WorldWideScience

Sample records for access denial systems

  1. High temperature adhesive silicone foam composition, foam generating system and method of generating foam. [For access denial

    Mead, J.W.; Montoya, O.J.; Rand, P.B.; Willan, V.O.

    1983-12-21

    Access to a space is impeded by generation of a sticky foam from a silicone polymer and a low boiling solvent such as a halogenated hydrocarbon. In a preferred aspect, the formulation is polydimethylsiloxane gel mixed with F502 Freon as a solvent and blowing agent, and pressurized with CO/sub 2/ in a vessel to about 250 PSI, whereby when the vessel is opened, a sticky and solvent resistant foam is deployed. The foam is deployable, over a wide range of temperatures, adhering to wet surfaces as well as dry, is stable over long periods of time and does not propagate flame or lose adhesive properties during an externally supported burn.

  2. 28 CFR 17.47 - Denial or revocation of eligibility for access to classified information.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Denial or revocation of eligibility for access to classified information. 17.47 Section 17.47 Judicial Administration DEPARTMENT OF JUSTICE..., the identity of the deciding authority, and written notice of the right to appeal. (d) Within 30...

  3. 32 CFR Appendix B to Part 505 - Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal...

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Denial Authorities for Records Under Their Authority (Formerly Access and Amendment Refusal Authorities) B Appendix B to Part 505 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS...

  4. Security solution against denial of service attacks in BESIP system

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  5. The current German regime governing third-party access to power transmission systems and denial of TPA, discussed from the angle of applicable civil law, energy industry law and antitrust law

    The German EnWG (energy industry law) for deregulation of the energy sector and implementation of the Internal Energy Market Directive of the EU contains an obligation to contract and make rules for establishing a legally binding system for access to and use of third parties of transmission and distribution networks in the competitive electricity market. The design of such contracts under private law as well as the grid code for network operation primarily being a matter of the contracting parties, the legal basis and opportunities for governmental supervisory functions are embodied in various laws. The legal analysis of this contribution examines the current situation and asks whether the existing provisions of the German BGB (Civil Code), antitrust law and the EnWG offer practicable means in case of need for governmental supervisory action in order to ensure evolution and adherence to a legal framework that will ensure the objectives of the politically willed deregulation of the energy sector and foster development of an open market serving the public welfare. (CB)

  6. OGIS Access System

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  7. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identify to a central processor. The system installed at the Barnwell Nuclear Fuel Plant is described

  8. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identity to a central processor. The central processor associates that individual's authorization file with a card-key obtained at the access point. The system generates a record of personnel movement, provides a personnel inventory on a real-time basis, and it can retrieve a record of all prior events. The system installed at the Barnwell Nuclear Fuel Plant is described

  9. Nuclear information access system

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  10. Imprisoned and imperiled: access to HIV and TB prevention and treatment, and denial of human rights, in Zambian prisons

    Todrys Katherine W

    2011-02-01

    Full Text Available Abstract Background Although HIV and tuberculosis (TB prevalence are high in prisons throughout sub-Saharan Africa, little research has been conducted on factors related to prevention, testing and treatment services. Methods To better understand the relationship between prison conditions, the criminal justice system, and HIV and TB in Zambian prisons, we conducted a mixed-method study, including: facility assessments and in-depth interviews with 246 prisoners and 30 prison officers at six Zambian prisons; a review of Zambian legislation and policy governing prisons and the criminal justice system; and 46 key informant interviews with government and non-governmental organization officials and representatives of international agencies and donors. Results The facility assessments, in-depth interviews and key informant interviews found serious barriers to HIV and TB prevention and treatment, and extended pre-trial detention that contributed to overcrowded conditions. Disparities both between prisons and among different categories of prisoners within prisons were noted, with juveniles, women, pre-trial detainees and immigration detainees significantly less likely to access health services. Conclusions Current conditions and the lack of available medical care in Zambia's prisons violate human rights protections and threaten prisoners' health. In order to protect the health of prisoners, prison-based health services, linkages to community-based health care, general prison conditions and failures of the criminal justice system that exacerbate overcrowding must be immediately improved. International donors should work with the Zambian government to support prison and justice system reform and ensure that their provision of funding in such areas as health services respect human rights standards, including non-discrimination. Human rights protections against torture and cruel, inhuman or degrading treatment, and criminal justice system rights, are

  11. 30 CFR 291.113 - What actions may MMS take to remedy denial of open and nondiscriminatory access?

    2010-07-01

    ... per day under 30 CFR part 250, subpart N, for failure to comply with an MMS order to provide open... open and nondiscriminatory access? 291.113 Section 291.113 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR APPEALS OPEN AND NONDISCRIMINATORY ACCESS TO OIL AND GAS...

  12. Access control system for ISABELLE

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  13. Computer access security code system

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  14. The current German regime governing third-party access to power transmission systems and denial of TPA, discussed from the angle of applicable civil law, energy industry law and antitrust law; Der Netzzugang und seine Verweigerung im Spannungsfeld zwischen Zivilrecht, Energierecht und Kartellrecht

    Kuehne, G. [Technische Univ. Clausthal, Clausthal-Zellerfeld (Germany). Inst. fuer Deutsches und Internationales Berg- und Energierecht

    2000-07-01

    The German EnWG (energy industry law) for deregulation of the energy sector and implementation of the Internal Energy Market Directive of the EU contains an obligation to contract and make rules for establishing a legally binding system for access to and use of third parties of transmission and distribution networks in the competitive electricity market. The design of such contracts under private law as well as the grid code for network operation primarily being a matter of the contracting parties, the legal basis and opportunities for governmental supervisory functions are embodied in various laws. The legal analysis of this contribution examines the current situation and asks whether the existing provisions of the German BGB (Civil Code), antitrust law and the EnWG offer practicable means in case of need for governmental supervisory action in order to ensure evolution and adherence to a legal framework that will ensure the objectives of the politically willed deregulation of the energy sector and foster development of an open market serving the public welfare. (CB) [German] Das Energiewirtschaftsgesetz (EnWG) zur Neuregelung der Energiewirtschaft in Deutschland und Umsetzung der EU Binnenmarktrichtlinie fuer Strom enthaelt eine Regelung fuer den Netzzugang im wettbewerblich organisierten Strommarkt, d.h. einen Kontrahierungszwang zur Regelung des Zugangs Dritter zu Uebertragungs- und Versorgungsnetzen. Der Staat hat die inhaltliche Gestaltung der Durchleitungsvertraege und der Netzregeln weitgehend den Vertragsparteien ueberlassen. Die rechtliche Analyse dieses Beitrags untersucht die Regelungen des EnWG in ihrem Verhaeltnis zum Kartellrecht (Durchleitungsverweigerungsgruende, Unbundling) und zum Zivilrecht (Freiheit der Vertragsgestaltung) und fragt, inwieweit die Vorgaben des EnWG im Zusammenwirken mit den angesprochenen Vorgaben aus anderen Rechtsgebieten einen ordnungspolitischen Rahmen darstellen, der die Ziele der politisch gewollten Marktderegulierung und

  15. Automated Computer Access Request System

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  16. Denial: A Bibliography.

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  17. Straight talk: new approaches in healthcare. Are you in denial over your denials? Enhance your revenues with denial management.

    Harris, David; Cibenko, Alex; Johnston, Scott; Kline, Linda J; Silveria, Richard

    2002-11-25

    Most health systems lose between 3% and 5% of net revenues as a result of payment denials from insurance companies. But it doesn't have to be that way. In the eighth installment of Straight Talk, we talk about the steps necessary to recover lost revenue through a denial-management program, which involves an investment in information technology and a commitment to business-process change. Denial management isn't just the responsibility of the employees in patient financial services--it's everyone's responsibility at the hospital. Modern Healthcare and PricewaterhouseCoopers present Straight Talk. The session on denial management was held at Modern Healthcare's Chicago headquarters on November 6, 2002. Charles S. Lauer, Publisher of Modern Healthcare, was the moderator. PMID:12510566

  18. Fast Access Data Acquisition System

    Dr. Vladimir Katsman

    1998-03-17

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  19. Radio access selection in multi-radio access systems

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  20. Head Access Piping System Desing

    中大路 道彦; 一宮 正和; 向坊 隆一; 前田 清彦; 永田 敬

    1994-01-01

    PNC made design studies on loop type FBR plants:a 600 MWe class in '91, and a 1300 MWe class in '93 both with the "head access" primary piping system. This paper focuses on the features of the smaller plant at first and afterwards on the extension to the larger one. The contents of the paper consist of R/V wall protection mechanism, primary piping circuit, secondary piping circuit, plant layout and then, discusses the extension of the applicability of the wall protection mechanism, primary pi...

  1. Limited Denial of Participation

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  2. A new access scheme in OFDMA systems

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  3. ACCESS Sub-system Performance

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  4. Easy Access: Auditing the System Network

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  5. Access control and personal identification systems

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  6. Modelling Access Control For Healthcare Information Systems

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  7. Threat to information security : the system vulnerability and denial of service attacks

    Braathen, Kjetil Eiklid; Salte, Silje

    2004-01-01

    The use of the Internet has increased drastically the last few years. This trend has led to a constant increase in attacks toward computer systems and networks, and the methods for attacking are becoming more and more advanced. By this, we mean that new tools are developing in a way that makes it more difficult for people to protect themselves against, while the use of the tools is more user friendly than before, and the hackers do not need as much skills as they used to. In...

  8. Using Solar System Topics to Teach the Scientific Method in an Age of Science Denial

    Lo Presto, M. C.

    2013-04-01

    A number of excellent opportunities to remind students of the scientific method and how the process of science works come about during coverage of common topics in a Solar System “unit” in an introductory college astronomy course. With the tremendous amount of misinformation about science that students are exposed to through the Internet and other forms of media, this is now more important than ever. If non-science majors can leave introductory astronomy, often the only science course they will take, with a decent appreciation of, or at least an exposure to, how science works, they will then be better able to judge the validity of what they hear about science in the media throughout their lives.

  9. Multilingual Access for Information Systems.

    Peters, Carol; Sheridan, Paraic

    With the rapid growth of the global information society, the concept of library has evolved to embrace all kinds of information collections, on all kinds of storage media, and using many different access methods. The users of today's information networks and digital libraries, no longer restricted by geographic or spatial boundaries, want to be…

  10. Open Access and DSpace Institutional Repository System

    Çelik, Sönmez; Gürdal, Gültekin; Keten, Burcu; Türkfidanı, Ata; Kutlutürk, Levent

    2013-01-01

    The Open Access movement is a social movement in academia, dedicated to the principle of open access - to information - sharing for the common good and is being supported by many scientists, publishers, and researchers in the world, today. The software that is used to operate the institutional archive systems which are the basis of the Open Access, are divided into two forms of some free open source software and paid package programs which were developed by some corporates. DSpace, whose firs...

  11. CDC STATE System Tobacco Legislation - Youth Access

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  12. Access Control Management for SCADA Systems

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  13. Optimized access to distributed relational database system

    Hrivnac, J.

    2006-01-01

    Efficient and friendly access to the large amount of data distributed over the wide area network is a challenge for the near future LCG experiments. The problem can be solved using current standard open technologies and tools. A JDBC standard soution has been chosen as a base for a comprehensive system for the relational data access and management. Widely available open tools have been reused and extended to satisfy HEP needs.

  14. Performance estimates for personnel access control systems

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  15. Performance estimates for personnel access control systems

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  16. Distributed Access View Integrated Database (DAVID) system

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  17. Democracy and the Twin Challenges of Climate Denial

    Norgaard, K. M.

    2012-12-01

    Climate change poses major challenges to the operation of "modern" political, economic and social systems, making visible assumptions and raising questions about how scientific information can and should operate in a modern globalized democracy. Alongside the serious threat to democracy posed by the phenomenon of "literal denial" (the e.g. so called skeptic challenges of scientific information for political reasons) is "implicatory denial" or the more pervasive and everyday problem of how and why people who believe climate change is occurring nevertheless manage to ignore it. Instead, disturbing information about climate change is normalized through a variety of everyday social practices from changing the subject, controlling exposure to information or the use of humor. The blatant and more readily identifiable processes of literal denial can work together with the less visible (and to date less studied) process of implicatory denial to hamper public response to climate change.

  18. Access Control in Data Management Systems

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  19. Safety testing for LHC access system

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  20. LANSCE personnel access control system (PACS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  1. Cardea: Dynamic Access Control in Distributed Systems

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  2. Obstacle Characterization in a Geocrowdsourced Accessibility System

    Qin, H.; Aburizaiza, A. O.; Rice, R. M.; Paez, F.; Rice, M. T.

    2015-08-01

    Transitory obstacles - random, short-lived and unpredictable objects - are difficult to capture in any traditional mapping system, yet they have significant negative impacts on the accessibility of mobility- and visually-impaired individuals. These transitory obstacles include sidewalk obstructions, construction detours, and poor surface conditions. To identify these obstacles and assist the navigation of mobility- and visually- impaired individuals, crowdsourced mapping applications have been developed to harvest and analyze the volunteered obstacles reports from local students, faculty, staff, and residents. In this paper, we introduce a training program designed and implemented for recruiting and motivating contributors to participate in our geocrowdsourced accessibility system, and explore the quality of geocrowdsourced data with a comparative analysis methodology.

  3. Fast Access Data Acquisition System (FADAS)

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing

  4. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  5. Science information systems: Archive, access, and retrieval

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  6. Decentralized energy systems for clean electricity access

    Alstone, Peter; Gershenson, Dimitry; Kammen, Daniel M.

    2015-04-01

    Innovative approaches are needed to address the needs of the 1.3 billion people lacking electricity, while simultaneously transitioning to a decarbonized energy system. With particular focus on the energy needs of the underserved, we present an analytic and conceptual framework that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. A historical analysis shows that the present day is a unique moment in the history of electrification where decentralized energy networks are rapidly spreading, based on super-efficient end-use appliances and low-cost photovoltaics. We document how this evolution is supported by critical and widely available information technologies, particularly mobile phones and virtual financial services. These disruptive technology systems can rapidly increase access to basic electricity services and directly inform the emerging Sustainable Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, inclusive energy systems.

  7. Detecting Denial of Service Attacks in Tor

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  8. Defending Science Denial in Cyberspace

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  9. Denial Denied: Freedom of Speech

    Glen Newey

    2009-01-01

    Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a propositio...

  10. Digital Autonomous Terminal Access Communication (DATAC) system

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  11. Research of user access control for networked manufacturing system

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  12. Online Access to Knowledge: System Design.

    Meadow, Charles T.; And Others

    1989-01-01

    Reports on design and rationale of Online Access to Knowledge, a computer intermediary developed by Online Access to Knowledge Project to enable users with little or no training or experience in bibliographic searching to conduct their own searches. Topics covered include software design, tutorials and assistance programs, and conclusions based on…

  13. Context-Based E-Health System Access Control Mechanism

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  14. Case managers reorganize to challenge claims denials.

