WorldWideScience

Sample records for access denial systems

  1. High temperature adhesive silicone foam composition, foam generating system and method of generating foam. [For access denial

    Mead, J.W.; Montoya, O.J.; Rand, P.B.; Willan, V.O.

    1983-12-21

    Access to a space is impeded by generation of a sticky foam from a silicone polymer and a low boiling solvent such as a halogenated hydrocarbon. In a preferred aspect, the formulation is polydimethylsiloxane gel mixed with F502 Freon as a solvent and blowing agent, and pressurized with CO/sub 2/ in a vessel to about 250 PSI, whereby when the vessel is opened, a sticky and solvent resistant foam is deployed. The foam is deployable, over a wide range of temperatures, adhering to wet surfaces as well as dry, is stable over long periods of time and does not propagate flame or lose adhesive properties during an externally supported burn.

  2. 28 CFR 17.47 - Denial or revocation of eligibility for access to classified information.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Denial or revocation of eligibility for access to classified information. 17.47 Section 17.47 Judicial Administration DEPARTMENT OF JUSTICE..., the identity of the deciding authority, and written notice of the right to appeal. (d) Within 30...

  3. 32 CFR Appendix B to Part 505 - Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal...

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal Authorities) B Appendix B to Part 505 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS...

  4. Security solution against denial of service attacks in BESIP system

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  5. The current German regime governing third-party access to power transmission systems and denial of TPA, discussed from the angle of applicable civil law, energy industry law and antitrust law

    The German EnWG (energy industry law) for deregulation of the energy sector and implementation of the Internal Energy Market Directive of the EU contains an obligation to contract and make rules for establishing a legally binding system for access to and use of third parties of transmission and distribution networks in the competitive electricity market. The design of such contracts under private law as well as the grid code for network operation primarily being a matter of the contracting parties, the legal basis and opportunities for governmental supervisory functions are embodied in various laws. The legal analysis of this contribution examines the current situation and asks whether the existing provisions of the German BGB (Civil Code), antitrust law and the EnWG offer practicable means in case of need for governmental supervisory action in order to ensure evolution and adherence to a legal framework that will ensure the objectives of the politically willed deregulation of the energy sector and foster development of an open market serving the public welfare. (CB)

  6. OGIS Access System

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  7. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identify to a central processor. The system installed at the Barnwell Nuclear Fuel Plant is described

  8. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identity to a central processor. The central processor associates that individual's authorization file with a card-key obtained at the access point. The system generates a record of personnel movement, provides a personnel inventory on a real-time basis, and it can retrieve a record of all prior events. The system installed at the Barnwell Nuclear Fuel Plant is described

  9. Nuclear information access system

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  10. Imprisoned and imperiled: access to HIV and TB prevention and treatment, and denial of human rights, in Zambian prisons

    Todrys Katherine W

    2011-02-01

    Full Text Available Abstract Background Although HIV and tuberculosis (TB prevalence are high in prisons throughout sub-Saharan Africa, little research has been conducted on factors related to prevention, testing and treatment services. Methods To better understand the relationship between prison conditions, the criminal justice system, and HIV and TB in Zambian prisons, we conducted a mixed-method study, including: facility assessments and in-depth interviews with 246 prisoners and 30 prison officers at six Zambian prisons; a review of Zambian legislation and policy governing prisons and the criminal justice system; and 46 key informant interviews with government and non-governmental organization officials and representatives of international agencies and donors. Results The facility assessments, in-depth interviews and key informant interviews found serious barriers to HIV and TB prevention and treatment, and extended pre-trial detention that contributed to overcrowded conditions. Disparities both between prisons and among different categories of prisoners within prisons were noted, with juveniles, women, pre-trial detainees and immigration detainees significantly less likely to access health services. Conclusions Current conditions and the lack of available medical care in Zambia's prisons violate human rights protections and threaten prisoners' health. In order to protect the health of prisoners, prison-based health services, linkages to community-based health care, general prison conditions and failures of the criminal justice system that exacerbate overcrowding must be immediately improved. International donors should work with the Zambian government to support prison and justice system reform and ensure that their provision of funding in such areas as health services respect human rights standards, including non-discrimination. Human rights protections against torture and cruel, inhuman or degrading treatment, and criminal justice system rights, are

  11. 30 CFR 291.113 - What actions may MMS take to remedy denial of open and nondiscriminatory access?

    2010-07-01

    ... per day under 30 CFR part 250, subpart N, for failure to comply with an MMS order to provide open... open and nondiscriminatory access? 291.113 Section 291.113 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR APPEALS OPEN AND NONDISCRIMINATORY ACCESS TO OIL AND GAS...

  12. Access control system for ISABELLE

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  13. Computer access security code system

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  14. The current German regime governing third-party access to power transmission systems and denial of TPA, discussed from the angle of applicable civil law, energy industry law and antitrust law; Der Netzzugang und seine Verweigerung im Spannungsfeld zwischen Zivilrecht, Energierecht und Kartellrecht

    Kuehne, G. [Technische Univ. Clausthal, Clausthal-Zellerfeld (Germany). Inst. fuer Deutsches und Internationales Berg- und Energierecht

    2000-07-01

    The German EnWG (energy industry law) for deregulation of the energy sector and implementation of the Internal Energy Market Directive of the EU contains an obligation to contract and make rules for establishing a legally binding system for access to and use of third parties of transmission and distribution networks in the competitive electricity market. The design of such contracts under private law as well as the grid code for network operation primarily being a matter of the contracting parties, the legal basis and opportunities for governmental supervisory functions are embodied in various laws. The legal analysis of this contribution examines the current situation and asks whether the existing provisions of the German BGB (Civil Code), antitrust law and the EnWG offer practicable means in case of need for governmental supervisory action in order to ensure evolution and adherence to a legal framework that will ensure the objectives of the politically willed deregulation of the energy sector and foster development of an open market serving the public welfare. (CB) [German] Das Energiewirtschaftsgesetz (EnWG) zur Neuregelung der Energiewirtschaft in Deutschland und Umsetzung der EU Binnenmarktrichtlinie fuer Strom enthaelt eine Regelung fuer den Netzzugang im wettbewerblich organisierten Strommarkt, d.h. einen Kontrahierungszwang zur Regelung des Zugangs Dritter zu Uebertragungs- und Versorgungsnetzen. Der Staat hat die inhaltliche Gestaltung der Durchleitungsvertraege und der Netzregeln weitgehend den Vertragsparteien ueberlassen. Die rechtliche Analyse dieses Beitrags untersucht die Regelungen des EnWG in ihrem Verhaeltnis zum Kartellrecht (Durchleitungsverweigerungsgruende, Unbundling) und zum Zivilrecht (Freiheit der Vertragsgestaltung) und fragt, inwieweit die Vorgaben des EnWG im Zusammenwirken mit den angesprochenen Vorgaben aus anderen Rechtsgebieten einen ordnungspolitischen Rahmen darstellen, der die Ziele der politisch gewollten Marktderegulierung und

  15. Automated Computer Access Request System

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  16. Denial: A Bibliography.

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  17. Straight talk: new approaches in healthcare. Are you in denial over your denials? Enhance your revenues with denial management.

    Harris, David; Cibenko, Alex; Johnston, Scott; Kline, Linda J; Silveria, Richard

    2002-11-25

    Most health systems lose between 3% and 5% of net revenues as a result of payment denials from insurance companies. But it doesn't have to be that way. In the eighth installment of Straight Talk, we talk about the steps necessary to recover lost revenue through a denial-management program, which involves an investment in information technology and a commitment to business-process change. Denial management isn't just the responsibility of the employees in patient financial services--it's everyone's responsibility at the hospital. Modern Healthcare and PricewaterhouseCoopers present Straight Talk. The session on denial management was held at Modern Healthcare's Chicago headquarters on November 6, 2002. Charles S. Lauer, Publisher of Modern Healthcare, was the moderator. PMID:12510566

  18. Fast Access Data Acquisition System

    Dr. Vladimir Katsman

    1998-03-17

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  19. Radio access selection in multi-radio access systems

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  20. Head Access Piping System Desing

    中大路 道彦; 一宮 正和; 向坊 隆一; 前田 清彦; 永田 敬

    1994-01-01

    PNC made design studies on loop type FBR plants:a 600 MWe class in '91, and a 1300 MWe class in '93 both with the "head access" primary piping system. This paper focuses on the features of the smaller plant at first and afterwards on the extension to the larger one. The contents of the paper consist of R/V wall protection mechanism, primary piping circuit, secondary piping circuit, plant layout and then, discusses the extension of the applicability of the wall protection mechanism, primary pi...

  1. Limited Denial of Participation

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  2. A new access scheme in OFDMA systems

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  3. ACCESS Sub-system Performance

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  4. Easy Access: Auditing the System Network

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  5. Access control and personal identification systems

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  6. Modelling Access Control For Healthcare Information Systems

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  7. Threat to information security : the system vulnerability and denial of service attacks

    Braathen, Kjetil Eiklid; Salte, Silje

    2004-01-01

    The use of the Internet has increased drastically the last few years. This trend has led to a constant increase in attacks toward computer systems and networks, and the methods for attacking are becoming more and more advanced. By this, we mean that new tools are developing in a way that makes it more difficult for people to protect themselves against, while the use of the tools is more user friendly than before, and the hackers do not need as much skills as they used to. In...

  8. Using Solar System Topics to Teach the Scientific Method in an Age of Science Denial

    Lo Presto, M. C.

    2013-04-01

    A number of excellent opportunities to remind students of the scientific method and how the process of science works come about during coverage of common topics in a Solar System “unit” in an introductory college astronomy course. With the tremendous amount of misinformation about science that students are exposed to through the Internet and other forms of media, this is now more important than ever. If non-science majors can leave introductory astronomy, often the only science course they will take, with a decent appreciation of, or at least an exposure to, how science works, they will then be better able to judge the validity of what they hear about science in the media throughout their lives.

  9. Multilingual Access for Information Systems.

    Peters, Carol; Sheridan, Paraic

    With the rapid growth of the global information society, the concept of library has evolved to embrace all kinds of information collections, on all kinds of storage media, and using many different access methods. The users of today's information networks and digital libraries, no longer restricted by geographic or spatial boundaries, want to be…

  10. Open Access and DSpace Institutional Repository System

    Çelik, Sönmez; Gürdal, Gültekin; Keten, Burcu; Türkfidanı, Ata; Kutlutürk, Levent

    2013-01-01

    The Open Access movement is a social movement in academia, dedicated to the principle of open access - to information - sharing for the common good and is being supported by many scientists, publishers, and researchers in the world, today. The software that is used to operate the institutional archive systems which are the basis of the Open Access, are divided into two forms of some free open source software and paid package programs which were developed by some corporates. DSpace, whose firs...

