26 days, included access to a 43%-fat diet and pelleted chow every other day and access to only powdered chow on the alternate days. On high-fat access days mice consumed 25% more calories than mice with continuous daily access to the same high-fat diet and pelleted chow. This feeding regimen also induced hyperphagia in NT-4 deficient mice and their wild-type controls: on high-fat exposure days mutants consumed 35% more calories relative to continuous-access mutants, and wild types ate 25% more than continuous-access wild types. Moreover, on high-fat access days the alternating NT-4 mutants significantly increased caloric intake by 9% compared to alternating wild types. Thus, high-fat hyperphagia appeared to override compensation, permitting short-term changes in meal consumption by mutants that accrued into long-term changes in total daily food intake. This raises the possibility that intestinal vagal sensory innervation contributes to long-term, as well as to short-term regulation of food intake.

  12. Masculine attitudes of superiority deter men from accessing antiretroviral therapy in Dar es Salaam, Tanzania.

    PubMed

    Nyamhanga, Tumaini M; Muhondwa, Eustace P Y; Shayo, Rose

    2013-10-22

    This article presents part of the findings from a larger study that sought to assess the role that gender relations play in influencing equity regarding access and adherence to antiretroviral therapy (ART). Review of the literature has indicated that, in Southern and Eastern Africa, fewer men than women have been accessing ART, and the former start using ART late, after HIV has already been allowed to advance. The main causes for this gender gap have not yet been fully explained. To explore how masculinity norms limit men's access to ART in Dar es Salaam. This article is based on a qualitative study that involved the use of focus group discussions (FGDs). The study employed a stratified purposive sampling technique to recruit respondents. The study also employed a thematic analysis approach. Overall, the study's findings revealed that men's hesitation to visit the care and treatment clinics signifies the superiority norm of masculinity that requires men to avoid displaying weakness. Since men are the heads of families and have higher social status, they reported feeling embarrassed at having to visit the care and treatment clinics. Specifically, male respondents indicated that going to a care and treatment clinic may raise suspicion about their status of living with HIV, which in turn may compromise their leadership position and cause family instability. Because of this tendency towards 'hiding', the few men who register at the public care and treatment clinics do so late, when HIV-related signs and symptoms are already far advanced. This study suggests that the superiority norm of masculinity affects men's access to ART. Societal expectations of a 'real man' to be fearless, resilient, and emotionally stable are in direct conflict with expectations of the treatment programme that one has to demonstrate health-promoting behaviour, such as promptness in attending the care and treatment clinic, agreeing to take HIV tests, and disclosing one's status of living with HIV to at least one's spouse or partner. Hence, there is a need for HIV control agencies to design community-based programmes that will stimulate dialogue on the deconstruction of masculinity notions.

  13. Masculine attitudes of superiority deter men from accessing antiretroviral therapy in Dar es Salaam, Tanzania

    PubMed Central

    Nyamhanga, Tumaini M.; Muhondwa, Eustace P.Y.; Shayo, Rose

    2013-01-01

    Background This article presents part of the findings from a larger study that sought to assess the role that gender relations play in influencing equity regarding access and adherence to antiretroviral therapy (ART). Review of the literature has indicated that, in Southern and Eastern Africa, fewer men than women have been accessing ART, and the former start using ART late, after HIV has already been allowed to advance. The main causes for this gender gap have not yet been fully explained. Objective To explore how masculinity norms limit men's access to ART in Dar es Salaam. Design This article is based on a qualitative study that involved the use of focus group discussions (FGDs). The study employed a stratified purposive sampling technique to recruit respondents. The study also employed a thematic analysis approach. Results Overall, the study's findings revealed that men's hesitation to visit the care and treatment clinics signifies the superiority norm of masculinity that requires men to avoid displaying weakness. Since men are the heads of families and have higher social status, they reported feeling embarrassed at having to visit the care and treatment clinics. Specifically, male respondents indicated that going to a care and treatment clinic may raise suspicion about their status of living with HIV, which in turn may compromise their leadership position and cause family instability. Because of this tendency towards ‘hiding’, the few men who register at the public care and treatment clinics do so late, when HIV-related signs and symptoms are already far advanced. Conclusion This study suggests that the superiority norm of masculinity affects men's access to ART. Societal expectations of a ‘real man’ to be fearless, resilient, and emotionally stable are in direct conflict with expectations of the treatment programme that one has to demonstrate health-promoting behaviour, such as promptness in attending the care and treatment clinic, agreeing to take HIV tests, and disclosing one's status of living with HIV to at least one's spouse or partner. Hence, there is a need for HIV control agencies to design community-based programmes that will stimulate dialogue on the deconstruction of masculinity notions. PMID:24152373