    1999-08-01

    A combination of diminished reimbursement, decreased funding for residency programs, an epidemic of claims denials, and the skilled nursing crisis has imperiled teaching hospitals across the country. Increasingly, these hospitals are looking to case management departments as potential saviors. In the short term, that could mean more staff and a beefier budget, but if your department can't produce, cuts later on could be drastic. The University of Pennsylvania Health System in Philadelphia lost $90 million in FY1998 and responded by cutting 1,100 positions--9% of its work force. The case management department lost eight positions and is trying to take up the slack with a massive reorganization of its care delivery system and a rigorous education program designed to reduce claims denials. At Georgetown University Medical Center in Washington, DC, however, case management staff and resources have been increased for now. The department is using its new-found prosperity to thoroughly screen all incoming patients for appropriateness of admission, upgrade its discharge planning capabilities, and hire a full-time employee to appeal denied claims. PMID:10557727

  15. Denial Denied: Freedom of Speech

    Glen Newey

    2009-12-01

    Full Text Available Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a proposition, or to a mode of expression. Underlying free speech is the principle of freedom of association, according to which speech is both a precondition of future association (e.g. as a medium for negotiation and a mode of association in its own right. I conclude by applying this account briefly to two contentious issues: hate speech and pornography.

  16. Denial of Death and Economic Behavior

    Wojciech Kopczuk; Joel Slemrod

    2005-01-01

    We model denial of death and its effect on economic behavior. Attempts to reduce death anxiety and the possibility of denial of mortality-relevant information interact with intertemporal choices and may lead to time-inconsistent behavior and other "behavioral" phenomena. In the model, repression of signals of mortality leads to underconsumption for unsophisticated individuals, but forward-sophisticated individuals may over-consume in anticipation of future denial and may seek ways to commit t...

  17. Campus Access Control System RFID Based

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  18. Application Performance on the Direct Access File System

    Fedorova, Alexandra; Seltzer, Margo I.; Magoutis, Kostas; Addetia, Salimah

    2003-01-01

    The Direct Access File System (DAFS) is a distributed file system built on top of direct-access transports (DAT). Direct-access transports are characterized by using remote direct memory access (RDMA) for data transfer and user-level networking. The motivation behind the DAT-enabled distributed file system architecture is the reduction of the CPU overhead on the I/O data path. In collaboration with Duke University we have created and made available an open-source implementation of DAFS for th...

  19. Analysis of Access Control Policies in Operating Systems

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  20. Speed control system for an access gate

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  1. Delegation in Role Based Access Control Model for Workflow Systems

    Prasanna H Bammigatti

    2008-03-01

    Full Text Available Role -based access control (RBAC has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy then access rights are inherited upwards through the hierarchy. In organization workflow the main threat is of access control. The Role based access control is one of the best suitable access control model one can think of. It is not only the role hierarchies but also other control factors that affect the access control in the workflow. The paper discusses the control factors and role hierarchies in workflow and brings a new model of RBAC. This paper also over comes the conflicts and proves that the system is safe by applying the new model to the workflow

  2. A lifelogging system supporting multimodal access

    Qiu, Zhengwei

    2013-01-01

    Today, technology has progressed to allow us to capture our lives digitally such as taking pictures, recording videos and gaining access to WiFi to share experiences using smartphones. People’s lifestyles are changing. One example is from the traditional memo writing to the digital lifelog. Lifelogging is the process of using digital tools to collect personal data in order to illustrate the user’s daily life (Smith et al., 2011). The availability of smartphones embedded with different sensors...

  3. Scheduling Heterogeneous Wireless Systems for Efficient Spectrum Access

    Lichun Bao

    2010-01-01

    Full Text Available The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (radio frequency bands in the current state of wireless spectrum allocations. Spectrum access scheduling addresses challenges arising from spectrum sharing by interleaving the channel access among multiple wireless systems in a TDMA fashion. Different from cognitive radio approaches which are opportunistic and noncollaborative in general, spectrum access scheduling proactively structures and interleaves the channel access pattern of heterogeneous wireless systems, using collaborative designs by implementing a crucial architectural component—the base stations on software defined radios (SDRs. We discuss our system design choices for spectrum sharing from multiple perspectives and then present the mechanisms for spectrum sharing and coexistence of GPRS+WiMAX and GPRS+WiFi as use cases, respectively. Simulations were carried out to prove that spectrum access scheduling is an alternative, feasible, and promising approach to the spectrum scarcity problem.

  4. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  5. Health system weaknesses constrain access to PMTCT and maternal HIV services in South Africa: a qualitative enquiry

    Chersich Matthew F

    2011-03-01

    Full Text Available Abstract Background HIV remains responsible for an estimated 40% of mortality in South African pregnant women and their children. To address these avoidable deaths, eligibility criteria for antiretroviral therapy (ART in pregnant women were revised in 2010 to enhance ART coverage. With greater availability of HIV services in public health settings and increasing government attention to poor maternal-child health outcomes, this study used the patient's journey through the continuum of maternal and child care as a framework to track and document women's experiences of accessing ART and prevention of mother-to-child HIV transmission (PMTCT programmes in the Eastern Cape (three peri-urban facilities and Gauteng provinces (one academic hospital. Results In-depth interviews identified considerable weaknesses within operational HIV service delivery. These manifested as missed opportunities for HIV testing in antenatal care due to shortages of test kits; insufficient staff assigned to HIV services; late payment of lay counsellors, with consequent absenteeism; and delayed transcription of CD4 cell count results into patient files (required for ART initiation. By contrast, individual factors undermining access encompassed psychosocial concerns, such as fear of a positive test result or a partner's reaction; and stigma. Data and information systems for monitoring in the three peri-urban facilities were markedly inadequate. Conclusions A single system- or individual-level delay reduced the likelihood of women accessing ART or PMTCT interventions. These delays, when concurrent, often signalled wholesale denial of prevention and treatment. There is great scope for health systems' reforms to address constraints and weaknesses within PMTCT and ART services in South Africa. Recommendations from this study include: ensuring autonomy over resources at lower levels; linking performance management to facility-wide human resources interventions; developing

  6. ACCESS: Design and Sub-System Performance

    Kaiser, Mary Elizabeth; Morris, Matthew J.; McCandliss, Stephan R.; Rasucher, Bernard J.; Kimble, Randy A.; Kruk, Jeffrey W.; Pelton, Russell; Mott, D. Brent; Wen, Hiting; Foltz, Roger; Quijada, Manuel A.; Gum, Jeffery S.; Gardner, Jonathan P.; Kahle, Duncan M.; Benford, Dominic J.; Woodgate, Bruce E.; Wright, Edward L.; Feldman, Paul D.; Hart, Murdock; Moos, H. Warren; Reiss, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, W. V.; Sahnow, David J.

    2012-01-01

    Establishing improved spectrophotometric standards is important for a broad range of missions and is relevant to many astrophysical problems. ACCESS, "Absolute Color Calibration Experiment for Standard Stars", is a series of rocket-borne sub-orbital missions and ground-based experiments designed to enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 -1.7 micrometer bandpass.

  7. Effectiveness and detection of denial of service attacks in Tor

    Danner, Norman; DeFabbia-Kane, Sam; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the...

  8. Effectiveness and detection of denial of service attacks in Tor

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    2011-01-01

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.

  9. Role Based Access Control system in the ATLAS experiment

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  10. Role Based Access Control system in the ATLAS experiment

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  11. Disability standards and guidelines for learning management systems: Evaluating accessibility

    Moreno, Lourdes; Iglesias, Ana; Calvo, Rocío; Delgado, Sandra; Zaragoza, Luis

    2012-01-01

    Currently, the great majority of institutions of higher education use Learning Content Management Systems (LCMSs) and Learning Management Systems (LMS) as pedagogical tools. In order to make these systems accessible to all students, it is important to take into account not only educational standards, but also standards of accessibility. It is essential to have with procedures and well-established method for evaluating these tools, so in this paper we propose a method for evaluatin...

  12. Time division multiplexed orbital angular momentum access system

    Shi, Jianyang; Fang, Yuan; Chi, Nan

    2016-03-01

    We propose and experimentally demonstrate time division multiplexed orbital angular momentum (OAM) access system to increase transmission capacity and spectral efficiency. In this system, data carried on different time tributaries share the same OAM mode. Multiple time division multiplexed OAM modes are multiplexed to realize two-dimensional (time dimension and OAM dimension) multiplexing. Therefore, the capacity and spectral efficiency of the access system will increase. The orthogonality between optical time division multiplexing (OTDM) and OAM techniques is also verified in our experiment. In a proof-of-concept experiment, 2×5-Gbps return-to-zero signal over OAM mode +4 is transmitted and investigated. The bit error ratio performance after transmission in this system can be smaller than 1×10-9. Results show that the proposed time division multiplexed OAM access system is suitable for future broadband access network.

  13. 28 CFR 513.66 - Denials and appeals of Freedom of Information Act requests.

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Denials and appeals of Freedom of Information Act requests. 513.66 Section 513.66 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION ACCESS TO RECORDS Release of Information Freedom of Information Act Requests for Information §...

  14. Denial of shipments - myth or reality

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care

  15. Denial of shipments - myth or reality

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  16. Development of Nuclear Radiation monitoring simulation system of health access

    It introduces a nuclear radiation monitoring simulation system of health access. The main parameters of the software and hardware design and the system structure are described, the development of similar simulation system to provide some help an d guidance, the system design is based on radiation monitor of NPQJVC. (authors)

  17. BCH codes for large IC random-access memory systems

    Lin, S.; Costello, D. J., Jr.

    1983-01-01

    In this report some shortened BCH codes for possible applications to large IC random-access memory systems are presented. These codes are given by their parity-check matrices. Encoding and decoding of these codes are discussed.

  18. MULTIAGENT SYSTEM BASED ON GENETIC ACCESS MATRIX ANALYSIS

    Noto Masato

    2012-12-01

    Full Text Available How should an individual contribute to the public good? Conversely, how does the public help the individual? We should analyze and alleviate conflicts in community clouds. Covert channels in the access matrix are caused by conflicts between public values and a private sense of values. We cannot control the information leaks from the covert channels by using only access control. We believe that the community cloud system should emphasize harmony between public values and a private sense of values. We interpret the access matrix as follows: The acts of the individual are generalized and symbolized by an access matrix that describes the access operations of the subject. We propose a multiagent system embodying the concept of swarm intelligence to analyze the covert channels that arise. Each agent has a group target and an individual target. The group target and an individual target include targets for generation of access and restriction of access. The system does not have any principle of universal control. Instead, an agent’s interactions are guided by metaheuristics for achieving targets. The social order of the whole society is made from the agents’ interactions related to the group value target, group game target, an individual value target, and an individual game target. The conceptual framework and multiagent system presented here are intended to support people. If the covert channel problem can be solved, it will become possible for people to use community clouds safely.

  19. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  20. Immediate data access system for LHD experiments

    Several kinds of computer systems are used to perform large helical device (LHD) experiments, and each produces its own data format. Therefore, it has been difficult to deal with these data simultaneously. In order to solve this problem, the Kaiseki server was developed; it has been facilitating the unified retrieval of LHD data. The data acquired or analyzed by various computer systems are converted into the unified ASCII format, or Kaiseki format, and transferred to the Kaiseki server. With this method, the researchers can visualize and analyze the data produced by various kinds of computers in the same way. Because validations are needed before registering on the Kaiseki server, it takes time to make the validated data available. However, some researchers need data as soon as it is gathered in order to adjust their instruments during the experiments. To satisfy this requirement, a new visualization system has been under development. The new system has two ways to visualize the data as physical values from the raw data. If the conversion task is not complex, the NIFSscope, a visualization tool, converts the raw data into physics data by itself. If the task is too complex to handle, it asks the ANACalc server to make physics data. When the ANACalc server receives a request, it delegates calculation programs to convert the acquired data into physics data. Because the interfaces between the server and the calculation processes are independent of programming languages and operating systems, the calculation processes can be placed on different computers and the server load can be reduced. Therefore, the system can respond to changes in requirements by replacing the calculation programs, and can easily be expanded by increasing the number of calculation servers

  1. Role Based Access Control system in the ATLAS experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  2. Role Based Access Control System in the ATLAS Experiment

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  3. DCSK Multi-Access Scheme for UHF RFID System

    Keqiang Yue

    2014-04-01

    Full Text Available DCSK modulation in chaos communication is a robust non-coherent modulation scheme. In this paper, the multiple-access DCSK scheme based on the OVSF code is proposed. Using the multiple-access DCSK scheme in RFID system, a DCSK-RFID system is presented. In the presented DCSK-RFID system, we use the DCSK for tag modulation for its low complexity and the simple receiver of the DCSK scheme is applied in reader part. The tag’s BER performance of the proposed DCSK-RFID system is carefully generalized both in theoretic analysis and in simulations. From the simulation results, the theoretical and simulation values match closely with each other. Then, we design an anti-collision MAC protocol based on multi-access DCSK-RFID scheme. We theoretically analyze the throughout in given number of tags. The simulation shows that the proposed algorithm has better throughout than S-Aloha system

  4. Efficient medium access control protocol for geostationary satellite systems

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  5. A new access control system by fingerprint for radioisotope facilities

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  6. The Romanian Banking System after EU Accession

    Viorica IOAN

    2011-11-01

    Full Text Available Banks play an important role in the financial sector, in the proper functioning of economic entities and in the economy as a whole, therefore over time the establishment of a functioning banking system capable of delivering a wide range of products and services to meet the requirements of all potential customers has been a permanent concern. Considering the economic and financial reality, both internationally and domestically, each country and therefore, Romania is interested in creating a solid banking system, enabling the appropriate organizational framework in order to ensure a development of the financial mechanisms. The banking system as the basic element of the financial system, allows an efficient allocation of resources in the economy and, in order to function properly, we need to know the risks they face:a slow economic growth may cause losses due to difficulties in repaying bank loans, due to lower sales or lower wages, changes in asset prices may cause financial losses to investors, decreasing a sector of the economy which has monopolized the banks’ and investors’ attention.

  7. Denial-of-Service Security Attack in the Continuous-Time World

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial-of-service s......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without...

  8. Remotely Accessed Vehicle Traffic Management System

    Al-Alawi, Raida

    2010-06-01

    The ever increasing number of vehicles in most metropolitan cities around the world and the limitation in altering the transportation infrastructure, led to serious traffic congestion and an increase in the travelling time. In this work we exploit the emergence of novel technologies such as the internet, to design an intelligent Traffic Management System (TMS) that can remotely monitor and control a network of traffic light controllers located at different sites. The system is based on utilizing Embedded Web Servers (EWS) technology to design a web-based TMS. The EWS located at each intersection uses IP technology for communicating remotely with a Central Traffic Management Unit (CTMU) located at the traffic department authority. Friendly GUI software installed at the CTMU will be able to monitor the sequence of operation of the traffic lights and the presence of traffic at each intersection as well as remotely controlling the operation of the signals. The system has been validated by constructing a prototype that resembles the real application.

  9. SPS access control system a new user interface

    Riesco, T

    1999-01-01

    This document describes the project to implement at CERN new trends in industrial control systems and integrate new requirements and functions requested by users. This project will be the testing ground for the specification of procedures in the Access Control and Machine Interlock of LHC. The last modification in the Access Control System to the primary beam areas was made in 1995, and this new project is to improve the fields of personal security, access security and the introduction of modern communication networks used in the industrial control systems. Inside the cycle model of project life, it is at the present time in the test phase in terms of security and exploitation inside the Accelerator Decelerator (AD) project. The presence of Authorization Management System (AMS) to guarantee the automatic information distribution of authorizations to controlled areas is in line with this project.