  11. CDC STATE System Tobacco Legislation - Youth Access

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  12. Access Control Management for SCADA Systems

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  13. Optimized access to distributed relational database system

    Hrivnac, J.

    2006-01-01

    Efficient and friendly access to the large amount of data distributed over the wide area network is a challenge for the near future LCG experiments. The problem can be solved using current standard open technologies and tools. A JDBC standard soution has been chosen as a base for a comprehensive system for the relational data access and management. Widely available open tools have been reused and extended to satisfy HEP needs.

  14. Performance estimates for personnel access control systems

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  15. Performance estimates for personnel access control systems

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  16. Distributed Access View Integrated Database (DAVID) system

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  17. Democracy and the Twin Challenges of Climate Denial

    Norgaard, K. M.

    2012-12-01

    Climate change poses major challenges to the operation of "modern" political, economic and social systems, making visible assumptions and raising questions about how scientific information can and should operate in a modern globalized democracy. Alongside the serious threat to democracy posed by the phenomenon of "literal denial" (the e.g. so called skeptic challenges of scientific information for political reasons) is "implicatory denial" or the more pervasive and everyday problem of how and why people who believe climate change is occurring nevertheless manage to ignore it. Instead, disturbing information about climate change is normalized through a variety of everyday social practices from changing the subject, controlling exposure to information or the use of humor. The blatant and more readily identifiable processes of literal denial can work together with the less visible (and to date less studied) process of implicatory denial to hamper public response to climate change.

  18. Access Control in Data Management Systems

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  19. Safety testing for LHC access system

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  20. LANSCE personnel access control system (PACS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  1. Cardea: Dynamic Access Control in Distributed Systems

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  2. Obstacle Characterization in a Geocrowdsourced Accessibility System

    Qin, H.; Aburizaiza, A. O.; Rice, R. M.; Paez, F.; Rice, M. T.

    2015-08-01

    Transitory obstacles - random, short-lived and unpredictable objects - are difficult to capture in any traditional mapping system, yet they have significant negative impacts on the accessibility of mobility- and visually-impaired individuals. These transitory obstacles include sidewalk obstructions, construction detours, and poor surface conditions. To identify these obstacles and assist the navigation of mobility- and visually- impaired individuals, crowdsourced mapping applications have been developed to harvest and analyze the volunteered obstacles reports from local students, faculty, staff, and residents. In this paper, we introduce a training program designed and implemented for recruiting and motivating contributors to participate in our geocrowdsourced accessibility system, and explore the quality of geocrowdsourced data with a comparative analysis methodology.

  3. Fast Access Data Acquisition System (FADAS)

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing

  4. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  5. Science information systems: Archive, access, and retrieval

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  6. Decentralized energy systems for clean electricity access

    Alstone, Peter; Gershenson, Dimitry; Kammen, Daniel M.

    2015-04-01

    Innovative approaches are needed to address the needs of the 1.3 billion people lacking electricity, while simultaneously transitioning to a decarbonized energy system. With particular focus on the energy needs of the underserved, we present an analytic and conceptual framework that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. A historical analysis shows that the present day is a unique moment in the history of electrification where decentralized energy networks are rapidly spreading, based on super-efficient end-use appliances and low-cost photovoltaics. We document how this evolution is supported by critical and widely available information technologies, particularly mobile phones and virtual financial services. These disruptive technology systems can rapidly increase access to basic electricity services and directly inform the emerging Sustainable Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, inclusive energy systems.

  7. Detecting Denial of Service Attacks in Tor

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  8. Denial Denied: Freedom of Speech

    Glen Newey

    2009-01-01

    Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a propositio...

  9. Defending Science Denial in Cyberspace

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  10. Digital Autonomous Terminal Access Communication (DATAC) system

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  11. Research of user access control for networked manufacturing system

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  12. Online Access to Knowledge: System Design.

    Meadow, Charles T.; And Others

    1989-01-01

    Reports on design and rationale of Online Access to Knowledge, a computer intermediary developed by Online Access to Knowledge Project to enable users with little or no training or experience in bibliographic searching to conduct their own searches. Topics covered include software design, tutorials and assistance programs, and conclusions based on…

  13. Context-Based E-Health System Access Control Mechanism

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  14. Case managers reorganize to challenge claims denials.

    1999-08-01

    A combination of diminished reimbursement, decreased funding for residency programs, an epidemic of claims denials, and the skilled nursing crisis has imperiled teaching hospitals across the country. Increasingly, these hospitals are looking to case management departments as potential saviors. In the short term, that could mean more staff and a beefier budget, but if your department can't produce, cuts later on could be drastic. The University of Pennsylvania Health System in Philadelphia lost $90 million in FY1998 and responded by cutting 1,100 positions--9% of its work force. The case management department lost eight positions and is trying to take up the slack with a massive reorganization of its care delivery system and a rigorous education program designed to reduce claims denials. At Georgetown University Medical Center in Washington, DC, however, case management staff and resources have been increased for now. The department is using its new-found prosperity to thoroughly screen all incoming patients for appropriateness of admission, upgrade its discharge planning capabilities, and hire a full-time employee to appeal denied claims. PMID:10557727

  15. Denial Denied: Freedom of Speech

    Glen Newey

    2009-12-01

    Full Text Available Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a proposition, or to a mode of expression. Underlying free speech is the principle of freedom of association, according to which speech is both a precondition of future association (e.g. as a medium for negotiation and a mode of association in its own right. I conclude by applying this account briefly to two contentious issues: hate speech and pornography.

  16. Denial of Death and Economic Behavior

    Wojciech Kopczuk; Joel Slemrod

    2005-01-01

    We model denial of death and its effect on economic behavior. Attempts to reduce death anxiety and the possibility of denial of mortality-relevant information interact with intertemporal choices and may lead to time-inconsistent behavior and other "behavioral" phenomena. In the model, repression of signals of mortality leads to underconsumption for unsophisticated individuals, but forward-sophisticated individuals may over-consume in anticipation of future denial and may seek ways to commit t...

  17. Campus Access Control System RFID Based

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  18. Application Performance on the Direct Access File System

    Fedorova, Alexandra; Seltzer, Margo I.; Magoutis, Kostas; Addetia, Salimah

    2003-01-01

    The Direct Access File System (DAFS) is a distributed file system built on top of direct-access transports (DAT). Direct-access transports are characterized by using remote direct memory access (RDMA) for data transfer and user-level networking. The motivation behind the DAT-enabled distributed file system architecture is the reduction of the CPU overhead on the I/O data path. In collaboration with Duke University we have created and made available an open-source implementation of DAFS for th...

  19. Analysis of Access Control Policies in Operating Systems

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  20. Speed control system for an access gate

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  1. Delegation in Role Based Access Control Model for Workflow Systems

    Prasanna H Bammigatti

    2008-03-01

    Full Text Available Role -based access control (RBAC has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy then access rights are inherited upwards through the hierarchy. In organization workflow the main threat is of access control. The Role based access control is one of the best suitable access control model one can think of. It is not only the role hierarchies but also other control factors that affect the access control in the workflow. The paper discusses the control factors and role hierarchies in workflow and brings a new model of RBAC. This paper also over comes the conflicts and proves that the system is safe by applying the new model to the workflow

  2. A lifelogging system supporting multimodal access

    Qiu, Zhengwei

    2013-01-01

    Today, technology has progressed to allow us to capture our lives digitally such as taking pictures, recording videos and gaining access to WiFi to share experiences using smartphones. People’s lifestyles are changing. One example is from the traditional memo writing to the digital lifelog. Lifelogging is the process of using digital tools to collect personal data in order to illustrate the user’s daily life (Smith et al., 2011). The availability of smartphones embedded with different sensors...

  3. Scheduling Heterogeneous Wireless Systems for Efficient Spectrum Access

    Lichun Bao

    2010-01-01

    Full Text Available The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (radio frequency bands in the current state of wireless spectrum allocations. Spectrum access scheduling addresses challenges arising from spectrum sharing by interleaving the channel access among multiple wireless systems in a TDMA fashion. Different from cognitive radio approaches which are opportunistic and noncollaborative in general, spectrum access scheduling proactively structures and interleaves the channel access pattern of heterogeneous wireless systems, using collaborative designs by implementing a crucial architectural component—the base stations on software defined radios (SDRs. We discuss our system design choices for spectrum sharing from multiple perspectives and then present the mechanisms for spectrum sharing and coexistence of GPRS+WiMAX and GPRS+WiFi as use cases, respectively. Simulations were carried out to prove that spectrum access scheduling is an alternative, feasible, and promising approach to the spectrum scarcity problem.

  4. Health system weaknesses constrain access to PMTCT and maternal HIV services in South Africa: a qualitative enquiry

    Chersich Matthew F

    2011-03-01

    Full Text Available Abstract Background HIV remains responsible for an estimated 40% of mortality in South African pregnant women and their children. To address these avoidable deaths, eligibility criteria for antiretroviral therapy (ART in pregnant women were revised in 2010 to enhance ART coverage. With greater availability of HIV services in public health settings and increasing government attention to poor maternal-child health outcomes, this study used the patient's journey through the continuum of maternal and child care as a framework to track and document women's experiences of accessing ART and prevention of mother-to-child HIV transmission (PMTCT programmes in the Eastern Cape (three peri-urban facilities and Gauteng provinces (one academic hospital. Results In-depth interviews identified considerable weaknesses within operational HIV service delivery. These manifested as missed opportunities for HIV testing in antenatal care due to shortages of test kits; insufficient staff assigned to HIV services; late payment of lay counsellors, with consequent absenteeism; and delayed transcription of CD4 cell count results into patient files (required for ART initiation. By contrast, individual factors undermining access encompassed psychosocial concerns, such as fear of a positive test result or a partner's reaction; and stigma. Data and information systems for monitoring in the three peri-urban facilities were markedly inadequate. Conclusions A single system- or individual-level delay reduced the likelihood of women accessing ART or PMTCT interventions. These delays, when concurrent, often signalled wholesale denial of prevention and treatment. There is great scope for health systems' reforms to address constraints and weaknesses within PMTCT and ART services in South Africa. Recommendations from this study include: ensuring autonomy over resources at lower levels; linking performance management to facility-wide human resources interventions; developing

  5. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  6. ACCESS: Design and Sub-System Performance

    Kaiser, Mary Elizabeth; Morris, Matthew J.; McCandliss, Stephan R.; Rasucher, Bernard J.; Kimble, Randy A.; Kruk, Jeffrey W.; Pelton, Russell; Mott, D. Brent; Wen, Hiting; Foltz, Roger; Quijada, Manuel A.; Gum, Jeffery S.; Gardner, Jonathan P.; Kahle, Duncan M.; Benford, Dominic J.; Woodgate, Bruce E.; Wright, Edward L.; Feldman, Paul D.; Hart, Murdock; Moos, H. Warren; Reiss, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, W. V.; Sahnow, David J.