  14. Association of Commercial Rice Varieties with Weedy Rice Accessions (Oryza sativa complex) in Pulau Pinang's Rice Granary Area.

    PubMed

    Hussain, Zainudin; Man, Azmi; Othman, Ahmad Sofiman

    2011-12-01

    Weedy rice (WR) is the most significant weed in direct-seeded fields. It has morphological characteristics similar to those of cultivated rice varieties. WR is more difficult to control than other weeds. We collected WR accessions from four sites within the Pulau Pinang rice growing areas. Thirty six different accessions were collected from each site: B, the northern site; P, the central site; A, the southern site; and N, the southwestern site. Wild rice (Oryza rufipogon), which grows in the sampled areas, was also collected together with four varieties (MR84, MR185, MR211 and MR219) that have been widely planted in these areas for a long period of time. The objective of this study was to compare the morphological characteristics of the WR accessions and cultivated rice. Twenty characteristics were observed for the comparison of WR accessions and rice cultivars. Morpho-matrix analyses allowed the specimens to be grouped to two main groups (A and B), based on a 95% dissimilarity matrix. Group A was subdivided into 7 subgroups consisting of a few WR accessions, wild rice and MR211 (control), and group B was subdivided to 10 subgroups consisting of other WR accessions and the 3 other control varieties. Dendrogram analysis indicated that the morphological traits used in this study were able to differentiate among the WR accessions and the cultivars, except for rice cultivar MR211 and WRA8, which grouped together in subgroup A2. STRUCTURE program analysis indicated that all individuals were distinguishable and were divided into 18 clusters. These results suggest that some genes of the WR accessions have been influenced by commercial varieties. The information gained from this study will be useful to develop rice weed management protocols and good agricultural practices to control WR in the future.

  15. Perceived rules and accessibility: measurement and mediating role in the association between parental education and vegetable and soft drink intake.

    PubMed

    Gebremariam, Mekdes K; Lien, Nanna; Torheim, Liv Elin; Andersen, Lene F; Melbye, Elisabeth L; Glavin, Kari; Hausken, Solveig E S; Sleddens, Ester F C; Bjelland, Mona

    2016-08-17

    The existence of socioeconomic differences in dietary behaviors is well documented. However, studies exploring the mechanisms behind these differences among adolescents using comprehensive and reliable measures of mediators are lacking. The aims of this study were (a) to assess the psychometric properties of new scales assessing the perceived rules and accessibility related to the consumption of vegetables and soft drinks and (b) to explore their mediating role in the association between parental education and the corresponding dietary behaviors. A cross-sectional survey including 440 adolescents from three counties in Norway (mean age 14.3 years (SD = 0.6)) was conducted using a web-based questionnaire. Principal component analysis, test-retest and internal reliability analysis were conducted. The mediating role of perceived accessibility and perceived rules in the association between parental education and the dietary behaviors was explored using linear regression analyses. Factor analyses confirmed two separate subscales, named "accessibility" and "rules", both for vegetables and soft drinks (factor loadings >0.60). The scales had good internal consistency reliability (0.70-0.87). The test-retest reliability of the scales was moderate to good (0.44-0.62). Parental education was inversely related to the consumption of soft drinks and positively related to the consumption of vegetables. Perceived accessibility and perceived rules related to soft drink consumption were found to mediate the association between parental education and soft drink consumption (47.5 and 8.5 % of total effect mediated). Accessibility of vegetables was found to mediate the association between parental education and the consumption of vegetables (51 % of total effect mediated). The new scales developed in this study are comprehensive and have adequate validity and reliability; they are therefore considered appropriate for use among 13-15 year-olds. Parents, in particular those with a low educational background, should be encouraged to increase the accessibility of vegetables and to decrease the accessibility of soft drinks, in particular during dinner. Enforcing parental rules limiting soft drink intake in families with low parental education also appears relevant.