  10. Einstein Critical-Slowing-Down is Siegel CyberWar Denial-of-Access Queuing/Pinning/ Jamming/Aikido Via Siegel DIGIT-Physics BEC ``Intersection''-BECOME-UNION Barabasi Network/GRAPH-Physics BEC: Strutt/Rayleigh-Siegel Percolation GLOBALITY-to-LOCALITY Phase-Transition Critical-Phenomenon

    Buick, Otto; Falcon, Pat; Alexander, G.; Siegel, Edward Carl-Ludwig

    2013-03-01

    Einstein[Dover(03)] critical-slowing-down(CSD)[Pais, Subtle in The Lord; Life & Sci. of Albert Einstein(81)] is Siegel CyberWar denial-of-access(DOA) operations-research queuing theory/pinning/jamming/.../Read [Aikido, Aikibojitsu & Natural-Law(90)]/Aikido(!!!) phase-transition critical-phenomenon via Siegel DIGIT-Physics (Newcomb[Am.J.Math. 4,39(1881)]-{Planck[(1901)]-Einstein[(1905)])-Poincare[Calcul Probabilités(12)-p.313]-Weyl [Goett.Nachr.(14); Math.Ann.77,313 (16)]-{Bose[(24)-Einstein[(25)]-Fermi[(27)]-Dirac[(1927)]}-``Benford''[Proc.Am.Phil.Soc. 78,4,551 (38)]-Kac[Maths.Stat.-Reasoning(55)]-Raimi[Sci.Am. 221,109 (69)...]-Jech[preprint, PSU(95)]-Hill[Proc.AMS 123,3,887(95)]-Browne[NYT(8/98)]-Antonoff-Smith-Siegel[AMS Joint-Mtg.,S.-D.(02)] algebraic-inversion to yield ONLY BOSE-EINSTEIN QUANTUM-statistics (BEQS) with ZERO-digit Bose-Einstein CONDENSATION(BEC) ``INTERSECTION''-BECOME-UNION to Barabasi[PRL 876,5632(01); Rev.Mod.Phys.74,47(02)...] Network /Net/GRAPH(!!!)-physics BEC: Strutt/Rayleigh(1881)-Polya(21)-``Anderson''(58)-Siegel[J.Non-crystalline-Sol.40,453(80)

  11. Organizational crisis-denial strategy: the effect of denial on public framing

    T.G.L.A. van der Meer

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames em

  12. Access Safety Systems – New Concepts from the LHC Experience

    Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E

    2011-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...

  13. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  14. Improving information access with an emergency department system.

    Travers, D.; Parham, T.

    1997-01-01

    An emergency department (ED) clinical system was developed by in-house personnel, with ED physician, nursing, registration and clerical staff input. The utilization of existing hardware and customization of the hospital's mainframe hospital information system (HIS) facilitated the implementation of a cost-effective system that meets the information access needs of a busy, state-of-the-art academic ED. The transition to automation of the ED was facilitated through the use of a comprehensive tr...

  15. Accessibility and Radioactivity Calculations for Nuclear Reactor Shutdown System

    An important consideration in the design of power reactors is providing access to the reactor cooling system for the purposes of maintenance, repair and refuelling. The major sources of radiation which tend to prohibit such access are: induced activity of the reactor coolant, activated impurities in the reactor coolant and radiation originating in the reactor core both during reactor operation and after shut down. Impurities in the reactor coolant may be present in high enough concentrations so that their activation restricts accessibility for maintenance after shutdown. When water being used as a coolant, the activity of the water itself is very short- lived but their corrosive nature, resultant high impurity and induced activity of structural material are the major source of activity in the system after reactor shutdown. In this case, it may be necessary to chemically remove some of the impurity by a purification process to prevent a build up of long-lived induced activity in the system from restricting access to the plant, and to keep the radiation dose at the working places within the permissible limits. A mathematical modelling is developed. A system of coupled first-order linear differential equations describing adequately the activity behaviour has to be derived and solved. It treats the determination of equilibrium concentrations of impurities on system surface , and the effect of release of fission products from the reactor core

  16. A novel IPTV program multiplex access system to EPON

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  17. THE USAGE OF HRU SEGMENT MATRIX ACCESS IN THE ANALYSIS OF INFORMATION SECURITY SYSTEMS WHICH MAKE MANDATORY ACCESS CONTROL

    Korolev I. D.

    2014-09-01

    Full Text Available In this article we consider the usage of HRU access matrix changing system allowing for information security system which makes mandatory access control in case of information security analysis by using an automatic classification of formalized documents in the system of electronic document management

  18. The unified management of access authorization for information systems

    This paper describes the requirements of the unified management of access authorization for different information systems, from the point of view of the unified management to all applications of the enterprise. This paper also gives the design of software based on the requirements. (authors)

  19. Denial in Rehabilitation: Its Genesis, Consequences, and Clinical Management.

    Naugle, Richard I.

    1988-01-01

    Notes that, in rehabilitation, denial can motivate individuals to work on behavioral sequelae of neurological deficits or it can impede rehabilitation by impairing one's ability to acknowledge sequelae. Reviews effect of denial and describes management strategy to address denial. (Author/NB)

  20. Overcoming Denial through the Group: A Test of Acceptance Theory.

    Rugel, Robert P.; Barry, Denise

    1990-01-01

    Found participants (N=28) in alcohol treatment groups showed decreases in denial of drinking problems and decreases in psychopathology following 12 weeks of group counseling. Determined greater self-acceptance was associated with experiencing acceptance by group and with greater decreases in denial; decreases in denial and psychopathology were…

  1. 19 CFR 174.30 - Notice of denial of protest.

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Notice of denial of protest. 174.30 Section 174.30... TREASURY (CONTINUED) PROTESTS Review and Disposition of Protests § 174.30 Notice of denial of protest. (a) Issuance of notice. Notice of denial of a protest shall be mailed to any person filing a protest or...

  2. The ARAC client system: network-based access to ARAC

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  3. Does the public deserve free access to climate system science?

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  4. NASA Access Mechanism - Graphical user interface information retrieval system

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  5. NASA access mechanism: Graphical user interface information retrieval system

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  6. Workflow management systems, their security and access control mechanisms

    Chehrazi, Golriz

    2007-01-01

    This paper gives an overview of workflow management systems (WfMSs) and their security requirements with focus on access mechanisms. It is a descriptive paper in which we examine the state of the art of workflow systems, describe what security risks affect WfMSs in particular, and how these can be diminiuished. WfMSs manage, illustrate and support business processes. They contribute to the performance, automation and optimization of processes, which is important in the global economy today. ...

  7. Preface to Evaluating Systems for Multilingual and Multimodal information Access

    Peters, Carol; Deselaers, Thomas; Ferro, Nicola; Gonzalo, Julio; Jones, Gareth J.F.; Kurimo, Mikko; Mandl, Thomas; Penas, Anselmo; Petras, Vivien

    2009-01-01

    This book constitutes the thoroughly refereed proceedings of the 9th Workshop of the Cross-Language Evaluation Forum, CLEF 2008, held in Aarhus, Denmark, in September 2008. The 130 revised and extended papers presented were carefully reviewed and selected for inclusion in the book. They are completed by an introduction on CLEF 2008. As usual, the seven main evaluation tracks in CLEF 2008 aimed to test the performance of a wide range of multilingual information access systems or system compone...

  8. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han

    2009-06-01

    Full Text Available The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management of internal functions is of the same importance as external service management. It is very troublesome to control authorizations merely with attributes and composition of policies introduced from attribute-based access control (ABAC. So, we introduce a united access control model for systems in collaborative commerce, combining the advantages of conventional role-based access control (RBAC, task-based authentication control (TBAC and that of recent ABAC and automated trust negotiation (ATN. Innovational ideas in the model are analyzed, and the implement architecture is discussed. The paper concludes with a summary of the united model’s benefits and future work.

  9. Computer systems handle changing T-line access

    Paula, G.

    1990-03-01

    As the number of power exchanges among utilities grows and transmission lines are loaded more heavily, it becomes increasingly difficult to manage power-system access. A study sponsored by the Electric Power Research Institute (EPRI) identifies two analysis techniques that can provide more detailed line-use information to help utilities ensure continued reliability. After meeting internal needs, a utility agrees on usage price and terms with other power suppliers and users that want to transfer power across its lines. This is known as wheeling. However, such transactions affect the loading of lines belonging to other utilities. As a result, no utility can actually control who uses its transmission system. Many utilities would like a way to monitor power flows on their systems to improve the economy and reliability of operation. The EPRI-sponsored study, conducted by Casazza, Schultz, Associates (CSA), Arlington, VA, identifies ways that computer methods can help utilities cope with increased line access.

  10. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  11. Type-Based Access Control in Data-Centric Systems

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  12. Task-role-based Access Control Model in Smart Health-care System

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  13. Resilient Control under Denial-of-Service:Robust Design

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not destroyed. Analog and digital predictor-based controllers with state resetting are proposed, which achieve the considered control objective for a general class of DoS signals. An example is given to il...

  14. Formalized Description of Distributed Denial of Service Attack

    杜彦辉; 马锐; 刘玉树

    2004-01-01

    The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.

  15. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    Eles, Petru; Doboli, Alex; Pop, Paul;

    2000-01-01

    of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We......, generates an efficient bus access scheme as well as the schedule tables for activation of processes and communications....

  16. DAISY Producer: An integrated production management system for accessible media

    Egli, Christian

    2011-01-01

    Large scale production of accessible media above and beyond DAISY Talking Books requires management of the workflow from the initial scan to the output of the media production. DAISY Producer was created to help manage this process. It tracks the transformation of hard copy or electronic content to DTBook XML at any stage of the workflow and interfaces to existing order processing systems. Making use of DAISY Pipeline and Liblouis, DAISY Producer fully automates the generation of on-demand, u...

  17. A portable marine geophysical data access and management system

    Kunte, P.D.; Narvekar, P.

    COMMUNICATIONS CURRENT SCIENCE, VOL. 90, NO. 12, 25 JUNE 2006 *For correspondence. (e - mail: dr_pdkunte@yahoo.com ) A portable marine geophysical data access and ma n agement system Pravin D. Kunte 1, * and Prabhakar Narvekar 2 1 National... tio - na l data. The program calc u lates/generates the accurate position data for each fix a f ter considering the turning RESEARCH COMMUNICATIONS CURRENT SCIENCE, VOL. 90, NO. 12, 25 JUNE 2006 1659 Table 1. Database structure with field...

  18. Access control and interlock system at the Advanced Photon Source

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D. [Argonne National Lab., IL (United States). Advanced Photon Source

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  19. A semi-automated vascular access system for preclinical models

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. (paper)

  20. Denial among cancer patients. Tips and traps.

    Brock, G.; Gurekas, V; Deom, P.

    1993-01-01

    The coping mechanisms used by patients diagnosed with cancer play a role in their well-being and, therefore, influence their quality of life and possibly even their survival. We review the characteristics of one of these mechanisms, denial, and suggest an approach to dealing with denying patients.

  1. Data denial experiments for extratropical transition

    Doris Anwender

    2012-11-01

    Full Text Available Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF model are designed to investigate the value of targeted observations for historical extratropical transition (ET cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC environment is, on average, as important as denying data in mid-latitude sensitive regions determined using extratropical singular vectors (SV. The impact of data denial over TC regions propagates downstream from the Atlantic towards Europe, with a maximum degradation at day 4. This degradation is mainly attributed to the data denial at the TC stage, i.e. before ET is completed. When data are denied on mid-latitude sensitive regions, the largest degradation is found around day 2 and also after the day 4 forecast. In general, the loss of information content is larger when data are denied in mid-latitude sensitive areas because these identify dynamically active regions. In both denial experiments, aircraft and satellite radiance data are the most influential observations. For the selected case of Hurricane Irene, the largest degradations are found for forecasts initialised while Irene reached its peak intensity. If observations are denied in the near storm environment, the TC mostly disappears from the analysis and the subsequent forecast. This allows the impact of Irene on the formation of the downstream cut-off low to be investigated.

  2. ACCESS Earth: Promoting Accessibility to Earth System Science for Students with Disabilities

    Locke, S. M.; Cohen, L.; Lightbody, N.

    2001-05-01

    ACCESS Earth is an intensive summer institute for high school students with disabilities and their teachers that is designed to encourage students with disabilities to consider careers in earth system science. Participants study earth system science concepts at a Maine coastal estuary, using Geographic Information Systems, remote sensing, and field observations to evaluate the impacts of climate change, sea level rise, and development on coastal systems. Teachers, students, and scientists work together to adapt field and laboratory activities for persons with disabilities, including those with mobility and visual impairments. Other sessions include demonstrations of assistive technology, career discussions, and opportunities for students to meet with successful scientists with disabilities from throughout the U.S. The summer institute is one of several programs in development at the University of Southern Maine to address the problem of underrepresentation of people with disabilities in the earth sciences. Other projects include a mentoring program for high school students, a web-based clearinghouse of resources for teaching earth sciences to students with disabilities, and guidebooks for adaptation of popular published earth system science curricula for disabled learners.

  3. Denials and Delays of Radioactive Material Shipments

    delays of shipments of radioactive materials forms an important issue today. Radioactive materials need to be transported using all modes of transport for use in different applications such as public health, industry, research and production of nuclear power. The transport of radioactive materials is governed by national and international regulations, which are based on the International Atomic Energy Agency (IAEA) regulations for safe transport of radioactive materials (TS-R-1). These regulations ensure high standards of safety. Recently there were increasing numbers of instances of denials and delays of shipments of radioactive materials even when complying with the regulations. The denials and delays can result in difficulties to patients and others who rely on products sterilized by radiation. Therefore there is an urgent need for a universally accepted approach to solve this problem. In response, the IAEA has formed an International Steering Committee (ISC) on denials and delays of radioactive materials. Also, it designate the National Focal Points (NFP) representative to help the ISC members and the IAEA by informing about denial operations and how they can help. The Steering Committee developed and adopted an action plan which includes the action to be taken. This plan is based on: Awareness, Training, Communication, Lobbying for marketing, Economic and Harmonization among member states. It is important to work within the mandate of the ISC and in the line of action plan on denials and delays. It identified the following network members such as: National Focal Points, Regional Coordinators, National Committee, National Representative for different modes of transport and similar bodies, Carriers, Producers and Suppliers, Different civil societies, NGO's, Ministry of transport and others.

  4. Privacy and Access Control for IHE-Based Systems

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  5. Authorisation and access control for electronic health record systems.

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  6. Licensed Shared Access System Possibilities for Public Safety

    Kalle Lähetkangas

    2016-01-01

    Full Text Available We investigate the licensed shared access (LSA concept based spectrum sharing ideas between public safety (PS and commercial radio systems. While the concept of LSA has been well developed, it has not been thoroughly investigated from the public safety (PS users’ point of view, who have special requirements and also should benefit from the concept. Herein, we discuss the alternatives for spectrum sharing between PS and commercial systems. In particular, we proceed to develop robust solutions for LSA use cases where connections to the LSA system may fail. We simulate the proposed system with different failure models. The results show that the method offers reliable LSA spectrum sharing in various conditions assuming that the system parameters are set properly. The paper gives guidelines to set these parameters.