    2012-01-01

    Establishing improved spectrophotometric standards is important for a broad range of missions and is relevant to many astrophysical problems. ACCESS, "Absolute Color Calibration Experiment for Standard Stars", is a series of rocket-borne sub-orbital missions and ground-based experiments designed to enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 -1.7 micrometer bandpass.

  7. Effectiveness and detection of denial of service attacks in Tor

    Danner, Norman; DeFabbia-Kane, Sam; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the...

  8. Effectiveness and detection of denial of service attacks in Tor

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.

  9. Role Based Access Control system in the ATLAS experiment

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  10. Role Based Access Control system in the ATLAS experiment

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  11. Disability standards and guidelines for learning management systems: Evaluating accessibility

    Moreno, Lourdes; Iglesias, Ana; Calvo, Rocío; Delgado, Sandra; Zaragoza, Luis

    2012-01-01

    Currently, the great majority of institutions of higher education use Learning Content Management Systems (LCMSs) and Learning Management Systems (LMS) as pedagogical tools. In order to make these systems accessible to all students, it is important to take into account not only educational standards, but also standards of accessibility. It is essential to have with procedures and well-established method for evaluating these tools, so in this paper we propose a method for evaluatin...

  12. Time division multiplexed orbital angular momentum access system

    Shi, Jianyang; Fang, Yuan; Chi, Nan

    2016-03-01

    We propose and experimentally demonstrate time division multiplexed orbital angular momentum (OAM) access system to increase transmission capacity and spectral efficiency. In this system, data carried on different time tributaries share the same OAM mode. Multiple time division multiplexed OAM modes are multiplexed to realize two-dimensional (time dimension and OAM dimension) multiplexing. Therefore, the capacity and spectral efficiency of the access system will increase. The orthogonality between optical time division multiplexing (OTDM) and OAM techniques is also verified in our experiment. In a proof-of-concept experiment, 2×5-Gbps return-to-zero signal over OAM mode +4 is transmitted and investigated. The bit error ratio performance after transmission in this system can be smaller than 1×10-9. Results show that the proposed time division multiplexed OAM access system is suitable for future broadband access network.

  13. 28 CFR 513.66 - Denials and appeals of Freedom of Information Act requests.

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Denials and appeals of Freedom of Information Act requests. 513.66 Section 513.66 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION ACCESS TO RECORDS Release of Information Freedom of Information Act Requests for Information §...

  14. Denial of shipments - myth or reality

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  15. Denial of shipments - myth or reality

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care

  16. Development of Nuclear Radiation monitoring simulation system of health access

    It introduces a nuclear radiation monitoring simulation system of health access. The main parameters of the software and hardware design and the system structure are described, the development of similar simulation system to provide some help an d guidance, the system design is based on radiation monitor of NPQJVC. (authors)

  17. BCH codes for large IC random-access memory systems

    Lin, S.; Costello, D. J., Jr.

    1983-01-01

    In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed.

  18. MULTIAGENT SYSTEM BASED ON GENETIC ACCESS MATRIX ANALYSIS

    Noto Masato

    2012-12-01

    Full Text Available How should an individual contribute to the public good? Conversely, how does the public help the individual? We should analyze and alleviate conflicts in community clouds. Covert channels in the access matrix are caused by conflicts between public values and a private sense of values. We cannot control the information leaks from the covert channels by using only access control. We believe that the community cloud system should emphasize harmony between public values and a private sense of values. We interpret the access matrix as follows: The acts of the individual are generalized and symbolized by an access matrix that describes the access operations of the subject. We propose a multiagent system embodying the concept of swarm intelligence to analyze the covert channels that arise. Each agent has a group target and an individual target. The group target and an individual target include targets for generation of access and restriction of access. The system does not have any principle of universal control. Instead, an agent’s interactions are guided by metaheuristics for achieving targets. The social order of the whole society is made from the agents’ interactions related to the group value target, group game target, an individual value target, and an individual game target. The conceptual framework and multiagent system presented here are intended to support people. If the covert channel problem can be solved, it will become possible for people to use community clouds safely.

  19. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  20. Immediate data access system for LHD experiments

    Several kinds of computer systems are used to perform large helical device (LHD) experiments, and each produces its own data format. Therefore, it has been difficult to deal with these data simultaneously. In order to solve this problem, the Kaiseki server was developed; it has been facilitating the unified retrieval of LHD data. The data acquired or analyzed by various computer systems are converted into the unified ASCII format, or Kaiseki format, and transferred to the Kaiseki server. With this method, the researchers can visualize and analyze the data produced by various kinds of computers in the same way. Because validations are needed before registering on the Kaiseki server, it takes time to make the validated data available. However, some researchers need data as soon as it is gathered in order to adjust their instruments during the experiments. To satisfy this requirement, a new visualization system has been under development. The new system has two ways to visualize the data as physical values from the raw data. If the conversion task is not complex, the NIFSscope, a visualization tool, converts the raw data into physics data by itself. If the task is too complex to handle, it asks the ANACalc server to make physics data. When the ANACalc server receives a request, it delegates calculation programs to convert the acquired data into physics data. Because the interfaces between the server and the calculation processes are independent of programming languages and operating systems, the calculation processes can be placed on different computers and the server load can be reduced. Therefore, the system can respond to changes in requirements by replacing the calculation programs, and can easily be expanded by increasing the number of calculation servers

  1. Role Based Access Control system in the ATLAS experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  2. Role Based Access Control System in the ATLAS Experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  3. DCSK Multi-Access Scheme for UHF RFID System

    Keqiang Yue

    2014-04-01

    Full Text Available DCSK modulation in chaos communication is a robust non-coherent modulation scheme. In this paper, the multiple-access DCSK scheme based on the OVSF code is proposed. Using the multiple-access DCSK scheme in RFID system, a DCSK-RFID system is presented. In the presented DCSK-RFID system, we use the DCSK for tag modulation for its low complexity and the simple receiver of the DCSK scheme is applied in reader part. The tag’s BER performance of the proposed DCSK-RFID system is carefully generalized both in theoretic analysis and in simulations. From the simulation results, the theoretical and simulation values match closely with each other. Then, we design an anti-collision MAC protocol based on multi-access DCSK-RFID scheme. We theoretically analyze the throughout in given number of tags. The simulation shows that the proposed algorithm has better throughout than S-Aloha system

  4. The Romanian Banking System after EU Accession

    Viorica IOAN

    2011-11-01

    Full Text Available Banks play an important role in the financial sector, in the proper functioning of economic entities and in the economy as a whole, therefore over time the establishment of a functioning banking system capable of delivering a wide range of products and services to meet the requirements of all potential customers has been a permanent concern. Considering the economic and financial reality, both internationally and domestically, each country and therefore, Romania is interested in creating a solid banking system, enabling the appropriate organizational framework in order to ensure a development of the financial mechanisms. The banking system as the basic element of the financial system, allows an efficient allocation of resources in the economy and, in order to function properly, we need to know the risks they face:a slow economic growth may cause losses due to difficulties in repaying bank loans, due to lower sales or lower wages, changes in asset prices may cause financial losses to investors, decreasing a sector of the economy which has monopolized the banks’ and investors’ attention.

  5. Efficient medium access control protocol for geostationary satellite systems

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  6. A new access control system by fingerprint for radioisotope facilities

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  7. Denial-of-Service Security Attack in the Continuous-Time World

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial-of-service s......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without...

  8. Remotely Accessed Vehicle Traffic Management System

    Al-Alawi, Raida

    2010-06-01

    The ever increasing number of vehicles in most metropolitan cities around the world and the limitation in altering the transportation infrastructure, led to serious traffic congestion and an increase in the travelling time. In this work we exploit the emergence of novel technologies such as the internet, to design an intelligent Traffic Management System (TMS) that can remotely monitor and control a network of traffic light controllers located at different sites. The system is based on utilizing Embedded Web Servers (EWS) technology to design a web-based TMS. The EWS located at each intersection uses IP technology for communicating remotely with a Central Traffic Management Unit (CTMU) located at the traffic department authority. Friendly GUI software installed at the CTMU will be able to monitor the sequence of operation of the traffic lights and the presence of traffic at each intersection as well as remotely controlling the operation of the signals. The system has been validated by constructing a prototype that resembles the real application.

  9. SPS access control system a new user interface

    Riesco, T

    1999-01-01

    This document describes the project to implement at CERN new trends in industrial control systems and integrate new requirements and functions requested by users. This project will be the testing ground for the specification of procedures in the Access Control and Machine Interlock of LHC. The last modification in the Access Control System to the primary beam areas was made in 1995, and this new project is to improve the fields of personal security, access security and the introduction of modern communication networks used in the industrial control systems. Inside the cycle model of project life, it is at the present time in the test phase in terms of security and exploitation inside the Accelerator Decelerator (AD) project. The presence of Authorization Management System (AMS) to guarantee the automatic information distribution of authorizations to controlled areas is in line with this project.

  10. Einstein Critical-Slowing-Down is Siegel CyberWar Denial-of-Access Queuing/Pinning/ Jamming/Aikido Via Siegel DIGIT-Physics BEC ``Intersection''-BECOME-UNION Barabasi Network/GRAPH-Physics BEC: Strutt/Rayleigh-Siegel Percolation GLOBALITY-to-LOCALITY Phase-Transition Critical-Phenomenon

    Buick, Otto; Falcon, Pat; Alexander, G.; Siegel, Edward Carl-Ludwig

    2013-03-01

    Einstein[Dover(03)] critical-slowing-down(CSD)[Pais, Subtle in The Lord; Life & Sci. of Albert Einstein(81)] is Siegel CyberWar denial-of-access(DOA) operations-research queuing theory/pinning/jamming/.../Read [Aikido, Aikibojitsu & Natural-Law(90)]/Aikido(!!!) phase-transition critical-phenomenon via Siegel DIGIT-Physics (Newcomb[Am.J.Math. 4,39(1881)]-{Planck[(1901)]-Einstein[(1905)])-Poincare[Calcul Probabilités(12)-p.313]-Weyl [Goett.Nachr.(14); Math.Ann.77,313 (16)]-{Bose[(24)-Einstein[(25)]-Fermi[(27)]-Dirac[(1927)]}-``Benford''[Proc.Am.Phil.Soc. 78,4,551 (38)]-Kac[Maths.Stat.-Reasoning(55)]-Raimi[Sci.Am. 221,109 (69)...]-Jech[preprint, PSU(95)]-Hill[Proc.AMS 123,3,887(95)]-Browne[NYT(8/98)]-Antonoff-Smith-Siegel[AMS Joint-Mtg.,S.-D.(02)] algebraic-inversion to yield ONLY BOSE-EINSTEIN QUANTUM-statistics (BEQS) with ZERO-digit Bose-Einstein CONDENSATION(BEC) ``INTERSECTION''-BECOME-UNION to Barabasi[PRL 876,5632(01); Rev.Mod.Phys.74,47(02)...] Network /Net/GRAPH(!!!)-physics BEC: Strutt/Rayleigh(1881)-Polya(21)-``Anderson''(58)-Siegel[J.Non-crystalline-Sol.40,453(80)

  11. Organizational crisis-denial strategy: the effect of denial on public framing

    T.G.L.A. van der Meer

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames em

  12. Access Safety Systems – New Concepts from the LHC Experience

    Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E

    2011-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...