  16. The use of robotics in otolaryngology-head and neck surgery: a systematic review.

    PubMed

    Maan, Zeshaan N; Gibbins, Nick; Al-Jabri, Talal; D'Souza, Alwyn R

    2012-01-01

    Robotic surgery has become increasingly used due to its enhancement of visualization, precision, and articulation. It eliminates many of the problems encountered with conventional minimally invasive techniques and has been shown to result in reduced blood loss and complications. The rise in endoscopic procedures in otolaryngology-head and neck surgery, and associated difficulties, suggests that robotic surgery may have a role to play. To determine whether robotic surgery conveys any benefits compared to conventional minimally invasive approaches, specifically looking at precision, operative time, and visualization. A systematic review of the literature with a defined search strategy. Searches of MEDLINE, EMBASE and CENTRAL using strategy: ((robot* OR (robot*AND surgery)) AND (ent OR otolaryngology)) to November 2010. Articles reviewed by authors and data compiled in tables for analysis. There were 33 references included in the study. Access and visualization were regularly mentioned as key benefits, though no objective data has been recorded in any study. Once initial setup difficulties were overcome, operative time was shown to decrease with robotic surgery, except in one controlled series of thyroid surgeries. Precision was also highlighted as an advantage, particularly in otological and skull base surgery. Postoperative outcomes were considered equivalent to or better than conventional surgery. Cost was the biggest drawback. The evidence base to date suggests there are benefits to robotic surgery in OHNS, particularly with regards to access, precision, and operative time but there is a lack of controlled, prospective studies with objective outcome measures. In addition, economic feasibility studies must be carried out before a robotic OHNS service is established. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Information governance in NHS's NPfIT: a case for policy specification.

    PubMed

    Becker, Moritz Y

    2007-01-01

    The National Health Service's (NHS's) National Programme for Information Technology (NPfIT) in the UK with its proposed nation-wide online health record service poses serious technical challenges, especially with regard to access control and patient confidentiality. The complexity of the confidentiality requirements and their constantly evolving nature (due to changes in law, guidelines and ethical consensus) make traditional technologies such as role-based access control (RBAC) unsuitable. Furthermore, a more formal approach is also needed for debating about and communicating on information governance, as natural-language descriptions of security policies are inherently ambiguous and incomplete. Our main goal is to convince the reader of the strong benefits of employing formal policy specification in nation-wide electronic health record (EHR) projects. Many difficulties could be alleviated by specifying the requirements in a formal authorisation policy language such as Cassandra. The language is unambiguous, declarative and machine-enforceable, and is based on distributed constrained Datalog. Cassandra is interpreted within a distributed Trust Management environment, where digital credentials are used for establishing mutual trust between strangers. To demonstrate how policy specification can be applied to NPfIT, we translate a fragment of natural-language NHS specification into formal Cassandra rules. In particular, we present policy rules pertaining to the management of Clinician Sealed Envelopes, the mechanism by which clinical patient data can be concealed in the nation-wide EHR service. Our case study exposes ambiguities and incompletenesses in the informal NHS documents. We strongly recommend the use of trust management and policy specification technology for the implementation of nation-wide EHR infrastructures. Formal policies can be used for automatically enforcing confidentiality requirements, but also for specification and communication purposes. Formalising the requirements also reveals ambiguities and missing details in the currently used informal specification documents.