  7. A Rewritable, Random-Access DNA-Based Storage System

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  8. Bluetooth Navigation System Using WI-FI Access Points

    Rohit Agrawal

    2012-04-01

    Full Text Available There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The systemthat has been introduced here uses bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and cheaper is that most of the localized areas today like college campus, offices are being provided withinternet connectivity using these access points.

  9. Use of CDMA access technology in mobile satellite systems

    Ramasastry, Jay; Wiedeman, Bob

    1995-01-01

    Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.

  10. Nomadic Computing : Security assessment of remote access to workplace systems

    Karlsson, Johanna

    2003-01-01

    Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario...

  11. Channel Fragmentation in Dynamic Spectrum Access Systems - a Theoretical Study

    Coffman, Ed; Simatos, Florian; Tarumi, Shuzo; Zussman, Gil

    2010-01-01

    Dynamic Spectrum Access systems exploit temporarily available spectrum (`holes' or `white spaces') and can spread transmissions over a number of non-contiguous sub-channels. Such methods can have significant benefits in terms of spectrum utilization. However, excessive fragmentation degrades performance and hence off-sets the benefits. Thus, there is a critical need for an in-depth understanding of these processes so as to determine how best to ensure acceptable levels of fragmentation. We address this need by presenting experimental and analytical results derived from a mathematical model. In particular, we model a system operating at capacity serving requests for bandwidth by assigning as needed a collection of gaps (sub-channels) with no limitations on fragment size. Our main theoretical result shows that even if fragments can be arbitrarily small, the system does not degrade with time; i.e., the average total number of fragments remains bounded. Within the very difficult class of dynamic fragmentation mod...

  12. Access Control in Decentralised Publish/Subscribe Systems

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  13. A Systems Approach for Ameliorating Possible Prima Facie Denial of Hispanic/Black Students' Rights Through Disproportionate Enrollment in Special Education.

    McDonnell, James R.

    The paper discusses the issue of educational equity, principles of systems analysis, systems approaches in the educational milieu, the evaluation aspect of the systems approach, and application of the systems approach to preventing disproportionate enrollment of Hispanics and Blacks in special education classes in Holyoke, Massachusetts. The…

  14. Postmodernism, historical denial, and history education:

    Robert John Parkes

    2015-12-01

    Full Text Available History educators frequently ignore, or engage only reluctantly and cautiously with postmodernism. This is arguably because postmodernism is frequently accused of assaulting the epistemological foundations of history as an academic discipline, fostering a climate of cultural relativism, encouraging the proliferation of revisionist histories, and providing fertile ground for historical denial. In the Philosophy of History discipline, Frank Ankersmit has become one of those scholars most closely associated with ‘postmodern history’. This paper explores Ankersmit’s ‘postmodern’ philosophy of history, particularly his key notion of ‘narrative substances’; what it might do for our approach to a problem such as historical denial; and what possibilities it presents for history didactics.

  15. Accessibility of a Destination-Based Transportation System: A Large Airport Study

    SHI Jing; YING Xiwen

    2008-01-01

    The accessibility of a destination-based transportation system is defined to quantify the perform-ance of transportation systems which access a distinct destination. The access cost is used to reflect the utility of the transportation system including the fatigue and inconvenience in the total cost. The cost is quan-tified by two coefficients which represent the different characteristics of various people. The average cost and the income-relative accessibility are used to describe various aspects of the accessibility and to evaluate the accessibility of a destination-based system. A case study uses data from the Kunming transpor-tation system to evaluate the accessibility of the present city airport. The calibrated coefficients are then used to evaluate the transportation system to the new Kunming international airport. The results show that this transportation accessibility evaluation can be combined with transportation planning to study transporta-tion sub-systems.

  16. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  17. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-01-17

    ...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10 a.m.-4..., Airport Security Access Control Systems. The agenda will include the following: February 9, 2012...

  18. Administrative and clinical denials by a large dental insurance provider

    Geraldo Elias MIRANDA

    2015-01-01

    Full Text Available The objective of this study was to assess the prevalence and the type of claim denials (administrative, clinical or both made by a large dental insurance plan. This was a cross-sectional, observational study, which retrospectively collected data from the claims and denial reports of a dental insurance company. The sample consisted of the payment claims submitted by network dentists, based on their procedure reports, reviewed in the third trimester of 2012. The denials were classified and grouped into ‘administrative’, ‘clinical’ or ‘both’. The data were tabulated and submitted to uni- and bivariate analyses. The confidence intervals were 95% and the level of significance was set at 5%. The overall frequency of denials was 8.2% of the total number of procedures performed. The frequency of administrative denials was 72.88%, whereas that of technical denials was 25.95% and that of both, 1.17% (p < 0.05. It was concluded that the overall prevalence of denials in the studied sample was low. Administrative denials were the most prevalent. This type of denial could be reduced if all dental insurance providers had unified clinical and administrative protocols, and if dentists submitted all of the required documentation in accordance with these protocols.

  19. Bluetooth Navigation System using Wi-Fi Access Points

    Agrawal, Rohit

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The system that has been introduced here uses Bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and ch...

  20. Safety systems and access control in the National Ignition Facility.

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  1. Access to Papanicolaou Test by the Unified Health System users

    Vanessa Franco de Carvalho; Nalú Pereira da Costa Kerber; Vanessa Andréia Wachholz; Flávia Conceição Pohlmann; Letícia Amico Marques; Fabiane Ferreira Francioni

    2016-01-01

    Objective: to understand how is the access to the public health service users in the Papanicolaou Test. Methods: qualitative study, with 52 women who have changes in the Pap smear exam, questioning the exam achievement frequency and the difficulties of its access and the consultations. It was developed a thematic analysis based on the Fekete accessibility reference. Results: three categories emerged: access to information on the frequency of Pap smears, highlighting the completion of the exam...

  2. Cloud Radio Access Network: Virtualizing Wireless Access for Dense Heterogeneous Systems

    Simeone, Osvaldo; Maeder, Andreas; Peng, Mugen; Sahin, Onur; Yu, Wei

    2015-01-01

    Cloud Radio Access Network (C-RAN) refers to the virtualization of base station functionalities by means of cloud computing. This results in a novel cellular architecture in which low-cost wireless access points, known as radio units (RUs) or remote radio heads (RRHs), are centrally managed by a reconfigurable centralized "cloud", or central, unit (CU). C-RAN allows operators to reduce the capital and operating expenses needed to deploy and maintain dense heterogeneous networks. This critical...

  3. Title III Evaluation Report for the Access Road System

    The objective of this evaluation is to provide recommendations to ensure consistency between the technical baseline requirements, baseline design, and the as-constructed Access Roads. Recommendations for resolving discrepancies between the as-constructed system, the technical baseline requirements, and the baseline design are included in this report. Cost and Schedule estimates are provided for all recommended modifications. This report does not address items which do not meet current safety or code requirements. These items are identified to the CMO and immediate action is taken to correct the situation. The report does identify safety and code items for which the A/E is recommending improvements. The recommended improvements will exceed the minimum requirements of applicable code and safety guide lines. These recommendations are intended to improve and enhance the operation and maintenance of the facility

  4. Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Adebukola Onashoga

    2014-02-01

    Full Text Available Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal and user management (user creation, user update and user removal. The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.

  5. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  6. Power System Trade Studies for the Lunar Surface Access Module

    Kohout, Lisa, L.

    2008-01-01

    A Lunar Lander Preparatory Study (LLPS) was undertaken for NASA's Lunar Lander Pre-Project in 2006 to explore a wide breadth of conceptual lunar lander designs. Civil servant teams from nearly every NASA center responded with dozens of innovative designs that addressed one or more specific lander technical challenges. Although none of the conceptual lander designs sought to solve every technical design issue, each added significantly to the technical database available to the Lunar Lander Project Office as it began operations in 2007. As part of the LLPS, a first order analysis was performed to identify candidate power systems for the ascent and descent stages of the Lunar Surface Access Module (LSAM). A power profile by mission phase was established based on LSAM subsystem power requirements. Using this power profile, battery and fuel cell systems were modeled to determine overall mass and volume. Fuel cell systems were chosen for both the descent and ascent stages due to their low mass. While fuel cells looked promising based on these initial results, several areas have been identified for further investigation in subsequent studies, including the identification and incorporation of peak power requirements into the analysis, refinement of the fuel cell models to improve fidelity and incorporate ongoing technology developments, and broadening the study to include solar power.

  7. Critical Surfing: Holocaust Denial and Credibility on the Web.

    Borrowman, Shane

    1999-01-01

    Discusses the nature of hate speech in general, and Holocaust denial in particular, on the World Wide Web, citing specific Web sources. Argues that, although discussion of Holocaust denial may be a difficult classroom discussion topic, and should be approached carefully, intelligent use of the Internet must be taught in the classroom. (MSE)

  8. Development of a Denial Scale for Male Incest Offenders.

    Guthrie, James T.; Canada, Richard M.; Lim, Mee-Gaik; Jennings, Glen H.

    1998-01-01

    A scale to measure denial among sexual offenders was developed for male incest offenders (N=265). Validity and reliability were tested. Four subscales correspond to the domains of denial: facts, awareness, impact, and responsibility. Development strategy and psychometric analysis are reported. Recommendations for further research are included.…

  9. 19 CFR 174.29 - Allowance or denial of protests.

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance or denial of protests. 174.29 Section... OF THE TREASURY (CONTINUED) PROTESTS Review and Disposition of Protests § 174.29 Allowance or denial of protests. The port director shall allow or deny in whole or in part a protest filed in...

  10. SINP space physics data storage and access system

    Barinova, Vera; Kalegaev, Vladimir; Parunakian, David

    In this paper we present the system for automated data retrieval and processing developed in the the Skobeltsyn Institute of Nuclear Physics. Telemetry data files containing scientific information (e.g. charged particle fluxes) are auto-matically parsed and stored in our Oracle database immediately upon arrival. Parsed telemetry files, metadata, instrument technical information and orbital parameters are also stored. Most of the data can be accessed via our public FTP server. Users can preview the data available for time intervals and channels of interest using the web interface provided. The preview plot building software has also been developed in-house. This system has been successfully used in 2009 with the following spacecraft and instru-ments: Electron-M-Pesca at Coronas-Photon (Electrons 200KeV -4 MeV+; Protons : 4 MeV -80MeV+ ;α : 5 -24 MeV/nucleon; CNO : 6 -15MeV/nucleon), DUFIK at Tatiana-2 (electrons, infrared 600nm ¡ ¡ 700nm and ultraviolet 300nm ¡ ¡ 400nm), MSGI and SKL at Meteor-M (10 spectral channels: 0,5-12,5 µm ). The data collections are available at http://smdc.sinp.msu.ru for visual preview and download.

  11. A system for success: BMC Systems Biology, a new open access journal

    Webb Penelope A; Hodgkinson Matt J

    2007-01-01

    Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  12. A system for success: BMC Systems Biology, a new open access journal

    Webb Penelope A

    2007-09-01

    Full Text Available Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  13. Denial of Service Prevention for 5G

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology in...

  14. Universal remote access infrastructure for embedded systems; Universelle Fernzugriff-Infrastruktur fuer eingebettete Systeme

    Jazdi, N. [Stuttgart Univ. (Germany). Inst. fuer Automatisierungs- und Softwaretechnik

    2005-07-01

    This article describes a flexible and extensible infrastructure for applying Web-Technologies to embedded systems.The presented approach develops a Three-level-Architecture consisting of the embedded system, the universal Remote-Access-Server and the Remote-Access-Client. A system-spanning general interface allows the binding of embedded systems in order to access their process data. Additionally, this procedure facilitates a flexible processing of the device data, so that it is ready to be used by different control devices. To ensure flexibility - connecting different devices on the one side and providing information for different clients like PC, PDA or mobile phone on the other side - a new XML-based description language (Service Description Markup Language - SDML) is introduced. The SDML documents contain information about connected embedded systems, reusable device data and the presentation policies for different clients. These documents are specifically created for each device. Applying the suggested procedure, different embedded systems can be connected to the Internet with minimum hardware and software requirements/costs. Software components of the Remote-Access-Server, once developed, can be used and applied to various devices which lead to a reduction of the development costs. The user can use an ordinary web browser to communicate with the devices and does not need to install any additional software on his local computer. (orig.) (orig.)

  15. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  16. The Time Between: Continuously-defined accessibility functions for schedule-based transportation systems

    Paul Anderson; Andrew Owen; David Levinson

    2012-01-01

    Accessibility is traditionally considered to be a property of a point or region in space, and to be invariant over time (or at least over some computationally convenient time interval). How- ever, a locations accessibility can vary over time on a wide range of scales. This temporal variation is especially significant for schedule-based transportation systems. Current measures of accessibility generally reflect the accessibility only at points in time corresponding to the departures of one or ...

  17. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  18. A United Access Control Model for Systems in Collaborative Commerce

    Ruo-Fei Han; Hou-Xiang Wang; Qian Xiao; Xiao-Pei Jing; Hui Li

    2009-01-01

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management...

  19. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data System-Public access to data. 504.602-71 Section 504.602-71 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION GENERAL ADMINISTRATIVE MATTERS Contract Reporting 504.602-71 Federal Procurement Data System—Public access to data....

  20. From System Expansion to System Contraction: Access to Higher Education in Poland

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  1. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  2. AMC Model for Denial of Sleep Attack Detection

    Bhattasali, Tapalina

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sensor network is affected by denial of sleep attack or not can be decided by considering expected death time of sensor network under normal scenario.

  3. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  4. Accessibility od design documentation on mobile devices with Android Operating System

    Lovše, Tilen

    2013-01-01

    In this graduation thesis the accessibility of design documentation on mobile devices with Android operating system is discussed. Mobile devices, used for accessing to design documentation, are tablet computers or simply tablets. Introduction presents benefits of accessing to design documentation on tablets and Slovenian history in this field, followed by the review of Android operating system, its history, upgrade and features. Practical part covers the review of five different tablets, whic...

  5. Evaluating the Accessibility of Three Open-Source Learning Content Management Systems: A Comparative Study

    Iglesias, Ana; Moreno, Lourdes; Martínez, Paloma; Calvo, Rocío

    2011-01-01

    Learning content management systems (LCMSs) have become increasingly popular in the educational field over the past few years. However, problems in system design can create difficulties in the interactions between LCMSs and an important sector of the user population. The assessment and monitoring of LCMS accessibility are vital for the guarantee of universal accessibility in education. This article presents a comparative study of the accessibility of three web-based, open-source L...

  6. The entire network topology display system of terminal communication access network

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  7. Analysis of a Priority Stack Random Access Protocol In W-CDMA Systems

    Al Agha, Khaldoun; Jacquet, Philippe; Vvedenskay, Nikita

    2000-01-01

    The stack protocol (called also tree protocol) can be used in order to introduce a priority mechanism on the random access stage in W-CDMA. Indeed, after second generation networks supporting voice service only, the third generation systems (UMTS) should offer more services with quality and priority. However, all priorities in the UMTS system are based on the dedicated channel and after the random access mechanism that use the weak access protocol: slotted aloha. In this paper, we analyze the...