  13. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  14. Improving information access with an emergency department system.

    Travers, D.; Parham, T.

    1997-01-01

    An emergency department (ED) clinical system was developed by in-house personnel, with ED physician, nursing, registration and clerical staff input. The utilization of existing hardware and customization of the hospital's mainframe hospital information system (HIS) facilitated the implementation of a cost-effective system that meets the information access needs of a busy, state-of-the-art academic ED. The transition to automation of the ED was facilitated through the use of a comprehensive tr...

  15. Accessibility and Radioactivity Calculations for Nuclear Reactor Shutdown System

    An important consideration in the design of power reactors is providing access to the reactor cooling system for the purposes of maintenance, repair and refuelling. The major sources of radiation which tend to prohibit such access are: induced activity of the reactor coolant, activated impurities in the reactor coolant and radiation originating in the reactor core both during reactor operation and after shut down. Impurities in the reactor coolant may be present in high enough concentrations so that their activation restricts accessibility for maintenance after shutdown. When water being used as a coolant, the activity of the water itself is very short- lived but their corrosive nature, resultant high impurity and induced activity of structural material are the major source of activity in the system after reactor shutdown. In this case, it may be necessary to chemically remove some of the impurity by a purification process to prevent a build up of long-lived induced activity in the system from restricting access to the plant, and to keep the radiation dose at the working places within the permissible limits. A mathematical modelling is developed. A system of coupled first-order linear differential equations describing adequately the activity behaviour has to be derived and solved. It treats the determination of equilibrium concentrations of impurities on system surface , and the effect of release of fission products from the reactor core

  16. A novel IPTV program multiplex access system to EPON

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  17. THE USAGE OF HRU SEGMENT MATRIX ACCESS IN THE ANALYSIS OF INFORMATION SECURITY SYSTEMS WHICH MAKE MANDATORY ACCESS CONTROL

    Korolev I. D.

    2014-09-01

    Full Text Available In this article we consider the usage of HRU access matrix changing system allowing for information security system which makes mandatory access control in case of information security analysis by using an automatic classification of formalized documents in the system of electronic document management

  18. The unified management of access authorization for information systems

    This paper describes the requirements of the unified management of access authorization for different information systems, from the point of view of the unified management to all applications of the enterprise. This paper also gives the design of software based on the requirements. (authors)

  19. The ARAC client system: network-based access to ARAC

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  20. Denial in Rehabilitation: Its Genesis, Consequences, and Clinical Management.

    Naugle, Richard I.

    1988-01-01

    Notes that, in rehabilitation, denial can motivate individuals to work on behavioral sequelae of neurological deficits or it can impede rehabilitation by impairing one's ability to acknowledge sequelae. Reviews effect of denial and describes management strategy to address denial. (Author/NB)

  1. 19 CFR 174.30 - Notice of denial of protest.

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Notice of denial of protest. 174.30 Section 174.30... TREASURY (CONTINUED) PROTESTS Review and Disposition of Protests § 174.30 Notice of denial of protest. (a) Issuance of notice. Notice of denial of a protest shall be mailed to any person filing a protest or...

  2. Overcoming Denial through the Group: A Test of Acceptance Theory.

    Rugel, Robert P.; Barry, Denise

    1990-01-01

    Found participants (N=28) in alcohol treatment groups showed decreases in denial of drinking problems and decreases in psychopathology following 12 weeks of group counseling. Determined greater self-acceptance was associated with experiencing acceptance by group and with greater decreases in denial; decreases in denial and psychopathology were…

  3. Does the public deserve free access to climate system science?

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  4. NASA Access Mechanism - Graphical user interface information retrieval system

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  5. NASA access mechanism: Graphical user interface information retrieval system

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  6. Preface to Evaluating Systems for Multilingual and Multimodal information Access

    Peters, Carol; Deselaers, Thomas; Ferro, Nicola; Gonzalo, Julio; Jones, Gareth J.F.; Kurimo, Mikko; Mandl, Thomas; Penas, Anselmo; Petras, Vivien

    2009-01-01

    This book constitutes the thoroughly refereed proceedings of the 9th Workshop of the Cross-Language Evaluation Forum, CLEF 2008, held in Aarhus, Denmark, in September 2008. The 130 revised and extended papers presented were carefully reviewed and selected for inclusion in the book. They are completed by an introduction on CLEF 2008. As usual, the seven main evaluation tracks in CLEF 2008 aimed to test the performance of a wide range of multilingual information access systems or system compone...

  7. Workflow management systems, their security and access control mechanisms

    Chehrazi, Golriz

    2007-01-01

    This paper gives an overview of workflow management systems (WfMSs) and their security requirements with focus on access mechanisms. It is a descriptive paper in which we examine the state of the art of workflow systems, describe what security risks affect WfMSs in particular, and how these can be diminiuished. WfMSs manage, illustrate and support business processes. They contribute to the performance, automation and optimization of processes, which is important in the global economy today. ...

  8. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han

    2009-06-01

    Full Text Available The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management of internal functions is of the same importance as external service management. It is very troublesome to control authorizations merely with attributes and composition of policies introduced from attribute-based access control (ABAC. So, we introduce a united access control model for systems in collaborative commerce, combining the advantages of conventional role-based access control (RBAC, task-based authentication control (TBAC and that of recent ABAC and automated trust negotiation (ATN. Innovational ideas in the model are analyzed, and the implement architecture is discussed. The paper concludes with a summary of the united model’s benefits and future work.

  9. Computer systems handle changing T-line access

    Paula, G.

    1990-03-01

    As the number of power exchanges among utilities grows and transmission lines are loaded more heavily, it becomes increasingly difficult to manage power-system access. A study sponsored by the Electric Power Research Institute (EPRI) identifies two analysis techniques that can provide more detailed line-use information to help utilities ensure continued reliability. After meeting internal needs, a utility agrees on usage price and terms with other power suppliers and users that want to transfer power across its lines. This is known as wheeling. However, such transactions affect the loading of lines belonging to other utilities. As a result, no utility can actually control who uses its transmission system. Many utilities would like a way to monitor power flows on their systems to improve the economy and reliability of operation. The EPRI-sponsored study, conducted by Casazza, Schultz, Associates (CSA), Arlington, VA, identifies ways that computer methods can help utilities cope with increased line access.

  10. Type-Based Access Control in Data-Centric Systems

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  11. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  12. Task-role-based Access Control Model in Smart Health-care System

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  13. Resilient Control under Denial-of-Service:Robust Design

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not destroyed. Analog and digital predictor-based controllers with state resetting are proposed, which achieve the considered control objective for a general class of DoS signals. An example is given to il...

  14. Formalized Description of Distributed Denial of Service Attack

    杜彦辉; 马锐; 刘玉树

    2004-01-01

    The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.

  15. DAISY Producer: An integrated production management system for accessible media

    Egli, Christian

    2011-01-01

    Large scale production of accessible media above and beyond DAISY Talking Books requires management of the workflow from the initial scan to the output of the media production. DAISY Producer was created to help manage this process. It tracks the transformation of hard copy or electronic content to DTBook XML at any stage of the workflow and interfaces to existing order processing systems. Making use of DAISY Pipeline and Liblouis, DAISY Producer fully automates the generation of on-demand, u...

  16. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    Eles, Petru; Doboli, Alex; Pop, Paul;

    2000-01-01

    of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We......, generates an efficient bus access scheme as well as the schedule tables for activation of processes and communications....

  17. A portable marine geophysical data access and management system

    Kunte, P.D.; Narvekar, P.

    COMMUNICATIONS CURRENT SCIENCE, VOL. 90, NO. 12, 25 JUNE 2006 *For correspondence. (e - mail: dr_pdkunte@yahoo.com ) A portable marine geophysical data access and ma n agement system Pravin D. Kunte 1, * and Prabhakar Narvekar 2 1 National... tio - na l data. The program calc u lates/generates the accurate position data for each fix a f ter considering the turning RESEARCH COMMUNICATIONS CURRENT SCIENCE, VOL. 90, NO. 12, 25 JUNE 2006 1659 Table 1. Database structure with field...

  18. Access control and interlock system at the Advanced Photon Source

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D. [Argonne National Lab., IL (United States). Advanced Photon Source

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  19. A semi-automated vascular access system for preclinical models

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. (paper)

  20. Data denial experiments for extratropical transition

    Doris Anwender

    2012-11-01

    Full Text Available Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF model are designed to investigate the value of targeted observations for historical extratropical transition (ET cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC environment is, on average, as important as denying data in mid-latitude sensitive regions determined using extratropical singular vectors (SV. The impact of data denial over TC regions propagates downstream from the Atlantic towards Europe, with a maximum degradation at day 4. This degradation is mainly attributed to the data denial at the TC stage, i.e. before ET is completed. When data are denied on mid-latitude sensitive regions, the largest degradation is found around day 2 and also after the day 4 forecast. In general, the loss of information content is larger when data are denied in mid-latitude sensitive areas because these identify dynamically active regions. In both denial experiments, aircraft and satellite radiance data are the most influential observations. For the selected case of Hurricane Irene, the largest degradations are found for forecasts initialised while Irene reached its peak intensity. If observations are denied in the near storm environment, the TC mostly disappears from the analysis and the subsequent forecast. This allows the impact of Irene on the formation of the downstream cut-off low to be investigated.

  1. Denial among cancer patients. Tips and traps.

    Brock, G.; Gurekas, V; Deom, P.

    1993-01-01

    The coping mechanisms used by patients diagnosed with cancer play a role in their well-being and, therefore, influence their quality of life and possibly even their survival. We review the characteristics of one of these mechanisms, denial, and suggest an approach to dealing with denying patients.

  2. ACCESS Earth: Promoting Accessibility to Earth System Science for Students with Disabilities

    Locke, S. M.; Cohen, L.; Lightbody, N.