  18. The economics of optimal health and productivity in smallholder livestock systems in developing countries.

    PubMed

    McDermott, J J; Randolph, T F; Staal, S J

    1999-08-01

    Livestock kept or produced in smallholder farming systems are an important component of the agricultural economy in the developing world. The role of livestock on smallholder farms varies widely, providing draught power for crop production or as a production activity for subsistence needs or market sale under systems ranging from extensive pastoralist to intensive, peri-urban feeder and dairy systems. A set of unique conditions and features characterise smallholder systems, and these need to be appreciated when assessing the strategies that have evolved for managing animal health in smallholder systems, and evaluating opportunities for improving disease control strategies. To provide a framework for discussing animal health issues and analytical methodogies, a typology of smallholder livestock and crop/livestock systems is developed. The typology considers livestock systems both in terms of the degree of intensification, as measured by market orientation and intensity of factor use, and in terms of importance within the household economy, as measured by contribution to household income. A number of characteristics are identified that distinguish smallholder systems from the commercialised systems of developed countries, including the multiple functions livestock serve, the integrated nature of livestock activities, multiple objectives of producers and lower capacity to bear risk at the household level, as well as poor infrastructure, markets, and access to information at the community level. Three representative smallholder livestock systems from Africa are described in detail, highlighting the relevant characteristics and the implications for analysing disease control strategies. Smallholder dairy systems in Kenya demonstrate the role of individual producer decision-making for animal health management in intensive, market-oriented systems, placing emphasis on farm-level risk and production management aspects of disease control. In extensive pastoralist systems where epidemic disease are still important and infrastructure is poor, disease control primarily involves managing communal natural resources, requiring a different analytical approach. Finally, in crop farming systems using draught cattle, the livestock activity is an integrated component of crop production and this must be reflected in the approach used to evaluate draught animal health management. Continued development of analytical approaches and decision-support tools for disease control strategies adapted to the special characteristics of these systems will be needed as smallholder systems continue to intensify in areas with good market access, and those in marginal areas face increasing pressures to optimally manage the natural resource base.

  19. AEROSAT Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  20. Aerosat Access Control Summary

    DOT National Transportation Integrated Search

    1976-10-01

    The report consists of three basic sections. Section 2 is a discussion of the communications concepts germane to AEROSAT access control. It defines and reviews the principles of multiplexing, multiple access, demand access, and access control and rel...

  1. Target Acquisition Performance of a Satellite Based Multiple Access Surveillance System

    DOT National Transportation Integrated Search

    1975-03-01

    A quantitative description of the detection performance of a satellite-based surveillance system is presented. This system is one which has been proposed for CONUS coverage in an advanced air traffic control system. In addition, the computer program ...

  2. Community access to health information in Ireland.

    PubMed

    Macdougall, J

    1999-06-01

    This paper is based on a research project conducted on consumer health information (CHI) in the Republic of Ireland, the results of which were published in a report entitled Well Read: Developing Consumer Health Information in Ireland. The paper describes the research methodology and the Irish experience in relation to CHI followed by a discussion of access problems, illustrated with examples from the special needs and primary care sectors. The role of information providers in relation to primary healthcare and libraries is examined briefly, and finally the main research conclusions and recommendations are highlighted.

  3. Making the Net More Intelligent.

    ERIC Educational Resources Information Center

    Somers, Doug

    1998-01-01

    Discusses how service providers can address the challenge of costs and the need for attractive services valuable to business customers. Focuses on Internet service control; applying intelligent networking features to the internet working services dilemma; and providing access control over network-based applications for Internet virtual private…

  4. The Effectiveness and Cost-Effectiveness of Web-Based and Home-Based Postnatal Psychoeducational Interventions for First-Time Mothers: Randomized Controlled Trial Protocol