  8. ARCPAS - Automatic radiation control point access system an automated data collection terminal for radiation dose and access control

    Nuclear facilities such as nuclear power plants or fuel processing facilities are required to maintain accurate records of personnel access, exposure and work performed. Most facilities today have some sort of computerized data collection system for radiation dose and access control. The great majority rely on handwritten records, i.e., dose card or sign-in sheet which in turn are transferred to a computerized records management system manually. The ARCPAS terminal provides a method for automating personnel exposure data collection and processing. The terminal is a user interactive device which contains a unit for automatically reading and zeroing pocket dosemeters, a security badge reader for personnel identification, a 16 digit key pad for RWP information entry, a high resolution color CRT for interactive communication and a high speed tape printer providing an entry chit. The chit provides the individual worker with a record of the transaction including an individual identifying number, remaining dose for the quarter or period and RWP under which the worker entered the controlled area. The purpose of automating the access control is to provide fast, accurate, realtime data to the records management system. A secondary purpose is to relieve trained health physics technicians of control point duties so that their training and skills can be utilized more effectively in a facility's health physics program

  9. Access to fertility services by transgender persons: an Ethics Committee opinion.

    2015-11-01

    This statement explores the ethical considerations surrounding the provision of fertility services to transgender individuals and concludes that denial of access to fertility services is not justified. PMID:26363388

  10. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-11-30

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13, 2012... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security...

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-07-22

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security...

  12. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-10-23

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15, 2012... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security...

  13. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-03-18

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from 9... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security...

  14. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  15. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  16. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2012-09-11

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28, 2012... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security...

  17. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    2013-04-12

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10, 2013... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security...

  18. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Rulemaking Proceeding The Digital Millennium Copyright Act, Public Law 105-304 (1998), amended title 17...

  19. Fine-Grained Access Control for Electronic Health Record Systems

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  20. Database application research in real-time data access of accelerator control system

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  1. Physical protection of hardware and software. Linking access control systems with operational computer systems

    The existence and use of software and networks have generated another possibility for perpetrators to influence systems in nuclear facilities or to prepare malevolent acts. Data security has become an element of physical protection plans, not as an end in itself but as a means to achieve physical protection objectives. Physical protection measures are additional measures, which become necessary when other measures that have to be taken (e.g. in compliance with international standards) are insufficient to prevent a hazard to the protection goals through data manipulation by software and hardware. In planning or assessing data protection measures for the purpose of physical protection, it is necessary to differentiate between applications which can, if manipulated, directly endanger the protection goals. The importance of software protection is growing. In particular, because of ageing of components, the existing instrumentation and control systems with their fixed wiring and discrete elements will have to be updated. Computerized access control systems play an eminent role in the physical protection of a nuclear facility. Therefore, most systems are operated as islands. The paper shows that linking of certain systems with other computer systems is possible without inadmissible drawbacks for the physical protection level. It is shown by means of the example of linking together the computer networks of access control, health physics, the flexitime system, the key administration and the operational management system that such linking of systems in nuclear facilities had hidden advantages for all participants

  2. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  3. A CDMA architecture for a Ka-band Personal Access Satellite System

    Motamedi, Masoud; Sue, Miles K.

    1990-01-01

    A Code Division Multiple Access (CDMA) architecture is currently being studied for use in a Ka-band Personal Access Satellite System (PASS). The complete architecture consisting of block diagrams of the user terminal, the supplier station, the network management center, and the satellite is described along with the access methods and frequency/time plans. The complexity of developing this system using the CDMA architecture is compared to that of a Frequency Division Multiple Access (FDMA) architecture. The inherent advantages and disadvantages of the two architectures are compared and their respective capacities are discussed.

  4. Human engineering considerations in designing a computerized controlled access security system

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  5. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Mitsuru; Miyauchi; Yanjun; Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirm low optical loss and environmental stabilities.

  6. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Mitsuru Miyauchi; Yanjun Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirmlow optical loss and environmental stabilities.

  7. H1DS: A new web-based data access system

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  8. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand

  9. Improving Potable Water Accessibility And Sustainability Through Efficient Management Of Pipe Water Supply System

    Nakabugo, Stella Mirembe

    2015-01-01

    This paper discusses how to improve potable water accessibility and sustainability through efficient management of pipe water supply system a case study of Uganda, Kampala region. Kampala the capital city of Uganda still faces a challenge to access clean potable water. Water supply coverage is 77.5 % showing at least 22.5 % of the total population has limited access to potable drinking water causing a gap between water supply and water demand. Hypotheses of the paper were that the city's popu...

  10. Systemic barriers accessing HIV treatment among people who inject drugs in Russia: a qualitative study

    Sarang, Anya; Rhodes, Tim; Sheon, Nicolas

    2012-01-01

    Achieving ‘universal access’ to antiretroviral HIV treatment (ART) in lower income and transitional settings is a global target. Yet, access to ART is shaped by local social condition and is by no means universal. Qualitative studies are ideally suited to describing how access to ART is socially situated. We explored systemic barriers to accessing ART among people who inject drugs (PWID) in a Russian city (Ekaterinburg) with a large burden of HIV treatment demand. We undertook 42 in-depth qua...

  11. Providing access to a Public Transport Schedule system for Smart Phone Clients

    Hameseder, Katrin

    2010-01-01

    This master thesis was conducted during an internship at HBT GmbH with the purpose of providing access to an existing public transport schedule system in Hamburg (Germany) for smart phone clients. A state-of-the-art literature review and an evaluation of an existing SOAP (Simple Object Access Protocol) based web service to access public transport schedule information were conducted to identify the drawbacks of the existing interface with respect to the limitations and characteristics of smart...

  12. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  13. Development of Patient Status-Based Dynamic Access System for Medical Information Systems

    Chang Won Jeong

    2015-06-01

    Full Text Available Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard. This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.

  14. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  15. A Generic Role Based Access Control Model for Wind Power Systems

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  16. 28 CFR 16.73 - Exemption of Office of Legal Policy System-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of Legal Policy System-limited access. 16.73 Section 16.73 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... provide information concerning a candidate for a judgeship. Access could reveal the identity of the...

  17. 28 CFR 16.92 - Exemption of Environment and Natural Resources Division Systems-limited access.

    2010-07-01

    ... Resources Division Systems-limited access. 16.92 Section 16.92 Judicial Administration DEPARTMENT OF JUSTICE....92 Exemption of Environment and Natural Resources Division Systems—limited access. (a)(1) The... completeness of such records; and to have an opportunity to amend his or her record or seek judicial review....

  18. Transferability and data access issues. [decision information display system

    Ferreros, A. V.

    1981-01-01

    The evolution and current operational mode of the domestic information display system (DIDS) now known as the decision information display system are described. This minicomputer based system, developed from a NASA-generated image processing system, was designed to display federal statistical data for a variety of geographic areas in the form of choropleth maps. The application of DIDS in South Carolina is discussed as well as the progress made and issues that emerged in using the data base on a state and county level. The hardware base for the system, how this user friendly system works, and the possibility of transferring data to remote systems are examined.

  19. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  20. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  1. Mitigation of multiple access interference using two-dimensional modified double weight codes for optical code division multiple access systems

    Jamil Abdullah, Amir Razif Arief; Aljunid, Syed Alwee; Safar, Anuar Mat; Nordin, Junita Mohd; Ahmad, R. Badlishah

    2012-06-01

    We proposed newly two-dimensional (2-D) spectral amplitude coding optical code division multiple access (OCDMA) scheme using modified double weight (MDW) code capable of suppressing phase-induced intensity noise (PIIN). The architecture of the spectral/spatial MDW OCDMA system with the property of multi-access interference cancellation is presented. The proposed code exhibits good cross-correlation property. At the optimized data transmission rate of 0.745 Gbps, 2-D MDW, M=63, N=3, reaches maximum cardinality of 200% increases compared to 2-D perfect difference code, M=57, N=3. The performance is severely deteriorated if the data rate further increases above 0.745 Gbps. The proposed code meets the optical transmission requirements at 10-9 bit error rate error floor, with lowest effective transmitted power (Psr), -17.5 dBm, in comparison to the others through minimizing interference noise that result in PIIN suppression. The proposed system reaches optimum requirements performance in terms of cardinality, data transmission rate, and low effective transmitted power.

  2. A domotic system with remote access based on web services

    Pardo, Mauricio Esteban; Strack, Guillermo; Martínez, Diego C.

    2008-01-01

    Domotics systems are intelligent systems for houses and apartments to control several issues as security and light or climate devices. In this work we present the development of an economic domotic system to control different electrical devices in a private house. This is achieved either from inside the building or by remote control using a regular Internet connection. In order to provide this functionality, the system includes a server that provides web services to the controlling applicatio...

  3. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  4. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    2010-01-26

    ... of Behavior and User Agreement AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice... (EIV) System User Access, Authorization Form and Rules Of Behavior and User Agreement. OMB...

  5. [Denial of pregnancy and neonaticide: psychopathological and clinical features].

    Seigneurie, A-S; Limosin, F

    2012-11-01

    Pregnancy denial and neonaticide have recently received media coverage following a series of French cases of neonatal killing. Although it has been known for a long time that some women deny their pregnancy and may kill their newborns, there is still no consensus on the etiopathogenic factors involved in the denial of pregnancy occurrence. Even though neonaticide is often committed by young, poor, unmarried women with little or no prenatal care, it appears that denial of pregnancy is a heterogeneous condition associated with different psychological features. Societies are ambivalent with regard to mothers who killed their children and tend to lay the entire blame on them. Furthermore, there is a widespread lack of understanding among the public on these affairs, when birth control techniques and methods are widely available. The purpose of this article is to describe the different types of pregnancy denial and neonaticide and to review the still debated etiopathogenic hypotheses. The absence of the physical changes of pregnancy at the time of the denial such as cessation of menstruation, abdominal swelling or perception of foetal movements is also discussed. PMID:22939654

  6. Key issues of multiple access technique for LEO satellite communication systems

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  7. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  8. The access control and radiation monitoring system for the Austin Hospital PET Centre

    A Positron Emission Tomography Centre is being established at the Austin Hospital, Melbourne. The cyclotron vault and hotcell laboratories have been categorized according to the National Council on Radiation Protection and Measurements guidelines for access control to radiation areas. An access control system incorporating visual alarm systems, signs, barriers and interlocks has been designed for the safe operation of the Centre. These features are briefly described. 6 refs., 1 fig

  9. Bluetooth Navigation System using Wi-Fi Access Points

    Rohit Agrawal; Ashesh Vasalya

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater ...

  10. Are chats and forums accessible in e-learning systems?: a heuristic evaluation comparing four learning content management systems

    Calvo, Rocío; Gil, Almudena; Iglesias, Beatriz; Iglesias, Ana

    2013-01-01

    This paper presents a heuristic evaluation of accessibility of the Computer Supported Collaborative Learning (CSCL) tools: chat and forums in four Learning Content Management Systems (LCMS): Moodle, ATutor, dotLRN and Claroline. Moreover, some recommendations are offered in order to improve the accessibility of the tools

  11. Denial of impending death: a discourse analysis of the palliative care literature.

    Zimmermann, Camilla

    2004-10-01

    Terminally ill patients and their families are often referred to as being "in denial" of impending death. This study uses the qualitative method of discourse analysis to investigate the usage of the term "denial" in the contemporary hospice and palliative care literature. A Medline search (1970-2001) was performed combining the text words "deny" and "denial" with the subject headings "terminal care", "palliative care" and "hospice care," and restricted to English articles discussing death denial in adults. The 30 articles were analysed using a constant comparison technique and emerging themes regarding the meaning and usage of the words "deny" and "denial" identified. This paper focusses on the theme of denial as an individual psychological process. Three dominant subthemes were distinguished: denial as an unconscious "defence mechanism", denial as "healthy" and denial as temporary. The analysis focusses on the intertextuality of these themes with each other and with previous texts on the denial of death. Elements of the psychoanalytic definition of denial as an unconscious defence mechanism are retained in the literature but are interwoven with new themes on patient choice. The result is an overall discourse that is conflictual and at times self-contradictory but overall consistent with the biomedical model of illness. I suggest that the representation of death denial elaborated in these articles may be related to a larger discourse on dying in contemporary Western society, which both invites patients to participate in the planning of their death and labels those who do not comply. PMID:15279932

  12. 42 CFR 442.118 - Denial of payments for new admissions to an ICF/MR.

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Denial of payments for new admissions to an ICF/MR... AND INTERMEDIATE CARE FACILITIES FOR THE MENTALLY RETARDED Certification of ICFs/MR § 442.118 Denial of payments for new admissions to an ICF/MR. (a) Basis for denial of payments. The Medicaid...

  13. 45 CFR 233.106 - Denial of AFDC benefits to strikers.

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Denial of AFDC benefits to strikers. 233.106... COVERAGE AND CONDITIONS OF ELIGIBILITY IN FINANCIAL ASSISTANCE PROGRAMS § 233.106 Denial of AFDC benefits... refuse to seek or accept, employment. (2)(i) Provide for the denial of AFDC benefits to any family...

  14. "Show me a justice system that's open, transparent, accessible and inclusive" : barriers to access in the criminal justice system for people with disabilities as victims of crime

    Edwards, Claire; Harold, Gill; Kilcommins, Shane

    2015-01-01

    peer-reviewed This paper considers the barriers that people with disabilities in Ireland face in accessing justice through the criminal justice system when they are victims of crime. It draws on qualitative research with key actors working within the agencies of the Irish criminal justice system, along with disability organisations, victim support organisations and health and social care providers. The research identifies a number of barriers which can be differentiated in terms of those o...

  15. Ask Systems: Interrogative Access to Multiple Ways of Thinking

    Jonassen, David H.

    2011-01-01

    The purpose of this paper is to familiarize instructional designers and researchers with a useful design and research paradigm known as "Ask Systems." Ask Systems are interrogative interfaces to information and learning environments that model conversations with a skilled, reflective practitioner (Schon, The reflective practitioner, "1983") or…

  16. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    Paola Di Maio

    2011-09-01

    Full Text Available The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are largely ignored. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research.

  17. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    Di Maio, Paola

    2011-01-01

    The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are not widely adopted. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA) of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research

  18. Measuring the Gap Between Car and Transit Accessibility : Estimating Access Using a High-Resolution Transit Network Geographic Information System

    Benenson, I.; Martens, C.J.C.M.; Rofé, Y.

    2010-01-01

    Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,

  19. A Comparitive Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Arockiam .L

    2011-05-01

    Full Text Available Denial of Service (DoS attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the Central Manager (CM, Medium Access Control Address Filtering (MAF and Traffic Pattern Filtering (TPF methods to avoid DoS attacks in Wireless Local Area Network (WLAN. Central Manager (CM provides the better solution to avoid DoS attacks and it improves the performance of WLAN with the help of tables and timer. In the case of Transmission Control Protocol (TCP, MAF and TPF methods are used to detect and resolve Authentication Request Flooding (AuthRF and Association Request Flooding (AssRF. This paper compares the performance of these two solutions based on throughput and the results are analyzed with the graphs.

  20. CDC STATE System E-Cigarette Legislation - Youth Access

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth...

  1. 28 CFR 25.6 - Accessing records in the system.