    2001-05-01

    ACCESS Earth is an intensive summer institute for high school students with disabilities and their teachers that is designed to encourage students with disabilities to consider careers in earth system science. Participants study earth system science concepts at a Maine coastal estuary, using Geographic Information Systems, remote sensing, and field observations to evaluate the impacts of climate change, sea level rise, and development on coastal systems. Teachers, students, and scientists work together to adapt field and laboratory activities for persons with disabilities, including those with mobility and visual impairments. Other sessions include demonstrations of assistive technology, career discussions, and opportunities for students to meet with successful scientists with disabilities from throughout the U.S. The summer institute is one of several programs in development at the University of Southern Maine to address the problem of underrepresentation of people with disabilities in the earth sciences. Other projects include a mentoring program for high school students, a web-based clearinghouse of resources for teaching earth sciences to students with disabilities, and guidebooks for adaptation of popular published earth system science curricula for disabled learners.

  3. Denials and Delays of Radioactive Material Shipments

    delays of shipments of radioactive materials forms an important issue today. Radioactive materials need to be transported using all modes of transport for use in different applications such as public health, industry, research and production of nuclear power. The transport of radioactive materials is governed by national and international regulations, which are based on the International Atomic Energy Agency (IAEA) regulations for safe transport of radioactive materials (TS-R-1). These regulations ensure high standards of safety. Recently there were increasing numbers of instances of denials and delays of shipments of radioactive materials even when complying with the regulations. The denials and delays can result in difficulties to patients and others who rely on products sterilized by radiation. Therefore there is an urgent need for a universally accepted approach to solve this problem. In response, the IAEA has formed an International Steering Committee (ISC) on denials and delays of radioactive materials. Also, it designate the National Focal Points (NFP) representative to help the ISC members and the IAEA by informing about denial operations and how they can help. The Steering Committee developed and adopted an action plan which includes the action to be taken. This plan is based on: Awareness, Training, Communication, Lobbying for marketing, Economic and Harmonization among member states. It is important to work within the mandate of the ISC and in the line of action plan on denials and delays. It identified the following network members such as: National Focal Points, Regional Coordinators, National Committee, National Representative for different modes of transport and similar bodies, Carriers, Producers and Suppliers, Different civil societies, NGO's, Ministry of transport and others.

  4. Privacy and Access Control for IHE-Based Systems

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  5. Authorisation and access control for electronic health record systems.

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  6. Licensed Shared Access System Possibilities for Public Safety

    Kalle Lähetkangas

    2016-01-01

    Full Text Available We investigate the licensed shared access (LSA concept based spectrum sharing ideas between public safety (PS and commercial radio systems. While the concept of LSA has been well developed, it has not been thoroughly investigated from the public safety (PS users’ point of view, who have special requirements and also should benefit from the concept. Herein, we discuss the alternatives for spectrum sharing between PS and commercial systems. In particular, we proceed to develop robust solutions for LSA use cases where connections to the LSA system may fail. We simulate the proposed system with different failure models. The results show that the method offers reliable LSA spectrum sharing in various conditions assuming that the system parameters are set properly. The paper gives guidelines to set these parameters.

  7. A Rewritable, Random-Access DNA-Based Storage System

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  8. Bluetooth Navigation System Using WI-FI Access Points

    Rohit Agrawal

    2012-04-01

    Full Text Available There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The systemthat has been introduced here uses bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and cheaper is that most of the localized areas today like college campus, offices are being provided withinternet connectivity using these access points.

  9. Use of CDMA access technology in mobile satellite systems

    Ramasastry, Jay; Wiedeman, Bob

    1995-01-01

    Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.

  10. Nomadic Computing : Security assessment of remote access to workplace systems

    Karlsson, Johanna

    2003-01-01

    Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario...

  11. Access Control in Decentralised Publish/Subscribe Systems

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  12. Channel Fragmentation in Dynamic Spectrum Access Systems - a Theoretical Study

    Coffman, Ed; Simatos, Florian; Tarumi, Shuzo; Zussman, Gil

    2010-01-01

    Dynamic Spectrum Access systems exploit temporarily available spectrum (`holes' or `white spaces') and can spread transmissions over a number of non-contiguous sub-channels. Such methods can have significant benefits in terms of spectrum utilization. However, excessive fragmentation degrades performance and hence off-sets the benefits. Thus, there is a critical need for an in-depth understanding of these processes so as to determine how best to ensure acceptable levels of fragmentation. We address this need by presenting experimental and analytical results derived from a mathematical model. In particular, we model a system operating at capacity serving requests for bandwidth by assigning as needed a collection of gaps (sub-channels) with no limitations on fragment size. Our main theoretical result shows that even if fragments can be arbitrarily small, the system does not degrade with time; i.e., the average total number of fragments remains bounded. Within the very difficult class of dynamic fragmentation mod...

  13. A Systems Approach for Ameliorating Possible Prima Facie Denial of Hispanic/Black Students' Rights Through Disproportionate Enrollment in Special Education.

    McDonnell, James R.

    The paper discusses the issue of educational equity, principles of systems analysis, systems approaches in the educational milieu, the evaluation aspect of the systems approach, and application of the systems approach to preventing disproportionate enrollment of Hispanics and Blacks in special education classes in Holyoke, Massachusetts. The…

  14. Postmodernism, historical denial, and history education:

    Robert John Parkes

    2015-12-01

    Full Text Available History educators frequently ignore, or engage only reluctantly and cautiously with postmodernism. This is arguably because postmodernism is frequently accused of assaulting the epistemological foundations of history as an academic discipline, fostering a climate of cultural relativism, encouraging the proliferation of revisionist histories, and providing fertile ground for historical denial. In the Philosophy of History discipline, Frank Ankersmit has become one of those scholars most closely associated with ‘postmodern history’. This paper explores Ankersmit’s ‘postmodern’ philosophy of history, particularly his key notion of ‘narrative substances’; what it might do for our approach to a problem such as historical denial; and what possibilities it presents for history didactics.

  15. Accessibility of a Destination-Based Transportation System: A Large Airport Study

    SHI Jing; YING Xiwen

    2008-01-01

    The accessibility of a destination-based transportation system is defined to quantify the perform-ance of transportation systems which access a distinct destination. The access cost is used to reflect the utility of the transportation system including the fatigue and inconvenience in the total cost. The cost is quan-tified by two coefficients which represent the different characteristics of various people. The average cost and the income-relative accessibility are used to describe various aspects of the accessibility and to evaluate the accessibility of a destination-based system. A case study uses data from the Kunming transpor-tation system to evaluate the accessibility of the present city airport. The calibrated coefficients are then used to evaluate the transportation system to the new Kunming international airport. The results show that this transportation accessibility evaluation can be combined with transportation planning to study transporta-tion sub-systems.

  16. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  17. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-01-17

    ...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10 a.m.-4..., Airport Security Access Control Systems. The agenda will include the following: February 9, 2012...

  18. Administrative and clinical denials by a large dental insurance provider

    Geraldo Elias MIRANDA

    2015-01-01

    Full Text Available The objective of this study was to assess the prevalence and the type of claim denials (administrative, clinical or both made by a large dental insurance plan. This was a cross-sectional, observational study, which retrospectively collected data from the claims and denial reports of a dental insurance company. The sample consisted of the payment claims submitted by network dentists, based on their procedure reports, reviewed in the third trimester of 2012. The denials were classified and grouped into ‘administrative’, ‘clinical’ or ‘both’. The data were tabulated and submitted to uni- and bivariate analyses. The confidence intervals were 95% and the level of significance was set at 5%. The overall frequency of denials was 8.2% of the total number of procedures performed. The frequency of administrative denials was 72.88%, whereas that of technical denials was 25.95% and that of both, 1.17% (p < 0.05. It was concluded that the overall prevalence of denials in the studied sample was low. Administrative denials were the most prevalent. This type of denial could be reduced if all dental insurance providers had unified clinical and administrative protocols, and if dentists submitted all of the required documentation in accordance with these protocols.

  19. Bluetooth Navigation System using Wi-Fi Access Points

    Agrawal, Rohit

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The system that has been introduced here uses Bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and ch...

  20. Safety systems and access control in the National Ignition Facility.

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  1. Access to Papanicolaou Test by the Unified Health System users

    Vanessa Franco de Carvalho; Nalú Pereira da Costa Kerber; Vanessa Andréia Wachholz; Flávia Conceição Pohlmann; Letícia Amico Marques; Fabiane Ferreira Francioni

    2016-01-01

    Objective: to understand how is the access to the public health service users in the Papanicolaou Test. Methods: qualitative study, with 52 women who have changes in the Pap smear exam, questioning the exam achievement frequency and the difficulties of its access and the consultations. It was developed a thematic analysis based on the Fekete accessibility reference. Results: three categories emerged: access to information on the frequency of Pap smears, highlighting the completion of the exam...

  2. Cloud Radio Access Network: Virtualizing Wireless Access for Dense Heterogeneous Systems

    Simeone, Osvaldo; Maeder, Andreas; Peng, Mugen; Sahin, Onur; Yu, Wei

    2015-01-01

    Cloud Radio Access Network (C-RAN) refers to the virtualization of base station functionalities by means of cloud computing. This results in a novel cellular architecture in which low-cost wireless access points, known as radio units (RUs) or remote radio heads (RRHs), are centrally managed by a reconfigurable centralized "cloud", or central, unit (CU). C-RAN allows operators to reduce the capital and operating expenses needed to deploy and maintain dense heterogeneous networks. This critical...

  3. Title III Evaluation Report for the Access Road System

    The objective of this evaluation is to provide recommendations to ensure consistency between the technical baseline requirements, baseline design, and the as-constructed Access Roads. Recommendations for resolving discrepancies between the as-constructed system, the technical baseline requirements, and the baseline design are included in this report. Cost and Schedule estimates are provided for all recommended modifications. This report does not address items which do not meet current safety or code requirements. These items are identified to the CMO and immediate action is taken to correct the situation. The report does identify safety and code items for which the A/E is recommending improvements. The recommended improvements will exceed the minimum requirements of applicable code and safety guide lines. These recommendations are intended to improve and enhance the operation and maintenance of the facility

  4. Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Adebukola Onashoga

    2014-02-01

    Full Text Available Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal and user management (user creation, user update and user removal. The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.

  5. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  6. Power System Trade Studies for the Lunar Surface Access Module

    Kohout, Lisa, L.