    PubMed Central

    Chong, Yap-Seng; Jiao, Nana; Luo, Nan

    2018-01-01

    Background In addition to recuperating from the physical and emotional demands of childbirth, first-time mothers are met with demands of adapting to their social roles while picking up new skills to take care of their newborn. Mothers may not feel adequately prepared for parenthood if they are situated in an unsupported environment. Postnatal psychoeducational interventions have been shown to be useful and can offer a cost-effective solution for improving maternal outcomes. Objective The objective of this study was to examine the effectiveness and cost-effectiveness of Web-based and home-based postnatal psychoeducational programs for first-time mothers on maternal outcomes. Methods A randomized controlled three-group pre- and posttests experimental design is proposed. This study plans to recruit 204 first-time mothers on their day of discharge from a public tertiary hospital in Singapore. Eligible first-time mothers will be randomly allocated to either a Web-based psychoeducation group, a home-based psychoeducation group, or a control group receiving standard care. The outcomes include maternal parental self-efficacy, social support, psychological well-being (anxiety and postnatal depression), and cost evaluation. Data will be collected at baseline, 1 month, 3 months, and 6 months post-delivery. Results The recruitment (n=204) commenced in October 2016 and was completed in February 2017, with 68 mothers in each group. The 6-month follow-up data collection was completed in August 2017. Conclusions This study may identify an effective and cost-effective Web-based postnatal psychoeducational program to improve first-time mothers’ health outcomes. The provision of a widely-accessed Web-based postnatal psychoeducational program will eventually lead to more positive postnatal experiences for first-time mothers and positively influence their future birth plans. Trial Registration International Standard Randomized Controlled Trial Number (ISRCTN): 45202278; http://www.isrctn.com/ISRCTN45202278 (Archived by WebCite at http://www.webcitation.org/6whx0pQ2F). PMID:29386175

  5. Attitudes and opinions of nursing and medical staff regarding the supply and storage of medicinal products before and after the installation of a drawer-based automated stock-control system.

    PubMed

    Ardern-Jones, Joanne; Hughes, Donald K; Rowe, Philip H; Mottram, David R; Green, Christopher F

    2009-04-01

    This study assessed the attitudes of Emergency Department (ED) staff regarding the introduction of an automated stock-control system. The objectives were to determine attitudes to stock control and replenishment, speed of access to the system, ease of use and the potential for future uses of the system. The study was carried out in the Countess of Chester Hospital NHS Foundation Trust (COCH) ED, which is attended by over 65,000 patients each year. All 68 ED staff were sent pre-piloted, semi-structured questionnaires and reminders, before and after automation of medicines stock control. Pre-implementation, 35 staff (66.1% of respondents) reported that problems occurred with access to medicine storage keys 'very frequently' or 'frequently'. Twenty-eight (52.8%) respondents 'agreed' or 'strongly agreed' that medicines were quickly accessed, which rose to 41 (77%) post-automation (P < 0.001). Improvement was reported in stock replenishment and storage of stock injections and oral medicines, but there were mixed opinions regarding storage of bulk fluids and refrigerated items. Twenty-seven (51.9%) staff reported access to the system within 1 min and 17 (32.7%) staff reported access within 1-2 min. The majority of staff found the system 'easy' or 'very easy' to use and there was a non-significant relationship between previous use of information technology and acceptance of the system. From a staff satisfaction perspective, automation improved medicines storage, security and stock control, and addressed the problem of searching for keys to storage areas. Concerns over familiarity with computers, queuing, speed of access and an improved audit trail do not appear to have been issues, when compared with the previous manual storage of medicines.

  6. Survey of Condition Indicators for Condition Monitoring Systems (Open Access)

    DTIC Science & Technology

    2014-09-29

    Hinesburg, Vermont, 05461, USA jz@renewablenrgsystems.com ABSTRACT Currently, the wind energy industry is swiftly changing its maintenance strategy...from schedule based maintenance to predictive based maintenance . Condition monitoring systems (CMS) play an important role in the predictive... maintenance cycle. As condition monitoring systems are being adopted by more and more OEM and O&M service providers from the wind energy industry, it is

  7. Near Field Observations of Seismicity in Volcanic Environments: A Read-Made Field Laboratory

    NASA Astrophysics Data System (ADS)

    Bean, C. J.; Thun, J.; Eibl, E. P. S.; Benson, P. M.; Rowley, P.; Lokmer, I.; Cauchie, L.

    2017-12-01

    Volcanic environments experience periods of rapid stress fluctuations and consequent seismicity. This volcano seismicity is diverse in character, spanning the range from discrete high frequency events through low-frequency earthquakes and tremor. The inter-relationships between these events appear to be controlled by edifice rheology, stress state and the presence of fluids (which help modulate the stress field). In general volcanoes are accessible to instrumentation, allowing near-field access to the seismicity at play. Here we present results from a range of field, numerical and laboratory experiments that demonstrate the controls that rheology and strain rate play on seismicity type. In particular we demonstrate the role played by internal friction angles on the initiation and evolution of seismicity, in dry weak-compliant volcanic materials. Furthermore we show the importance of near field observation in constraining details of the seismic source, in a meso-scale field setting.