    2010-07-01

    ... law enforcement and other relevant record systems, and may provide a unique State-Assigned Transaction... “Denied” response. (h) POC Determination Messages. POCs shall transmit electronic NICS transaction... FFL. For transactions where a determination has not been communicated to the FFL, the...

  2. Labeling and Rating Systems: Greater Access or Censorship?

    Martin, Ann M.

    2015-01-01

    This article asks the question: How well versed are school librarians on issues related to labeling and rating systems? As school librarians continue to design and implement resource location schemes to assist patrons, they must recognize the difference between using labels to create interest in books or implementing labeling and rating systems…

  3. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...... radio will be presented as well....

  4. Study of LANs access technologies in wind power system

    Wei, Mu; Chen, Zhe

    2010-01-01

    Due to the energy challenges in the world, new types of generation technologies, such as renewable energy based generators, attract great attention and are being quickly developed, which results in the dramatic developments and changes in modern power systems, the communication technologies play ...

  5. Access Control for Monitoring System-Spanning Business Processes

    Bassil, S.; Reichert, M.U.; Bobrik, R.; Bauer, Th.

    2007-01-01

    Integrated process support is highly desirable in environ- ments where data related to a particular (business) process are scattered over distributed and heterogeneous information systems (IS). A process monitoring component is a much-needed module in order to provide an integrated view on all these

  6. Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis

    Pop, Paul; Eles, Petru; Peng, Zebo

    2000-01-01

    We present an approach to bus access optimization and schedulability analysis for the synthesis of hard real-time distribution embedded systems. The communication model is based on a time-triggered protocol. We have developed an analysis for the communication delays proposing four different message...... scheduling policies over a time-triggered communication channel. Optimization strategies for the bus access scheme are developed, and the four approaches to message scheduling are compared using extensive experiments....

  7. Using geographic information system tools to improve access to MS specialty care in Veterans Health Administration

    William J. Culpepper, II, PhD, MA; Diane Cowper-Ripley, PhD; Eric R. Litt, BA; Tzu-Yun McDowell, MA; Paul M. Hoffman, MD

    2010-01-01

    Access to appropriate and timely healthcare is critical to the overall health and well-being of patients with chronic diseases. In this study, we used geographic information system (GIS) tools to map Veterans Health Administration (VHA) patients with multiple sclerosis (MS) and their access to MS specialty care. We created six travel-time bands around VHA facilities with MS specialty care and calculated the number of VHA patients with MS who resided in each time band and the number of patient...

  8. Information system for easy access of the First Military Survey

    Pacina, J.; Chodějovská, Eva; Popelka, J.

    Sofia : STEF92 Technology, 2014, s. 683-690. ISBN 978-619-7105-12-4. ISSN 1314-2704. [International Multidisciplinary Scientific Geoconference and EXPO, SGEM 2014. Albena (BG), 17.06.2014-26.06.2014] R&D Projects: GA ČR(CZ) GBP410/12/G113 Keywords : First Military Survey * Bohemia, XVIII century * cartography * scientific edition * information system Subject RIV: AB - History

  9. Multi-tag content access control in RFID system

    Xue, Shun

    2010-01-01

    Radio Frequency Identification (RFID) makes great flexibility and high efficiency for data acquisition in industry and daily life. At the other side, it brings the privacy risks and multiple tags collision issue. Current research in RFID system focuses on the security and privacy issue which is based on authentication protocols between a tag and a Reader. There is a need to design a reasonable protocol which takes care of both multi-tag anti-collision and security issue. This thesis presen...

  10. Geoculture world system, access to Balkan and Albania

    Ilirjan Çukaj

    2015-03-01

    Full Text Available If culture as a term covers a broad range of relations and social behavior, mutually implicated in influential and economic cycles of the global system, then it becomes wordy geoculture. Geoculture system is used as a term by Wallerstein (2004 who had treated it as a concept largely unused and under a theory of geoculture which plays an important role in the present world system. The theses that is presented in this article is that the global trajectory in the Balkan region is increasing from culture and that, it is imperative to establish a strategic culture direction and management, which, in turn, should be formed not only as a principal need, but also as an obligation of social state institutions to find the viable solutions of the global market policy, economy and culture. And in response to the challenging question the culture of integration becomes imperative now facing nationalism. Albania will have to manage perceptions, fears and realities arising from the above mentioned phenomenon, to establish a balance between the “inside” and “outside” views. In this sense main challenge of Albania is the management of cultural globalization to get the most of opportunities despite the risk of losing ground globally

  11. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  12. Systems requirements for cable modems in high-speed access networks

    Campos, Luis A.; Su, Shing-Fong

    1996-11-01

    Cable modems play an important role in turning the hybrid fiber coax (HFC) networks from pure broadcast video service to high-speed access networks. Many CATV companies and telephone companies are experimenting with high-speed data services over HFC. With today's technology, cable modems can easily run at a data rate of 10 Mbps or above. They allow subscribers fast access to on-line services and the Internet. A variety of cable modems have been developed and marketed by cable modem vendors. Selection of right cable modems for deployment in HFC access networks has become a nontrivial matter. Different HFC systems may require different types of cable modems. In this paper, we review the development of HFC systems and discuss data networking using approaches that include connectionless data networking and connection-oriented data networking systems. The system requirements for cable modems in terms of throughput, robustness, ease of operation, protocol efficiency, reliability, network management, and cost are addressed.

  13. Cognitive radio networks medium access control for coexistence of wireless systems

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  14. An Information System to Access Status Information of the LHCb Online

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  15. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  16. A Distributed Metadata Management, Data Discovery and Access System

    Palanisamy, Giriprakash; Green, Jim; Wilson, Bruce

    2010-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, among other features. Mercury provides a single portal to information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fa...

  17. Multi-level access control in the data pipeline of the international supply chain system

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to b

  18. Long-term venous access using a subcutaneous implantable drug delivery system.

    Soo, K. C.; Davidson, T I; Selby, P; Westbury, G

    1985-01-01

    To facilitate long-term venous access in patients receiving chemotherapy, a subcutaneous totally implantable system (Port-a-Cath, Phamacia) has been used in 14 patients. The method of implantation and the advantages over conventional central venous catheters are discussed. The expense of the system necessitates careful patient selection.

  19. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    Pop, Traian; Pop, Paul; Eles, Petru; Peng, Zebo

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  20. 28 CFR 16.99 - Exemption of the Immigration and Naturalization Service Systems-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Immigration and....99 Exemption of the Immigration and Naturalization Service Systems-limited access. (a) The following systems of records of the Immigration and Naturalization Service are exempt from 5 U.S.C. 552a (c) (3)...

  1. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  2. AN ANALYSIS OF CURRENT COMPUTER NETWORK ATTACK PROCEDURES, THEIR MITIGATION MEASURES AND THE DEVELOPMENT OF AN IMPROVED DENIAL OF SERVICE (DoS ATTACK MODEL

    IHEKWEABA OGECHI

    2013-04-01

    Full Text Available This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as a proof of concept, and then applied in the development of a model for an adaptive intelligent multi-agent for network protection, against denial of service attacks.

  3. Environmental Information Management For Data Discovery and Access System

    Giriprakash, P.

    2011-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source software and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007 and released in early 2008. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, and ready customization to meet the needs of the multiple projects which use Mercury. For the end users, Mercury provides a single portal to very quickly search for data and information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow ! the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fast search results to the user, while allowing data providers to advertise the availability of their data and maintain complete control and ownership of that data.

  4. On climate change skepticism and denial in tourism

    Hall, C.M.; Amelung, B.; Cohen, S.; Eijgelaar, E.; Gössling, S.; Higham, J.; Leemans, R.; Peeters, P.; Ram, Y.; Scott, D.

    2015-01-01

    The period leading to and immediately after the release of the IPCC’s fifth series of climate change assessments saw substantial efforts by climate change denial interests to portray anthropogenic climate change (ACC) as either unproven theory or a negligible contribution to natural climate variabil

  5. Women in Nazi Germany: Denial by Any Other Name.

    Owings, Alison

    1995-01-01

    Discusses the role, socialization, and social attitudes regarding anti-Semitism and the Holocaust among German women living at that time. Describes how many women denied the extent of discrimination against Jews. Maintains that one possible reason is that the drive for survival made denial of the Holocaust easier. (CFR)

  6. 13 CFR 115.19 - Denial of liability.

    2010-01-01

    ... guarantee application. (a) Excess Contract or bond amount. The total Contract or Order amount at the time of... Section 115.19 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SURETY BOND GUARANTEE Provisions for All Surety Bond Guarantees § 115.19 Denial of liability. Except for bonds executed on or...

  7. The Child with Cancer: Patterns of Communication and Denial.

    Spinetta, John J.; Maloney, Lorrie J.

    1978-01-01

    Examines the role of communication and denial in coping efforts of children with cancer. Results indicate level of family communication about cancer expressed by mother's communication is correlated with hypothesized responses in child. Usefulness of three instruments as effective tools in measuring child's reactions is demonstrated. (Author/BEF)

  8. Flooding Distributed Denial of Service Attacks-A Review

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  9. Iran's Denial of Education to Baha'is

    Clarken, Rodney H.

    2009-01-01

    This paper briefly describes the background of the persecution of the Baha'is in Iran, especially the denial of education, and explores what could be done to alleviate this injustice, including enlisting the support of nations, organizations, media and people around the world. Baha'is are the largest religious minority in Iran and have been…

  10. 7 CFR 400.47 - Denial of crop insurance.

    2010-01-01

    ... policyholder share reduced in accordance with 7 CFR 400.681(b), when any person becomes ineligible for crop... 7 Agriculture 6 2010-01-01 2010-01-01 false Denial of crop insurance. 400.47 Section 400.47 Agriculture Regulations of the Department of Agriculture (Continued) FEDERAL CROP INSURANCE...

  11. 44 CFR 73.3 - Denial of flood insurance coverage.

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance coverage. 73.3 Section 73.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance...

  12. 44 CFR 71.3 - Denial of flood insurance.

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance. 71.3 Section 71.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program...

  13. 78 FR 58519 - Denial of Export Privileges; Sixing Liu

    2013-09-24

    ... convicted of knowingly and willfully exporting and attempting to export to the People's Republic of China... Notices, the most recent being that of August 8, 2013 (78 FR 49107 (August 12, 2013)), has continued the... Bureau of Industry and Security Denial of Export Privileges; Sixing Liu In the Matter of: Sixing Liu,...

  14. 27 CFR 13.25 - Appeal of qualification or denial.

    2010-04-01

    ... denial. 13.25 Section 13.25 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... be the final decision of TTB. (b) Informal resolution. Applicants may choose to pursue informal resolution of disagreements regarding correction sheets or qualifications by requesting an...

  15. A High Speed Mobile Courier Data Access System That Processes Database Queries in Real-Time

    Gatsheni, Barnabas Ndlovu; Mabizela, Zwelakhe

    A secure high-speed query processing mobile courier data access (MCDA) system for a Courier Company has been developed. This system uses the wireless networks in combination with wired networks for updating a live database at the courier centre in real-time by an offsite worker (the Courier). The system is protected by VPN based on IPsec. There is no system that we know of to date that performs the task for the courier as proposed in this paper.

  16. Utilizing fission technology to enable rapid and affordable access to any point in the solar system

    Fission technology can enable rapid, affordable access to any point in the solar system. Potential fission-based transportation options include bimodal nuclear thermal rockets, high specific energy propulsion systems, and pulsed fission propulsion systems. In-space propellant re-supply enhances the effective performance of all systems, but requires significant infrastructure development. Safe, timely, affordable utilization of first-generation space fission propulsion systems will enable the development of more advanced systems. First generation space systems will build on over 45 years of US and international space fission system technology development to minimize cost

  17. Information system architecture to support transparent access to distributed, heterogeneous data sources

    Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today's situation analyst's have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today's technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses

  18. Fast Transit Access to the Outer Solar System

    Squire, Jared; Bering, Edgar; Giambusso, Matthew; Carter, Mark; Ilin, Andrew; Diaz, Franklin R. Chang

    2015-11-01

    We explore the capability of a VASIMR® reusable probe “catapult” concept to send a 4000-5000 kg spacecraft to Jupiter on a Hohmann-like transfer orbit, arriving in just 36 months elapsed time. The VASIMR® performs a slingshot pass close to the Sun and uses the high level of available solar energy to produce a sustained burst of high thrust. Enough kinetic energy is provided to the probe to reach Jupiter orbit within 0.7-1.4 AU. The Catapult release the probe with enough speed to reach Jupiter in three years, and returns to Earth for another mission. This study identifies the important parameters in the probe ejector operation (power level, propellant mass, payload release point, distance of closest approach to the Sun), and scan these parameters to understand and optimize the capabilities of the proposed system. We assume that the Catapult and its payload begin at the Earth’s sphere of influence (SOI), and are coasting in the Earth’s orbit about the Sun. The VASIMR® engine’s power rating must match the peak power available when the spacecraft is closest to the Sun. The solar array is assumed to be a planar array rather than a concentrator since it will have to operate near the Sun, where a concentrator would overheat photovoltaic cells. The feasibility of not releasing the payload and using the VASIMR® to provide thrust for the duration of the transfer orbit will also be examined. In this scenario, the VASIMR® RF generators could serve double duty as radar RF sources.

  19. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  20. Accessing Multi-Source Geological Data through Network in MORPAS Software System

    Mei Hongbo; Hu Guangdao; Chen Jianguo; Li Zhenhua

    2003-01-01

    MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.

  1. DOE's nation-wide system for access control can solve problems for the federal government

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  2. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  3. A novel technique to extract events from access control system and locate persons

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  4. Integration of federated medical systems for vendor neutral image access in teleradiology applications.

    Yilmaz, Ayhan Ozan; Baykal, Nazife

    2014-01-01

    This paper proposes a framework designed to interconnect medical imaging facilities and teleradiology service providers on a single access interface. This framework aims to solve the interoperability issues of Picture Archiving and Communication System (PACS), Radiology Information System (RIS) and Hospital Information System (HIS) developed by different vendors and enrich the digital health record delivered to non-local radiologists or physicians with the integrated information from several systems. This is achieved by introducing a "Grid Agent" into the domain of medical software systems, which seamlessly integrates with present systems and forms a network to deliver data between other Grid Agents and the "Grid Manager". Resultant solution decreases the access time of medical images by non-local medical staff and increases the efficiency and durability of the teleradiology service architecture. PMID:25160243

  5. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  6. Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS for Building Security

    Wahyudi

    2007-01-01

    Full Text Available Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker verification, is an attractive and relatively unobtrusive means of providing security for admission into an important or secured place. An individual’s voice cannot be stolen, lost, forgotten, guessed, or impersonated with accuracy. Due to these advantages, this paper describes design and prototyping a voice-based door access control system for building security. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether to accept or reject the user’s identity claim or possibly to report insufficient confidence and request additional input before making the decision. Furthermore, intelligent system approach is used to develop authorized person models based on theirs voice. Particularly Adaptive-Network-based Fuzzy Inference Systems is used in the proposed system to identify the authorized and unauthorized people. Experimental result confirms the effectiveness of the proposed intelligent voice-based door access control system based on the false acceptance rate and false rejection rate.

  7. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Zummo SalamA

    2008-01-01

    Abstract We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI) in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded...