    2008-01-01

    A Lunar Lander Preparatory Study (LLPS) was undertaken for NASA's Lunar Lander Pre-Project in 2006 to explore a wide breadth of conceptual lunar lander designs. Civil servant teams from nearly every NASA center responded with dozens of innovative designs that addressed one or more specific lander technical challenges. Although none of the conceptual lander designs sought to solve every technical design issue, each added significantly to the technical database available to the Lunar Lander Project Office as it began operations in 2007. As part of the LLPS, a first order analysis was performed to identify candidate power systems for the ascent and descent stages of the Lunar Surface Access Module (LSAM). A power profile by mission phase was established based on LSAM subsystem power requirements. Using this power profile, battery and fuel cell systems were modeled to determine overall mass and volume. Fuel cell systems were chosen for both the descent and ascent stages due to their low mass. While fuel cells looked promising based on these initial results, several areas have been identified for further investigation in subsequent studies, including the identification and incorporation of peak power requirements into the analysis, refinement of the fuel cell models to improve fidelity and incorporate ongoing technology developments, and broadening the study to include solar power.

  7. Development of a Denial Scale for Male Incest Offenders.

    Guthrie, James T.; Canada, Richard M.; Lim, Mee-Gaik; Jennings, Glen H.

    1998-01-01

    A scale to measure denial among sexual offenders was developed for male incest offenders (N=265). Validity and reliability were tested. Four subscales correspond to the domains of denial: facts, awareness, impact, and responsibility. Development strategy and psychometric analysis are reported. Recommendations for further research are included.…

  8. Critical Surfing: Holocaust Denial and Credibility on the Web.

    Borrowman, Shane

    1999-01-01

    Discusses the nature of hate speech in general, and Holocaust denial in particular, on the World Wide Web, citing specific Web sources. Argues that, although discussion of Holocaust denial may be a difficult classroom discussion topic, and should be approached carefully, intelligent use of the Internet must be taught in the classroom. (MSE)

  9. 19 CFR 174.29 - Allowance or denial of protests.

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance or denial of protests. 174.29 Section... OF THE TREASURY (CONTINUED) PROTESTS Review and Disposition of Protests § 174.29 Allowance or denial of protests. The port director shall allow or deny in whole or in part a protest filed in...

  10. SINP space physics data storage and access system

    Barinova, Vera; Kalegaev, Vladimir; Parunakian, David

    In this paper we present the system for automated data retrieval and processing developed in the the Skobeltsyn Institute of Nuclear Physics. Telemetry data files containing scientific information (e.g. charged particle fluxes) are auto-matically parsed and stored in our Oracle database immediately upon arrival. Parsed telemetry files, metadata, instrument technical information and orbital parameters are also stored. Most of the data can be accessed via our public FTP server. Users can preview the data available for time intervals and channels of interest using the web interface provided. The preview plot building software has also been developed in-house. This system has been successfully used in 2009 with the following spacecraft and instru-ments: Electron-M-Pesca at Coronas-Photon (Electrons 200KeV -4 MeV+; Protons : 4 MeV -80MeV+ ;α : 5 -24 MeV/nucleon; CNO : 6 -15MeV/nucleon), DUFIK at Tatiana-2 (electrons, infrared 600nm ¡ ¡ 700nm and ultraviolet 300nm ¡ ¡ 400nm), MSGI and SKL at Meteor-M (10 spectral channels: 0,5-12,5 µm ). The data collections are available at http://smdc.sinp.msu.ru for visual preview and download.

  11. A system for success: BMC Systems Biology, a new open access journal

    Webb Penelope A

    2007-09-01

    Full Text Available Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  12. A system for success: BMC Systems Biology, a new open access journal

    Webb Penelope A; Hodgkinson Matt J

    2007-01-01

    Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  13. Denial of Service Prevention for 5G

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology in...

  14. Universal remote access infrastructure for embedded systems; Universelle Fernzugriff-Infrastruktur fuer eingebettete Systeme

    Jazdi, N. [Stuttgart Univ. (Germany). Inst. fuer Automatisierungs- und Softwaretechnik

    2005-07-01

    This article describes a flexible and extensible infrastructure for applying Web-Technologies to embedded systems.The presented approach develops a Three-level-Architecture consisting of the embedded system, the universal Remote-Access-Server and the Remote-Access-Client. A system-spanning general interface allows the binding of embedded systems in order to access their process data. Additionally, this procedure facilitates a flexible processing of the device data, so that it is ready to be used by different control devices. To ensure flexibility - connecting different devices on the one side and providing information for different clients like PC, PDA or mobile phone on the other side - a new XML-based description language (Service Description Markup Language - SDML) is introduced. The SDML documents contain information about connected embedded systems, reusable device data and the presentation policies for different clients. These documents are specifically created for each device. Applying the suggested procedure, different embedded systems can be connected to the Internet with minimum hardware and software requirements/costs. Software components of the Remote-Access-Server, once developed, can be used and applied to various devices which lead to a reduction of the development costs. The user can use an ordinary web browser to communicate with the devices and does not need to install any additional software on his local computer. (orig.) (orig.)

  15. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  16. The Time Between: Continuously-defined accessibility functions for schedule-based transportation systems

    Paul Anderson; Andrew Owen; David Levinson

    2012-01-01

    Accessibility is traditionally considered to be a property of a point or region in space, and to be invariant over time (or at least over some computationally convenient time interval). How- ever, a locations accessibility can vary over time on a wide range of scales. This temporal variation is especially significant for schedule-based transportation systems. Current measures of accessibility generally reflect the accessibility only at points in time corresponding to the departures of one or ...

  17. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  18. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han; Hou-Xiang Wang; Qian Xiao; Xiao-Pei Jing; Hui Li

    2009-01-01

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management...

  19. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data System-Public access to data. 504.602-71 Section 504.602-71 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION GENERAL ADMINISTRATIVE MATTERS Contract Reporting 504.602-71 Federal Procurement Data System—Public access to data....

  20. From System Expansion to System Contraction: Access to Higher Education in Poland

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  1. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  2. AMC Model for Denial of Sleep Attack Detection

    Bhattasali, Tapalina

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sensor network is affected by denial of sleep attack or not can be decided by considering expected death time of sensor network under normal scenario.

  3. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  4. Analysis of a Priority Stack Random Access Protocol In W-CDMA Systems

    Al Agha, Khaldoun; Jacquet, Philippe; Vvedenskay, Nikita

    2000-01-01

    The stack protocol (called also tree protocol) can be used in order to introduce a priority mechanism on the random access stage in W-CDMA. Indeed, after second generation networks supporting voice service only, the third generation systems (UMTS) should offer more services with quality and priority. However, all priorities in the UMTS system are based on the dedicated channel and after the random access mechanism that use the weak access protocol: slotted aloha. In this paper, we analyze the...

  5. The entire network topology display system of terminal communication access network

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  6. Accessibility od design documentation on mobile devices with Android Operating System

    Lovše, Tilen

    2013-01-01

    In this graduation thesis the accessibility of design documentation on mobile devices with Android operating system is discussed. Mobile devices, used for accessing to design documentation, are tablet computers or simply tablets. Introduction presents benefits of accessing to design documentation on tablets and Slovenian history in this field, followed by the review of Android operating system, its history, upgrade and features. Practical part covers the review of five different tablets, whic...

  7. Evaluating the Accessibility of Three Open-Source Learning Content Management Systems: A Comparative Study

    Iglesias, Ana; Moreno, Lourdes; Martínez, Paloma; Calvo, Rocío

    2011-01-01

    Learning content management systems (LCMSs) have become increasingly popular in the educational field over the past few years. However, problems in system design can create difficulties in the interactions between LCMSs and an important sector of the user population. The assessment and monitoring of LCMS accessibility are vital for the guarantee of universal accessibility in education. This article presents a comparative study of the accessibility of three web-based, open-source L...

  8. ARCPAS - Automatic radiation control point access system an automated data collection terminal for radiation dose and access control

    Nuclear facilities such as nuclear power plants or fuel processing facilities are required to maintain accurate records of personnel access, exposure and work performed. Most facilities today have some sort of computerized data collection system for radiation dose and access control. The great majority rely on handwritten records, i.e., dose card or sign-in sheet which in turn are transferred to a computerized records management system manually. The ARCPAS terminal provides a method for automating personnel exposure data collection and processing. The terminal is a user interactive device which contains a unit for automatically reading and zeroing pocket dosemeters, a security badge reader for personnel identification, a 16 digit key pad for RWP information entry, a high resolution color CRT for interactive communication and a high speed tape printer providing an entry chit. The chit provides the individual worker with a record of the transaction including an individual identifying number, remaining dose for the quarter or period and RWP under which the worker entered the controlled area. The purpose of automating the access control is to provide fast, accurate, realtime data to the records management system. A secondary purpose is to relieve trained health physics technicians of control point duties so that their training and skills can be utilized more effectively in a facility's health physics program

  9. Access to fertility services by transgender persons: an Ethics Committee opinion.

    2015-11-01

    This statement explores the ethical considerations surrounding the provision of fertility services to transgender individuals and concludes that denial of access to fertility services is not justified. PMID:26363388

  10. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-11-30

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13, 2012... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security...

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-07-22

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security...

  12. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-10-23

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15, 2012... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security...

  13. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-03-18

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from 9... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security...

  14. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  15. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  16. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-09-11

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28, 2012... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security...

  17. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-04-12

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10, 2013... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security...

  18. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Rulemaking Proceeding The Digital Millennium Copyright Act, Public Law 105-304 (1998), amended title 17...

  19. Fine-Grained Access Control for Electronic Health Record Systems

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  20. Database application research in real-time data access of accelerator control system

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  1. Physical protection of hardware and software. Linking access control systems with operational computer systems

    The existence and use of software and networks have generated another possibility for perpetrators to influence systems in nuclear facilities or to prepare malevolent acts. Data security has become an element of physical protection plans, not as an end in itself but as a means to achieve physical protection objectives. Physical protection measures are additional measures, which become necessary when other measures that have to be taken (e.g. in compliance with international standards) are insufficient to prevent a hazard to the protection goals through data manipulation by software and hardware. In planning or assessing data protection measures for the purpose of physical protection, it is necessary to differentiate between applications which can, if manipulated, directly endanger the protection goals. The importance of software protection is growing. In particular, because of ageing of components, the existing instrumentation and control systems with their fixed wiring and discrete elements will have to be updated. Computerized access control systems play an eminent role in the physical protection of a nuclear facility. Therefore, most systems are operated as islands. The paper shows that linking of certain systems with other computer systems is possible without inadmissible drawbacks for the physical protection level. It is shown by means of the example of linking together the computer networks of access control, health physics, the flexitime system, the key administration and the operational management system that such linking of systems in nuclear facilities had hidden advantages for all participants

  2. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  3. A CDMA architecture for a Ka-band Personal Access Satellite System

    Motamedi, Masoud; Sue, Miles K.