  8. Decomposing Educational Inequalities in Child Mortality: A Temporal Trend Analysis of Access to Water and Sanitation in Peru.

    PubMed

    Bohra, Tasneem; Benmarhnia, Tarik; McKinnon, Britt; Kaufman, Jay S

    2017-01-11

    Previous studies of inequality in health and mortality have largely focused on income-based inequality. Maternal education plays an important role in determining access to water and sanitation, and inequalities in child mortality arising due to differential access, especially in low- and middle-income countries such as Peru. This article aims to explain education-related inequalities in child mortality in Peru using a regression-based decomposition of the concentration index of child mortality. The analysis combines a concentration index created along a cumulative distribution of the Demographic and Health Surveys sample ranked according to maternal education, and decomposition measures the contribution of water and sanitation to educational inequalities in child mortality. We observed a large education-related inequality in child mortality and access to water and sanitation. There is a need for programs and policies in child health to focus on ensuring equity and to consider the educational stratification of the population to target the most disadvantaged segments of the population. © The American Society of Tropical Medicine and Hygiene.

  9. Basic processes in reading aloud and colour naming: towards a better understanding of the role of spatial attention.

    PubMed

    Robidoux, Serje; Rauwerda, Derek; Besner, Derek

    2014-05-01

    Whether or not lexical access from print requires spatial attention has been debated intensively for the last 30 years. Studies involving colour naming generally find evidence that "unattended" words are processed. In contrast, reading-based experiments do not find evidence of distractor processing. One theory ascribes the discrepancy to weaker attentional demands for colour identification. If colour naming does not capture all of a subject's attention, the remaining attentional resources can be deployed to process the distractor word. The present study combined exogenous spatial cueing with colour naming and reading aloud separately and found that colour naming is less sensitive to the validity of a spatial cue than is reading words aloud. Based on these results, we argue that colour naming studies do not effectively control attention so that no conclusions about unattended distractor processing can be drawn from them. Thus we reiterate the consistent conclusion drawn from reading aloud and lexical decision studies: There is no word identification without (spatial) attention.

  10. Homeless but connected: the role of heterogeneous social network ties and social networking technology in the mental health outcomes of street-living adolescents.

    PubMed

    Rice, Eric; Kurzban, Seth; Ray, Diana

    2012-12-01

    Although social integration tends to have positive effects on the mental health of housed adolescents, the role of homeless adolescents' social networks is more ambiguous. Social network data were collected from 136 homeless adolescents in Hollywood, California to examine how network ties are associated with symptoms of anxiety and depression. Face-to-face relationships with street-based peers were a risk factor for both anxiety and depression, while contacting home-based friends through social networking technology was found to be protective for depression. Community-based and public agencies serving homeless adolescents should consider facilitating the maintenance of these protective relationships by providing internet access.

  11. Network Control Center User Planning System (NCC UPS)

    NASA Astrophysics Data System (ADS)

    Dealy, Brian

    1991-09-01

    NCC UPS is presented in the form of the viewgraphs. The following subject areas are covered: UPS overview; NCC UPS role; major NCC UPS functional requirements; interactive user access levels; UPS interfaces; interactive user subsystem; interface navigation; scheduling screen hierarchy; interactive scheduling input panels; autogenerated schedule request panel; schedule data tabular display panel; schedule data graphic display panel; graphic scheduling aid design; and schedule data graphic display.

  12. Network Control Center User Planning System (NCC UPS)

    NASA Technical Reports Server (NTRS)

    Dealy, Brian

    1991-01-01

    NCC UPS is presented in the form of the viewgraphs. The following subject areas are covered: UPS overview; NCC UPS role; major NCC UPS functional requirements; interactive user access levels; UPS interfaces; interactive user subsystem; interface navigation; scheduling screen hierarchy; interactive scheduling input panels; autogenerated schedule request panel; schedule data tabular display panel; schedule data graphic display panel; graphic scheduling aid design; and schedule data graphic display.

  13. Do We Still Need Controlled Vocabulary? Of Course, We Do! But How Do We Get It: The Roles for Text Analysis Softwares.