  8. Quality Test Template toward Multi-user Access Control of Internet-Based System

    Nan Nie

    2011-06-01

    Full Text Available Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

  9. RF Modelling and Characterization of Tyre Pressure Sensors and Vehicle Access Systems

    Brzeska, Malgorzata Dominika

    2015-01-01

    Core topics of the work are the vehicle access systems such as PAssive Start and Entry (PASE), Remote Keyless Entry (RKE) as well as Tyre Pressure Monitoring System (TPMS). Two goals are followed: the development of antennas and functionality analysis from RF (Radio Frequency) point of view and improvement of system parts. The overall objective of this work is to advance the state-of-the-art vehicular electromagnetic simulation taking into account the vehicle body and nearest surroundings.

  10. 49 CFR 37.185 - Fleet accessibility requirement for OTRB fixed-route systems of large operators.

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Fleet accessibility requirement for OTRB fixed....185 Fleet accessibility requirement for OTRB fixed-route systems of large operators. Each large... percent of the buses in its fleet with which it provides fixed-route service are readily accessible to...

  11. Optimizing man-machine performance of a personnel access restriction security system

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  12. OASIS: A Data Fusion System Optimized for Access to Distributed Archives

    Berriman, G. B.; Kong, M.; Good, J. C.

    2002-05-01

    The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.

  13. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  14. The upgrade of the J-TEXT experimental data access and management system

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  15. Extending access to the formal financial system: the banking correspondent business model

    Noelia Camara; David Tuesta; Pablo Urbiola Ortun

    2015-01-01

    New ways of understanding banking, technological improvements, and regulation yield new means of interaction between customers and banks through outsourcing agreements. This paper provides the first harmonised database with information on the number of banking correspondents by country, which helps in measuring access to the formal financial system.

  16. Accessibility Evaluation of Online Learning Management System for Persons with Visual Impairment

    Suwannawut, Nantanoot

    2014-01-01

    Many academic institutions around the world are utilizing and investing in online learning management systems (LMS). While several research studies have examined the functionality of this type of technology, little attention has been paid to accessibility issues, in particular to the complex web-based interfaces for learners with disabilities,…

  17. An API-based search system for one click access to information

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    2013-01-01

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  18. A METHOD OF AND A SYSTEM FOR CONTROLLING ACCESS TO A SHARED RESOURCE

    2006-01-01

    A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority will be...

  19. 28 CFR 16.93 - Exemption of Tax Division Systems-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Tax Division Systems-limited access. 16.93 Section 16.93 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE OF... concerning the nature of that investigation and the information obtained, and to determine the identity...

  20. 28 CFR 16.81 - Exemption of United States Attorneys Systems-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of United States Attorneys Systems-limited access. 16.81 Section 16.81 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR... it could compromise the existence of a confidential investigation, reveal the identity...

  1. 28 CFR 16.77 - Exemption of U.S. Trustee Program System-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of U.S. Trustee Program System-limited access. 16.77 Section 16.77 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE... existence of a confidential investigation or reveal the identity of witnesses or confidential informants....

  2. 28 CFR 16.80 - Exemption of Office of Professional Responsibility System-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of Professional Responsibility System-limited access. 16.80 Section 16.80 Judicial Administration DEPARTMENT OF JUSTICE... obtained as to his activities; of the identity of confidential sources, witnesses, and law...

  3. 28 CFR 16.89 - Exemption of Civil Division Systems-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Civil Division Systems-limited access. 16.89 Section 16.89 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE...; reveal the identity of confidential sources; and result in unwarranted invasions of the privacy of...

  4. 28 CFR 16.88 - Exemption of Antitrust Division Systems-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Antitrust Division Systems-limited access. 16.88 Section 16.88 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE... and compiled for law enforcement purposes could result in the premature disclosure of the identity...

  5. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  6. Massive M2M Access with Reliability Guarantees in LTE Systems

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals...

  7. Crop Status Monitoring using Multispectral and Thermal Imaging systems for Accessible Aerial Platforms

    Agricultural aircraft and unmanned aerial systems (UAS) are easily scheduled and accessible remote sensing platforms. Canopy temperature data were taken with an Electrophysics PV-320T thermal imaging camera mounted in agricultural aircraft. Weather data and soil water potential were monitored and th...

  8. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  9. Combating logical back doors into physically protected areas. The role of computer security in modern access control systems

    As long as nuclear fission has been used for energy production, substantial efforts have been made to protect the critical process and nuclear materials from unauthorized access. Electronic systems have been designed to assist security staff in access control and have become increasingly sophisticated as technology has advanced. With the latest access control systems being fully computerized, new questions of computer security have arisen. The paper outlines the latest trends in computer based access control systems, demonstrates where these systems are vulnerable to hacking attacks, and provides guidance on what can be done to avoid the introduction of new computer technologies creating back doors to bypass physical plant and material protection. (author)

  10. A network file system over HTTP: remote access and modification of files and "files"

    Kiselyov, Oleg

    2000-01-01

    The goal of the present HTTPFS project is to enable access to remote files, directories, and other containers through an HTTP pipe. HTTPFS system permits retrieval, creation and modification of these resources as if they were regular files and directories on a local filesystem. The remote host can be any UNIX or Win9x/WinNT box that is capable of running a Perl CGI script and accessible either directly or via a web proxy or a gateway. HTTPFS runs entirely in user space. The current implementa...

  11. Peripheral insertion of a central venous access device under fluoroscopic guidance using a Peripherally Accessed System (PAS) port in the forearm

    Purpose: We describe the technique, efficacy, and complications of fluoroscopy-guided implantation of a central venous access device using a peripherally accessed system (PAS) port via the forearm.Methods: Beginning in July 1994, 105 central venous access devices were implanted in 104 patients for the long-term infusion of antibiotics or antineoplasmic agents, blood products, or parenteral nutrition. The devices was inserted under fluoroscopic guidance with real-time venography from a peripheral route.Results: All ports were successfully implanted. There were no procedure-related complications. No thrombosis or local infection was observed; however, in six patients catheterrelated phlebitis occurred.Conclusion: Fluoroscopy-guided implantation of a central venous access device using a PAS port via the forearm is safe and efficacious, and injection of contrast medium through a peripheral IV catheter before introduction of the catheter helps to avoid catheter-related phlebitis.

  12. Peripheral Insertion of a Central Venous Access Device Under Fluoroscopic Guidance Using a Peripherally Accessed System (PAS) Port in the Forearm

    Purpose: We describe the technique, efficacy, and complications of fluoroscopy-guided implantation of a central venous access device using a peripherally accessed system (PAS) port via the forearm. Methods: Beginning in July 1994, 105 central venous access devices were implanted in 104 patients for the long-term infusion of antibiotics or antineoplasmic agents, blood products, or parenteral nutrition. The devices was inserted under fluoroscopic guidance with real-time venography from a peripheral route. Results: All ports were successfully implanted. There were no procedure-related complications. No thrombosis or local infection was observed; however, in six patients catheter-related phlebitis occurred. Conclusion: Fluoroscopy-guided implantation of a central venous access device using a PAS port via the forearm is safe and efficacious, and injection of contrast medium through a peripheral IV catheter before introduction of the catheter helps to avoid catheter-related phlebitis

  13. Automated biometric access control system for two-man-rule enforcement

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  14. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-15

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4.

  15. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4

  16. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  17. Difficulties experienced by trans people in accessing the Unified Health System.

    Rocon, Pablo Cardozo; Rodrigues, Alexsandro; Zamboni, Jésio; Pedrini, Mateus Dias

    2016-08-01

    The objective of this study was to discuss the difficulties of trans people living in the metropolitan region of Greater Vitória, Espírito Santo, Brazil, in accessing the health services of the Unified Health System (Sistema Único de Saúde - SUS). We used a qualitative approach through semi-structured interviews with 15 trans people. The results point to disrespect toward the adopted name, discrimination, and the diagnosis required for the gender reassignment process as major limitations to accessing the healthcare system. The diagnosis helps hide the responsibility of heteronormativity and gender binarism in the social marginalization of trans people. It is concluded that it is necessary to review the issue of diagnosis, given that the existence of a prior pathology is not required to access the SUS. It is important to develop educational programmes and permanent campaigns concerning the right to access the healthcare system free from discrimination and to use the adopted name. PMID:27557024

  18. HealthNet: Improving Access to Knowledge Resources in a Community-Based Integrated Delivery System

    Pine, Donald; Bissen, Joan; Abelson, David; Roller, Scott

    1998-01-01

    HealthNet is a browser-based environment that connects HealthSystem Minnesota (HSM) health care providers to multiple information components needed in the process of providing care to patients. Its goal is to provide context-based access to professional knowledge at or near the point of care. HSM is a large integrated health care system including a hospital and 30 community clinic sites that provide health care to about sixteen percent of the Twin Cities residents.

  19. Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems

    C Narendra, Nanjangud

    2003-01-01

    With increasing numbers of organizations automating their business processes by using workflow systems, security aspects of workflow systems has become a heavily researched area. Also, most workflow processes nowadays need to be adaptive, i.e., constantly changing, to meet changing business conditions. However, little attention has been paid to integrating Security and Adaptive Workflow. In this paper, we investigate this important research topic, with emphasis on Role Based Access Control (R...

  20. Safety of a Totally Implantable Central Venous Port System with Percutaneous Subclavian Vein Access

    Keum, Dong-Yoon; Kim, Jae-Bum; Chae, Min-Cheol

    2013-01-01

    Background The role of totally implantable central venous port (TICVP) system is increasing. Implantation performed by radiologist with ultrasound-guided access of vein and fluoroscope-guided positioning of catheter is widely accepted nowadays. In this article, we summarized our experience of TICVP system by surgeon and present the success and complication rate of this surgical method. Materials and Methods Between March 2009 and December 2010, 245 ports were implanted in 242 patients by surg...

  1. Research and teaching access to a large clinical picture archiving and communication system

    Harrison, Marc; Koh, Justin; Tran, Steven; Mongkolwat, Patanasak; Channin, David S.

    2001-01-01

    Purpose: To identify practical issues surrounding delivering digital images from picture archiving and communication systems (PACS) for research and teaching purposes. The complexity of Digital Imaging and Communications in Medicine (DICOM) access methods, security, patient confidentiality, PACS database integrity, portability, and scalability are discussed. A software prototype designed to resolve these issues is described.System Architecture: A six-component, three-tier, client server softw...

  2. Information system architecture to support transparent access to distributed, heterogeneous data sources

    Brown, J.C.

    1994-08-01

    Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today`s situation analyst`s have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today`s technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses.

  3. Synergies in the Asian energy system: Climate change, energy security, energy access and air pollution

    We use the MESSAGE model to examine multiple dimensions of sustainable development for three Asian regions in a set of scenarios developed for the Asian Modelling Exercise. Using climate change mitigation as a starting point for the analysis, we focus on the interaction of climate and energy with technology choice, energy security, energy access, and air pollution, which often have higher policy priority than climate change. Stringent climate policies drive the future energy supply in Asia from being dominated by coal and oil to a more diversified system based mostly on natural gas, coal with CCS, nuclear and renewable energy. The increase in diversity helps to improve the energy security of individual countries and regions. Combining air pollution control policies and universal energy access policies with climate policy can further help to reduce both outdoor and indoor air pollution related health impacts. Investments into the energy system must double by 2030 to achieve stringent climate goals, but are largely offset by lower costs for O and M and air pollution abatement. Strong focus on end-use efficiency also helps lowering overall total costs and allows for limiting or excluding supply side technologies from the mitigation portfolio. Costs of additional energy access policies and measures are a small fraction of total energy system costs. - Highlights: ► Half of added investments in energy offset by lower costs for O and M and air pollution. ► Costs for achieving universal energy access much smaller than energy system costs. ► Combined emissions and access policies further reduce air pollution impacts on health. ► Strong focus on end-use efficiency allows for more flexibility on energy sources. ► Stringent climate policy can improve energy security of Asian regions.

  4. Discourse, denial and dehumanisation: former detainees’ experiences of narrating state violence in Northern Ireland

    White, Lisa

    2010-01-01

    Using a synthesis of documentary analysis and interviews involving former detainees, this article explores the sociology of denial in relation to narratives of state violence which emerged from the conflict in and around Northern Ireland. It argues that three interrelated levels of denial described by Cohen (2001) - literal, interpretive and implicatory - can be observed within the ‘official discourse’ surrounding the conflict, and that these denials are experienced by former detainees in div...

  5. The web of hate: An exploratory study of holocaust denial on the net

    Di Giacomo, Daniela

    2005-01-01

    Holocaust denial is one manifestation of racist and antisemitic thought, the scope of which has increased dramatically over the last decade, especially on the Internet. This thesis applies an anti-racism framework to the study of Holocaust denial on the Internet with the objectives of identifying the key claims made by Holocaust deniers, the themes emerging from these claims, and how practitioners working in the fight against hate understand and identify the phenomenon of Holocaust denial. Qu...

  6. Loan availability and investment: Can innovative companies better cope with loan denials?

    Mueller, Elisabeth; Reize, Frank

    2010-01-01

    This study examines the consequences of loan denials for the investment performance of small and medium-sized German enterprises. As a consequence of a loan denial, innovative companies experience a smaller drop in the share of actual to planned investment than non-innovative companies. The non-randomness of loan denials is controlled for with a selection equation employing the intensity of banking competition at the district level as an exclusion restriction. We can explain the better perfor...

  7. Design and Implementation of a Web-based Monitoring System by using EPICS Channel Access Protocol

    Proton Engineering Frontier Project (PEFP) has developed a 20MeV proton accelerator, and established a distributed control system based on EPICS for sub-system components such as vacuum unit, beam diagnostics, and power supply system. The control system includes a real-time monitoring and alarm functions. From the aspect of a efficient maintenance of a control system and a additional extension of subsystems, EPICS software framework was adopted. In addition, a control system should be capable of providing an easy access for users and a real-time monitoring on a user screen. Therefore, we have implemented a new web-based monitoring server with several libraries. By adding DB module, the new IOC web monitoring system makes it possible to monitor the system through the web. By integrating EPICS Channel Access (CA) and Database libraries into a Database module, the web-based monitoring system makes it possible to monitor the sub-system status through user's internet browser. In this study, we developed a web based monitoring system by using EPICS IOC (Input Output Controller) with IBM server

  8. Climate Change Denial Books and Conservative Think Tanks

    Dunlap, Riley E.; Jacques, Peter J.

    2013-01-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number...

  9. Denial of service attacks and challenges in broadband wireless networks

    Khan, S.; Loo, KK; Naeem, T; Khan, MA

    2008-01-01

    Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromis...

  10. The Ground Test Accelerator control system database: Configuration, run-time operation, and access

    A database is used to implement the interface between the control system and the accelerator and to provide flexibility in configuring the I/O. This flexibility is necessary to allow the control system to keep pace with the changing requirements that are inherent in an experimental environmental environment. This is not achieved without cost. Problems often associated with using databases are painful data entry, poor performance, and embedded knowledge of the database structure in code throughout the control system. This report describes how the database configuration, access, conversion, and execution in the Ground Test Accelerator (GTA) Control System overcome these problems. 2 figs

  11. Interoperable Access to Near Real Time Ocean Observations with the Observing System Monitoring Center

    O'Brien, K.; Hankin, S.; Mendelssohn, R.; Simons, R.; Smith, B.; Kern, K. J.