    1990-01-01

    A Code Division Multiple Access (CDMA) architecture is currently being studied for use in a Ka-band Personal Access Satellite System (PASS). The complete architecture consisting of block diagrams of the user terminal, the supplier station, the network management center, and the satellite is described along with the access methods and frequency/time plans. The complexity of developing this system using the CDMA architecture is compared to that of a Frequency Division Multiple Access (FDMA) architecture. The inherent advantages and disadvantages of the two architectures are compared and their respective capacities are discussed.

  4. Human engineering considerations in designing a computerized controlled access security system

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  5. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Mitsuru; Miyauchi; Yanjun; Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirm low optical loss and environmental stabilities.

  6. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Mitsuru Miyauchi; Yanjun Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirmlow optical loss and environmental stabilities.

  7. H1DS: A new web-based data access system

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  8. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand

  9. Improving Potable Water Accessibility And Sustainability Through Efficient Management Of Pipe Water Supply System

    Nakabugo, Stella Mirembe

    2015-01-01

    This paper discusses how to improve potable water accessibility and sustainability through efficient management of pipe water supply system a case study of Uganda, Kampala region. Kampala the capital city of Uganda still faces a challenge to access clean potable water. Water supply coverage is 77.5 % showing at least 22.5 % of the total population has limited access to potable drinking water causing a gap between water supply and water demand. Hypotheses of the paper were that the city's popu...

  10. Providing access to a Public Transport Schedule system for Smart Phone Clients

    Hameseder, Katrin

    2010-01-01

    This master thesis was conducted during an internship at HBT GmbH with the purpose of providing access to an existing public transport schedule system in Hamburg (Germany) for smart phone clients. A state-of-the-art literature review and an evaluation of an existing SOAP (Simple Object Access Protocol) based web service to access public transport schedule information were conducted to identify the drawbacks of the existing interface with respect to the limitations and characteristics of smart...

  11. Systemic barriers accessing HIV treatment among people who inject drugs in Russia: a qualitative study

    Sarang, Anya; Rhodes, Tim; Sheon, Nicolas

    2012-01-01

    Achieving ‘universal access’ to antiretroviral HIV treatment (ART) in lower income and transitional settings is a global target. Yet, access to ART is shaped by local social condition and is by no means universal. Qualitative studies are ideally suited to describing how access to ART is socially situated. We explored systemic barriers to accessing ART among people who inject drugs (PWID) in a Russian city (Ekaterinburg) with a large burden of HIV treatment demand. We undertook 42 in-depth qua...

  12. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  13. Development of Patient Status-Based Dynamic Access System for Medical Information Systems

    Chang Won Jeong

    2015-06-01

    Full Text Available Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard. This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.

  14. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  15. A Generic Role Based Access Control Model for Wind Power Systems

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  16. 28 CFR 16.73 - Exemption of Office of Legal Policy System-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of Legal Policy System-limited access. 16.73 Section 16.73 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... provide information concerning a candidate for a judgeship. Access could reveal the identity of the...

  17. 28 CFR 16.92 - Exemption of Environment and Natural Resources Division Systems-limited access.

    2010-07-01

    ... Resources Division Systems-limited access. 16.92 Section 16.92 Judicial Administration DEPARTMENT OF JUSTICE....92 Exemption of Environment and Natural Resources Division Systems—limited access. (a)(1) The... completeness of such records; and to have an opportunity to amend his or her record or seek judicial review....

  18. Transferability and data access issues. [decision information display system

    Ferreros, A. V.

    1981-01-01

    The evolution and current operational mode of the domestic information display system (DIDS) now known as the decision information display system are described. This minicomputer based system, developed from a NASA-generated image processing system, was designed to display federal statistical data for a variety of geographic areas in the form of choropleth maps. The application of DIDS in South Carolina is discussed as well as the progress made and issues that emerged in using the data base on a state and county level. The hardware base for the system, how this user friendly system works, and the possibility of transferring data to remote systems are examined.

  19. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  20. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  1. Mitigation of multiple access interference using two-dimensional modified double weight codes for optical code division multiple access systems

    Jamil Abdullah, Amir Razif Arief; Aljunid, Syed Alwee; Safar, Anuar Mat; Nordin, Junita Mohd; Ahmad, R. Badlishah

    2012-06-01

    We proposed newly two-dimensional (2-D) spectral amplitude coding optical code division multiple access (OCDMA) scheme using modified double weight (MDW) code capable of suppressing phase-induced intensity noise (PIIN). The architecture of the spectral/spatial MDW OCDMA system with the property of multi-access interference cancellation is presented. The proposed code exhibits good cross-correlation property. At the optimized data transmission rate of 0.745 Gbps, 2-D MDW, M=63, N=3, reaches maximum cardinality of 200% increases compared to 2-D perfect difference code, M=57, N=3. The performance is severely deteriorated if the data rate further increases above 0.745 Gbps. The proposed code meets the optical transmission requirements at 10-9 bit error rate error floor, with lowest effective transmitted power (Psr), -17.5 dBm, in comparison to the others through minimizing interference noise that result in PIIN suppression. The proposed system reaches optimum requirements performance in terms of cardinality, data transmission rate, and low effective transmitted power.

  2. A domotic system with remote access based on web services

    Pardo, Mauricio Esteban; Strack, Guillermo; Martínez, Diego C.

    2008-01-01

    Domotics systems are intelligent systems for houses and apartments to control several issues as security and light or climate devices. In this work we present the development of an economic domotic system to control different electrical devices in a private house. This is achieved either from inside the building or by remote control using a regular Internet connection. In order to provide this functionality, the system includes a server that provides web services to the controlling applicatio...

  3. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    2010-01-26

    ... of Behavior and User Agreement AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice... (EIV) System User Access, Authorization Form and Rules Of Behavior and User Agreement. OMB...

  4. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  5. [Denial of pregnancy and neonaticide: psychopathological and clinical features].

    Seigneurie, A-S; Limosin, F

    2012-11-01

    Pregnancy denial and neonaticide have recently received media coverage following a series of French cases of neonatal killing. Although it has been known for a long time that some women deny their pregnancy and may kill their newborns, there is still no consensus on the etiopathogenic factors involved in the denial of pregnancy occurrence. Even though neonaticide is often committed by young, poor, unmarried women with little or no prenatal care, it appears that denial of pregnancy is a heterogeneous condition associated with different psychological features. Societies are ambivalent with regard to mothers who killed their children and tend to lay the entire blame on them. Furthermore, there is a widespread lack of understanding among the public on these affairs, when birth control techniques and methods are widely available. The purpose of this article is to describe the different types of pregnancy denial and neonaticide and to review the still debated etiopathogenic hypotheses. The absence of the physical changes of pregnancy at the time of the denial such as cessation of menstruation, abdominal swelling or perception of foetal movements is also discussed. PMID:22939654

  6. Key issues of multiple access technique for LEO satellite communication systems

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  7. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  8. The access control and radiation monitoring system for the Austin Hospital PET Centre

    A Positron Emission Tomography Centre is being established at the Austin Hospital, Melbourne. The cyclotron vault and hotcell laboratories have been categorized according to the National Council on Radiation Protection and Measurements guidelines for access control to radiation areas. An access control system incorporating visual alarm systems, signs, barriers and interlocks has been designed for the safe operation of the Centre. These features are briefly described. 6 refs., 1 fig

  9. Bluetooth Navigation System using Wi-Fi Access Points

    Rohit Agrawal; Ashesh Vasalya

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater ...

  10. Are chats and forums accessible in e-learning systems?: a heuristic evaluation comparing four learning content management systems

    Calvo, Rocío; Gil, Almudena; Iglesias, Beatriz; Iglesias, Ana

    2013-01-01

    This paper presents a heuristic evaluation of accessibility of the Computer Supported Collaborative Learning (CSCL) tools: chat and forums in four Learning Content Management Systems (LCMS): Moodle, ATutor, dotLRN and Claroline. Moreover, some recommendations are offered in order to improve the accessibility of the tools

  11. Denial of impending death: a discourse analysis of the palliative care literature.

    Zimmermann, Camilla

    2004-10-01

    Terminally ill patients and their families are often referred to as being "in denial" of impending death. This study uses the qualitative method of discourse analysis to investigate the usage of the term "denial" in the contemporary hospice and palliative care literature. A Medline search (1970-2001) was performed combining the text words "deny" and "denial" with the subject headings "terminal care", "palliative care" and "hospice care," and restricted to English articles discussing death denial in adults. The 30 articles were analysed using a constant comparison technique and emerging themes regarding the meaning and usage of the words "deny" and "denial" identified. This paper focusses on the theme of denial as an individual psychological process. Three dominant subthemes were distinguished: denial as an unconscious "defence mechanism", denial as "healthy" and denial as temporary. The analysis focusses on the intertextuality of these themes with each other and with previous texts on the denial of death. Elements of the psychoanalytic definition of denial as an unconscious defence mechanism are retained in the literature but are interwoven with new themes on patient choice. The result is an overall discourse that is conflictual and at times self-contradictory but overall consistent with the biomedical model of illness. I suggest that the representation of death denial elaborated in these articles may be related to a larger discourse on dying in contemporary Western society, which both invites patients to participate in the planning of their death and labels those who do not comply. PMID:15279932

  12. 45 CFR 233.106 - Denial of AFDC benefits to strikers.

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Denial of AFDC benefits to strikers. 233.106... COVERAGE AND CONDITIONS OF ELIGIBILITY IN FINANCIAL ASSISTANCE PROGRAMS § 233.106 Denial of AFDC benefits... refuse to seek or accept, employment. (2)(i) Provide for the denial of AFDC benefits to any family...

  13. 42 CFR 442.118 - Denial of payments for new admissions to an ICF/MR.

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Denial of payments for new admissions to an ICF/MR... AND INTERMEDIATE CARE FACILITIES FOR THE MENTALLY RETARDED Certification of ICFs/MR § 442.118 Denial of payments for new admissions to an ICF/MR. (a) Basis for denial of payments. The Medicaid...

  14. "Show me a justice system that's open, transparent, accessible and inclusive" : barriers to access in the criminal justice system for people with disabilities as victims of crime

    Edwards, Claire; Harold, Gill; Kilcommins, Shane

    2015-01-01

    peer-reviewed This paper considers the barriers that people with disabilities in Ireland face in accessing justice through the criminal justice system when they are victims of crime. It draws on qualitative research with key actors working within the agencies of the Irish criminal justice system, along with disability organisations, victim support organisations and health and social care providers. The research identifies a number of barriers which can be differentiated in terms of those o...

  15. Ask Systems: Interrogative Access to Multiple Ways of Thinking

    Jonassen, David H.

    2011-01-01

    The purpose of this paper is to familiarize instructional designers and researchers with a useful design and research paradigm known as "Ask Systems." Ask Systems are interrogative interfaces to information and learning environments that model conversations with a skilled, reflective practitioner (Schon, The reflective practitioner, "1983") or…

  16. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    Paola Di Maio

    2011-09-01

    Full Text Available The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are largely ignored. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research.