    ERIC Educational Resources Information Center

    Greenfield, Rich

    The author argues that traditional library cataloging (MARC) and the online public access catalog (OPAC) are in collision with the world of the Internet because items in electronic formats undergo MARC cataloging only on a very selective basis. Also the library profession initially isolated itself from World Wide Web development by predicting no…

  14. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    PubMed

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  15. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling

    PubMed Central

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-01-01

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608

  16. Across the health-social care divide: elderly people as active users of health care and social care.

    PubMed

    Roberts, K

    2001-03-01

    Several ways in which elderly people may assume an active role when using welfare services are discussed here. Selected findings are presented from a study that explored the experience and behaviour of elderly people on discharge from inpatient care with regard to criteria indicating user influence or control (namely participation, representation, access, choice, information and redress). Data were collected via semistructured interviews with service users (n = 30) soon after their return home from hospital. A number of differences were revealed between health care and social care in relation to users being provided with opportunities to assume an active role and in being willing and able to assume an active role. These differences were manifest in elderly service users accessing services, seeking information, exercising choice and acting independently of service providers. It appeared paradoxical that contact points were more easily defined with regard to health care yet users were more likely to exercise choice and act independently in securing social care. It is suggested that social care needs and appropriate service delivery are more easily recognised than making the link between perceived health care needs and appropriate services. In addition, it appeared that informal and private providers are more widely available and accessible for social care. If comprehensive continuing care is to be provided, incorporating both health and social care elements, greater uniformity appears to be required across the welfare sector. Lessons for social care provision from the delivery of health care suggest the clear definition of contact points to facilitate service use. Making health care more accessible, however, does not appear to be easily attainable due to the monopoly provision of health care and the lack of direct purchasing power by potential users.

  17. Evidence-based medicine: what has happened in the past 50 years?

    PubMed

    Mellis, Craig

    2015-01-01

    Although the phrase 'evidence-based medicine' (EBM) was used for the first time in the medical literature less than 25 years ago, the history of EBM goes back for centuries. What is remarkable is how popular and how globally accepted the EBM movement has become in such a short time. Many famous, past clinicians have played major roles in the disciplines that preceded EBM, particularly 'clinical epidemiology'. It soon became clear to the early EBM champions that 'evidence' was only part of the clinical decision-making process. Consequently, both clinical expertise and the patient's values and preferences were rapidly incorporated into the concept we now know as 'EBM'. The current need for high-quality, easily accessible 'evidence-based summaries' for busy clinicians is now apparent, as traditional EBM requires both considerable time and skill. Consequently, there is a progressive move away from the primary literature (such as randomised controlled trials) to systematic reviews and other 'evidence-based summaries'. The future of EBM will almost certainly involve widespread utilisation of 'clinical (computer)-based decision support systems'. © 2014 The Author. Journal of Paediatrics and Child Health © 2014 Paediatrics and Child Health Division (Royal Australasian College of Physicians).

  18. Ontology Research and Development. Part 1-A Review of Ontology Generation.

    ERIC Educational Resources Information Center

    Ding, Ying; Foo, Schubert

    2002-01-01

    Discusses the role of ontology in knowledge representation, including enabling content-based access, interoperability, communications, and new levels of service on the Semantic Web; reviews current ontology generation studies and projects as well as problems facing such research; and discusses ontology mapping, information extraction, natural…

  19. The Librarian and the Library User: What the Future Holds.

    ERIC Educational Resources Information Center

    Electronic Library, 1997

    1997-01-01

    Discusses the role of information professionals in the future, based on a session at the Online Information 96 conference in London (England). Topics include equipment and software needs; technological advances; a trend toward distance education; how library users are adapting to change; interlibrary loans; online public access catalogs; and…

  20. Paraprofessionals in Rural Development. Concept Paper.

    ERIC Educational Resources Information Center

    Colle, Royal D.; And Others

    To establish a better knowledge base concerning the role of developing nation paraprofessionals in facilitating rural poor access to public services and in order to identify problems that arise in developing these patterns of service, an extensive literature search and compilation and analysis of over 50 health projects and 30 agricultural…

Top