  17. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    Di Maio, Paola

    2011-01-01

    The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are not widely adopted. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA) of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research

  18. Measuring the Gap Between Car and Transit Accessibility : Estimating Access Using a High-Resolution Transit Network Geographic Information System

    Benenson, I.; Martens, C.J.C.M.; Rofé, Y.

    2010-01-01

    Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,

  19. A Comparitive Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Arockiam .L

    2011-05-01

    Full Text Available Denial of Service (DoS attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the Central Manager (CM, Medium Access Control Address Filtering (MAF and Traffic Pattern Filtering (TPF methods to avoid DoS attacks in Wireless Local Area Network (WLAN. Central Manager (CM provides the better solution to avoid DoS attacks and it improves the performance of WLAN with the help of tables and timer. In the case of Transmission Control Protocol (TCP, MAF and TPF methods are used to detect and resolve Authentication Request Flooding (AuthRF and Association Request Flooding (AssRF. This paper compares the performance of these two solutions based on throughput and the results are analyzed with the graphs.

  20. CDC STATE System E-Cigarette Legislation - Youth Access

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth...

  1. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...... radio will be presented as well....

  2. Study of LANs access technologies in wind power system

    Wei, Mu; Chen, Zhe

    2010-01-01

    Due to the energy challenges in the world, new types of generation technologies, such as renewable energy based generators, attract great attention and are being quickly developed, which results in the dramatic developments and changes in modern power systems, the communication technologies play ...

  3. Access Control for Monitoring System-Spanning Business Processes

    Bassil, S.; Reichert, M.U.; Bobrik, R.; Bauer, Th.

    2007-01-01

    Integrated process support is highly desirable in environ- ments where data related to a particular (business) process are scattered over distributed and heterogeneous information systems (IS). A process monitoring component is a much-needed module in order to provide an integrated view on all these

  4. 28 CFR 25.6 - Accessing records in the system.

    2010-07-01

    ... law enforcement and other relevant record systems, and may provide a unique State-Assigned Transaction... “Denied” response. (h) POC Determination Messages. POCs shall transmit electronic NICS transaction... FFL. For transactions where a determination has not been communicated to the FFL, the...

  5. Labeling and Rating Systems: Greater Access or Censorship?

    Martin, Ann M.

    2015-01-01

    This article asks the question: How well versed are school librarians on issues related to labeling and rating systems? As school librarians continue to design and implement resource location schemes to assist patrons, they must recognize the difference between using labels to create interest in books or implementing labeling and rating systems…

  6. Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis

    Pop, Paul; Eles, Petru; Peng, Zebo

    2000-01-01

    We present an approach to bus access optimization and schedulability analysis for the synthesis of hard real-time distribution embedded systems. The communication model is based on a time-triggered protocol. We have developed an analysis for the communication delays proposing four different message...... scheduling policies over a time-triggered communication channel. Optimization strategies for the bus access scheme are developed, and the four approaches to message scheduling are compared using extensive experiments....

  7. Using geographic information system tools to improve access to MS specialty care in Veterans Health Administration

    William J. Culpepper, II, PhD, MA; Diane Cowper-Ripley, PhD; Eric R. Litt, BA; Tzu-Yun McDowell, MA; Paul M. Hoffman, MD

    2010-01-01

    Access to appropriate and timely healthcare is critical to the overall health and well-being of patients with chronic diseases. In this study, we used geographic information system (GIS) tools to map Veterans Health Administration (VHA) patients with multiple sclerosis (MS) and their access to MS specialty care. We created six travel-time bands around VHA facilities with MS specialty care and calculated the number of VHA patients with MS who resided in each time band and the number of patient...

  8. Information system for easy access of the First Military Survey

    Pacina, J.; Chodějovská, Eva; Popelka, J.

    Sofia : STEF92 Technology, 2014, s. 683-690. ISBN 978-619-7105-12-4. ISSN 1314-2704. [International Multidisciplinary Scientific Geoconference and EXPO, SGEM 2014. Albena (BG), 17.06.2014-26.06.2014] R&D Projects: GA ČR(CZ) GBP410/12/G113 Keywords : First Military Survey * Bohemia, XVIII century * cartography * scientific edition * information system Subject RIV: AB - History

  9. Multi-tag content access control in RFID system

    Xue, Shun

    2010-01-01

    Radio Frequency Identification (RFID) makes great flexibility and high efficiency for data acquisition in industry and daily life. At the other side, it brings the privacy risks and multiple tags collision issue. Current research in RFID system focuses on the security and privacy issue which is based on authentication protocols between a tag and a Reader. There is a need to design a reasonable protocol which takes care of both multi-tag anti-collision and security issue. This thesis presen...

  10. Geoculture world system, access to Balkan and Albania

    Ilirjan Çukaj

    2015-03-01

    Full Text Available If culture as a term covers a broad range of relations and social behavior, mutually implicated in influential and economic cycles of the global system, then it becomes wordy geoculture. Geoculture system is used as a term by Wallerstein (2004 who had treated it as a concept largely unused and under a theory of geoculture which plays an important role in the present world system. The theses that is presented in this article is that the global trajectory in the Balkan region is increasing from culture and that, it is imperative to establish a strategic culture direction and management, which, in turn, should be formed not only as a principal need, but also as an obligation of social state institutions to find the viable solutions of the global market policy, economy and culture. And in response to the challenging question the culture of integration becomes imperative now facing nationalism. Albania will have to manage perceptions, fears and realities arising from the above mentioned phenomenon, to establish a balance between the “inside” and “outside” views. In this sense main challenge of Albania is the management of cultural globalization to get the most of opportunities despite the risk of losing ground globally

  11. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  12. Cognitive radio networks medium access control for coexistence of wireless systems

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  13. Systems requirements for cable modems in high-speed access networks

    Campos, Luis A.; Su, Shing-Fong

    1996-11-01

    Cable modems play an important role in turning the hybrid fiber coax (HFC) networks from pure broadcast video service to high-speed access networks. Many CATV companies and telephone companies are experimenting with high-speed data services over HFC. With today's technology, cable modems can easily run at a data rate of 10 Mbps or above. They allow subscribers fast access to on-line services and the Internet. A variety of cable modems have been developed and marketed by cable modem vendors. Selection of right cable modems for deployment in HFC access networks has become a nontrivial matter. Different HFC systems may require different types of cable modems. In this paper, we review the development of HFC systems and discuss data networking using approaches that include connectionless data networking and connection-oriented data networking systems. The system requirements for cable modems in terms of throughput, robustness, ease of operation, protocol efficiency, reliability, network management, and cost are addressed.

  14. An Information System to Access Status Information of the LHCb Online

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  15. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  16. A Distributed Metadata Management, Data Discovery and Access System

    Palanisamy, Giriprakash; Green, Jim; Wilson, Bruce

    2010-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, among other features. Mercury provides a single portal to information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fa...

  17. Long-term venous access using a subcutaneous implantable drug delivery system.

    Soo, K. C.; Davidson, T I; Selby, P; Westbury, G

    1985-01-01

    To facilitate long-term venous access in patients receiving chemotherapy, a subcutaneous totally implantable system (Port-a-Cath, Phamacia) has been used in 14 patients. The method of implantation and the advantages over conventional central venous catheters are discussed. The expense of the system necessitates careful patient selection.

  18. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    Pop, Traian; Pop, Paul; Eles, Petru; Peng, Zebo

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  19. Multi-level access control in the data pipeline of the international supply chain system

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to b

  20. 28 CFR 16.99 - Exemption of the Immigration and Naturalization Service Systems-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Immigration and....99 Exemption of the Immigration and Naturalization Service Systems-limited access. (a) The following systems of records of the Immigration and Naturalization Service are exempt from 5 U.S.C. 552a (c) (3)...

  1. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  2. AN ANALYSIS OF CURRENT COMPUTER NETWORK ATTACK PROCEDURES, THEIR MITIGATION MEASURES AND THE DEVELOPMENT OF AN IMPROVED DENIAL OF SERVICE (DoS ATTACK MODEL

    IHEKWEABA OGECHI

    2013-04-01

    Full Text Available This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as a proof of concept, and then applied in the development of a model for an adaptive intelligent multi-agent for network protection, against denial of service attacks.

  3. Environmental Information Management For Data Discovery and Access System

    Giriprakash, P.

    2011-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source software and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007 and released in early 2008. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, and ready customization to meet the needs of the multiple projects which use Mercury. For the end users, Mercury provides a single portal to very quickly search for data and information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow ! the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fast search results to the user, while allowing data providers to advertise the availability of their data and maintain complete control and ownership of that data.

  4. Utilizing fission technology to enable rapid and affordable access to any point in the solar system

    Fission technology can enable rapid, affordable access to any point in the solar system. Potential fission-based transportation options include bimodal nuclear thermal rockets, high specific energy propulsion systems, and pulsed fission propulsion systems. In-space propellant re-supply enhances the effective performance of all systems, but requires significant infrastructure development. Safe, timely, affordable utilization of first-generation space fission propulsion systems will enable the development of more advanced systems. First generation space systems will build on over 45 years of US and international space fission system technology development to minimize cost

  5. A High Speed Mobile Courier Data Access System That Processes Database Queries in Real-Time

    Gatsheni, Barnabas Ndlovu; Mabizela, Zwelakhe

    A secure high-speed query processing mobile courier data access (MCDA) system for a Courier Company has been developed. This system uses the wireless networks in combination with wired networks for updating a live database at the courier centre in real-time by an offsite worker (the Courier). The system is protected by VPN based on IPsec. There is no system that we know of to date that performs the task for the courier as proposed in this paper.

  6. 44 CFR 73.3 - Denial of flood insurance coverage.

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance coverage. 73.3 Section 73.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance...

  7. 44 CFR 71.3 - Denial of flood insurance.

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance. 71.3 Section 71.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program...

  8. The Child with Cancer: Patterns of Communication and Denial.

    Spinetta, John J.; Maloney, Lorrie J.

    1978-01-01

    Examines the role of communication and denial in coping efforts of children with cancer. Results indicate level of family communication about cancer expressed by mother's communication is correlated with hypothesized responses in child. Usefulness of three instruments as effective tools in measuring child's reactions is demonstrated. (Author/BEF)

  9. Flooding Distributed Denial of Service Attacks-A Review

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  10. Iran's Denial of Education to Baha'is

    Clarken, Rodney H.

    2009-01-01

    This paper briefly describes the background of the persecution of the Baha'is in Iran, especially the denial of education, and explores what could be done to alleviate this injustice, including enlisting the support of nations, organizations, media and people around the world. Baha'is are the largest religious minority in Iran and have been…