    2013-12-01

    The Observing System Monitoring Center (OSMC), a project funded by the National Oceanic and Atmospheric Administration's Climate Observations Division (COD), exists to join the discrete 'networks' of In Situ ocean observing platforms -- ships, surface floats, profiling floats, tide gauges, etc. - into a single, integrated system. The OSMC is addressing this goal through capabilities in three areas focusing on the needs of specific user groups: 1) it provides real time monitoring of the integrated observing system assets to assist management in optimizing the cost-effectiveness of the system for the assessment of climate variables; 2) it makes the stream of real time data coming from the observing system available to scientific end users into an easy-to-use form; and 3) in the future, it will unify the delayed-mode data from platform-focused data assembly centers into a standards- based distributed system that is readily accessible to interested users from the science and education communities. In this presentation, we will be focusing on the efforts of the OSMC to provide interoperable access to the near real time data stream that is available via the Global Telecommunications System (GTS). This is a very rich data source, and includes data from nearly all of the oceanographic platforms that are actively observing. We will discuss how the data is being served out using a number of widely used 'web services' (including OPeNDAP and SOS) and downloadable file formats (KML, csv, xls, netCDF), so that it can be accessed in web browsers and popular desktop analysis tools. We will also be discussing our use of the Environmental Research Division's Data Access Program (ERDDAP), available from NOAA/NMFS, which has allowed us to achieve our goals of serving the near real time data. From an interoperability perspective, it's important to note that access to the this stream of data is not just for humans, but also for machine-to-machine requests. We'll also delve into how we

  12. Open Access Intellectual Property Systems: A Comparison to Commercial Solutions in Competitive Intelligence

    Jan Cerny

    2016-07-01

    Full Text Available ICT/IS management plays an important role within the framework of innovation management, and one of the key elements of this role is the support of Competitive Intelligence in the context of innovation processes. The strategic information needs of innovation management are also directed towards different kinds of intellectual property (IP information entities and commercialization. The purpose of this paper is to define these entities and IP information systems as an important part of a company’s Competitive Intelligence Unit for competitor analysis and technology trends. The open access IP information systems will be analysed together with commercial solutions.. The aim of this paper is to underline the importance of open access IP systems compared to added value commercial solutions for competitive intelligence purposes for SMEs. The comparison will be carried out using examples of patent searches within a concrete dataset.

  13. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report

  14. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  15. Welcome to Systems - A New Interdisciplinary Open Access Journal for Systems Science and Engineering

    2013-01-01

    Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies.

  16. Impact of optical hard limiter on the performance of an optical overlapped-code division multiple access system

    Inaty, Elie; Raad, Robert; Tablieh, Nicole

    2011-08-01

    Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.

  17. 23 CFR Appendix C to Subpart B of... - Additional Required Contract Provisions, Appalachian Development Highway System and Local Access...

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Additional Required Contract Provisions, Appalachian Development Highway System and Local Access Roads Contracts Other Than Construction Contracts C Appendix C to..., Appalachian Development Highway System and Local Access Roads Contracts Other Than Construction...

  18. Urban air quality management and information systems in Europe: legal framework and information access

    The European Union (EU) legislative framework related to air quality, together with national legislation and relevant declarations of the United Nations (UN), requires an integrated approach concerning air quality management (AQM), and accessibility of related information for the citizens. In the present paper, the main requirements of this legislative framework are discussed and main air quality management and information system characteristics are drawn. The use of information technologies is recommended for the construction of such systems. The World Wide Web (WWW) is considered a suitable platform for system development and integration and at the same time as a medium for communication and information dissemination. (author)

  19. Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features

    Prathamesh Timse

    2014-04-01

    Full Text Available This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition system when an unknown person is being detected, wherein the system will send an email to the owner of the system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a Dropbox [8] account.

  20. Implications of access hole size on tank waste retrieval system design and cost

    The DOE Environmental Restoration and Waste Management Robotics Technology Development Program has been investigating the application of robotics technology to the retrieval of waste from single-shell storage tanks for several years. The use of a large, ''long-reach'' manipulator to position and orient a variety of tools and other equipment has been recommended. The objective of this study is to determine the appropriate access hole size for the tank waste retrieval system installation. Previous reports on the impact of access hole size on manipulator performance are summarized. In addition, the practical limitation for access hole size based on structural limitations of the waste storage tanks, the state-of-the-art size limitations for the installation of new risers, the radiation safety implications of various access hole sizes, and overall system cost implications are considered. Basic conclusions include: (1) overall cost of remediation will; be dominated by the costs of the balance of plant and time required to perform the task rather than the cost of manipulator hardware or the cost of installing a riser, (2) the most desirable solution from a manipulator controls point of view is to make the manipulator as stiff as possible and have as high as possible a natural frequency, which implies a large access hole diameter, (3) beyond some diameter; simple, uniform cross-section elements become less advantageous from a weight standpoint and alternative structures should be considered, and (4) additional shielding and contamination control measures would be required for larger holes. Parametric studies summarized in this report considered 3,790,000 1 (1,000,000 gal) tanks, while initial applications are likely to be for 2,840,000 1 (750,000 gal) tanks. Therefore, the calculations should be somewhat conservative, recognizing the limitations of the specific conditions considered

  1. Welcome to Systems - A New Interdisciplinary Open Access Journal for Systems Science and Engineering

    Huynh, Thomas

    2013-01-01

    The article of record as published may be found at http://dx.doi.org/10.3390/systems1010001 Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies.

  2. Design of a control system for self-shielded irradiators with remote access capability

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  3. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  4. A web accessible scientific workflow system for vadoze zone performance monitoring: design and implementation examples

    Mattson, E.; Versteeg, R.; Ankeny, M.; Stormberg, G.

    2005-12-01

    Long term performance monitoring has been identified by DOE, DOD and EPA as one of the most challenging and costly elements of contaminated site remedial efforts. Such monitoring should provide timely and actionable information relevant to a multitude of stakeholder needs. This information should be obtained in a manner which is auditable, cost effective and transparent. Over the last several years INL staff has designed and implemented a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition from diverse sensors (geophysical, geochemical and hydrological) with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic javascript and html/css) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This system has been implemented and is operational for several sites, including the Ruby Gulch Waste Rock Repository (a capped mine waste rock dump on the Gilt Edge Mine Superfund Site), the INL Vadoze Zone Research Park and an alternative cover landfill. Implementations for other vadoze zone sites are currently in progress. These systems allow for autonomous performance monitoring through automated data analysis and report generation. This performance monitoring has allowed users to obtain insights into system dynamics, regulatory compliance and residence times of water. Our system uses modular components for data selection and graphing and WSDL compliant webservices for external functions such as statistical analyses and model invocations. Thus, implementing this system for novel sites and extending functionality (e.g. adding novel models) is relatively straightforward. As system access requires a standard webbrowser

  5. What’s blocking sustainability? Human nature, cognition, and denial

    William Rees

    2010-10-01

    Full Text Available In 1992, 1,700 of the world’s top scientists issued a public statement titled The World Scientists’ Warning to Humanity. They reported that “a great change in our stewardship of the Earth and the life on it is required if vast human misery is to be avoided and our global home on this planet is not to be irretrievably mutilated.” More than a decade later, the authors of the Millennium Ecosystem Assessment were moved to echo the scientists’ warning asserting that “[h]uman activity is putting such a strain on the natural functions of the Earth that the ability of the planet’s ecosystems to sustain future generations can no longer be taken for granted.” Ours is allegedly a science-based culture. For decades, our best science has suggested that staying on our present growth-based path to global development implies catastrophe for billions of people and undermines the possibility of maintaining a complex global civilization. Yet there is scant evidence that national governments, the United Nations, or other official international organizations have begun seriously to contemplate the implications for humanity of the scientists’ warnings, let alone articulate the kind of policy responses the science evokes. The modern world remains mired in a swamp of cognitive dissonance and collective denial seemingly dedicated to maintaining the status quo. We appear, in philosopher Martin Heidegger’s words, to be “in flight from thinking.” Just what is going on here? I attempt to answer this question by exploring the distal, biosocial causes of human economic behavior. My working hypothesis is that modern H. sapiens is unsustainable by nature—unsustainability is an inevitable emergent property of the systemic interaction between contemporary technoindustrial society and the ecosphere. I trace this conundrum to humanity’s once-adaptive, subconscious, genetic predisposition to expand (shared with all other species, a tendency reinforced by

  6. Trauma in elderly people: access to the health system through pre-hospital care1

    da Silva, Hilderjane Carla; Pessoa, Renata de Lima; de Menezes, Rejane Maria Paiva

    2016-01-01

    Objective: to identify the prevalence of trauma in elderly people and how they accessed the health system through pre-hospital care. Method: documentary and retrospective study at a mobile emergency care service, using a sample of 400 elderly trauma victims selected through systematic random sampling. A form validated by experts was used to collect the data. Descriptive statistical analysis was applied. The chi-square test was used to analyze the association between the variables. Results: Tr...

  7. Evaluation and Improvement of Web Information System Accessibility with Markup Language Possibilities

    Vitols, G; Arhipova, I

    2010-01-01

    Markup languages are used to describe the content published in the World Wide Web. Aim of this article is to analyze hypertext markup language versions and identify possibilities of improvement accessibility for the web information systems with markup language elements appropriate application. Analysis of the document structure is performed. Document structure and text description elements are selected. Selected elements are practically evaluated with screen readers. From the evaluation resul...

  8. A High-Throughput Random Access Protocol for Multiuser MIMO Systems

    Yan Zhang

    2008-05-01

    Full Text Available We propose a high-throughput random access protocol for 2×2 multiuser multiple-input multiple-output (MIMO systems. The cross-layer mechanism utilizes the packets combining technique to exploit the advantages of both spatial multiplexing and multipacket reception. Analytical result indicates that the proposed scheme achieves 0.669 per spatial degree of freedom in stable throughput, which is much higher than those in the existed studies.

  9. Design of Nutrition Catering System for Athletes Based on Access Database

    Hongjiang Wu,; Haiyan Zhao; Xugang Liu; Mingshun Xing

    2015-01-01

    In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO) and Structure Query Language (SQL) were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring n...

  10. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Olusegun Folorunso; Olusegun Afeez Mustapha

    2015-01-01

    Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC) strategy and fuzzy-expert systems was used to enhance the qu...

  11. Multiagent Q-Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Husheng Li

    2010-01-01

    An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL) is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of Q-learning is extended from single user case to multiagent case by considering o...

  12. Access To Land And The System Of Land Ownership In Northern Cameroon

    Paul AHIDJO

    2012-06-01

    Full Text Available Northern Cameroon is a vast geographical region made up of a population with diverse customs, religion and migration process. The entire population is made up of paleo-nigritics, neo-Sudanese and pastoral nomads who practice activities such as agriculture, livestock and fisheries. This ethnic heterogeneity, complex historical events and cultural diversity has made the customary systemof land tenure to vary both in their ancient aspects as well as contemporary manifestations. Therefore, based on verbal assertion and written data, this article examines the methods of land access as well as the traditional and modern land tenure system. For the population of Northern Cameroon and elsewhere, land represents a natural resource of prime importance. Access to land and its control constitutes a major economic challenge and it is equally a source ofdiverse conflicts. The system of land ownership has been influenced by external unforeseen events. From the pre-colonial period to the so called post colonial period, access to land and land ownership vary between the conservation of a traditional system which land owners are trying to preserve and the weight of modernity which has economic implications.

  13. New capabilities in the HENP grand challenge storage access system and its application at RHIC

    The High Energy and Nuclear Physics Data Access Grand Challenge project has developed an optimizing storage access software system that was prototyped at RHIC. It is currently undergoing integration with the STAR experiment in preparation for data taking that starts in mid-2000. The behavior and lessons learned in the RHIC Mock Data Challenge exercises are described as well as the observed performance under conditions designed to characterize scalability. Up to 250 simultaneous queries were tested and up to 10 million events across 7 event components were involved in these queries. The system coordinates the staging of ''bundles'' of files from the HPSS tape system, so that all the needed components of each event are in disk cache when accessed by the application software. The caching policy algorithm for the coordinated bundle staging is described in the paper. The initial prototype implementation interfaced to the Objectivity/DB. In this latest version, it evolved to work with arbitrary files and use CORBA interfaces to the tag database and file catalog services. The interface to the tag database and the MySQL-based file catalog services used by STAR are described along with the planned usage scenarios

  14. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  15. Orthogonal frequency-division multiplexing access (OFDMA) based wireless visible light communication (VLC) system

    Sung, Jiun-Yu; Yeh, Chien-Hung; Chow, Chi-Wai; Lin, Wan-Feng; Liu, Yang

    2015-11-01

    An orthogonal frequency-division multiplexing access (OFDMA) based visible light communication (VLC) system is proposed in this paper. The architecture of the proposed system is divided into several VLC cells, which is defined in this paper. The deployment and upgrade of the system involve only simple combination of the VLC cells. Hence it is economically advantageous. To guarantee smooth communication, nearly equal data rate is provided at every location within the system with no concern on the system scale. The user location monitor strategy is also discussed to solve the region division issues. The characteristics of the proposed system are analyzed in detail in this paper. A one-dimensional experiment was demonstrated with 13.6 Mb/s data rate.

  16. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  17. Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization Along With Password Authentication And Billing System

    Asst.Prof.T.A.More

    2015-03-01

    Full Text Available In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.

  18. The optimal access system for future far-offshore wind farms

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  19. Experimental demonstration of 2.5 Gbit/S incoherent two-dimensional optical code division multiple access system

    We demonstrated error-free operation of 4 simultaneous users in a fast frequency-hopping time-spreading optical code division multiple access system operating at 2.5 Gbit/s a Star architecture. Effective power penalty was ≤0.5dB. Novel optical code division multiple access receiver based on Terahertz Optical Asymmetric Demultiplexer was demonstrated to eliminate multiple access interference (Authors)

  20. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  1. Availability by Design:A Complementary Approach to Denial-of-Service

    Vigo, Roberto; Nielson, Hanne Riis; Nielson, Flemming

    2015-01-01

    Denial-of-Service (DoS) er betegnelsen for et angreb, der sigter efter at gøre en ressource utilgængelig. DoS angreb på samfundssystemer sker stadig oftere, og de er berygtede på Internettet, hvor de for nylig blev rettet mod store virksomheder. Der er forskellige metoder til at imødegå DoS angreb og nedsætte deres effekt, men mange angreb er alligevel successfulde.Fornyet fokus på tilgængelighed er også påkrævet for systemer, som kaldes Cyber-Physical Systems (CPS’er). CPS’er er store netvær...

  2. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Maxim DOBRINOIU

    2016-01-01

    Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slight...

  3. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  4. Using geographic information system tools to improve access to MS specialty care in Veterans Health Administration

    William J. Culpepper, II, PhD, MA

    2010-08-01

    Full Text Available Access to appropriate and timely healthcare is critical to the overall health and well-being of patients with chronic diseases. In this study, we used geographic information system (GIS tools to map Veterans Health Administration (VHA patients with multiple sclerosis (MS and their access to MS specialty care. We created six travel-time bands around VHA facilities with MS specialty care and calculated the number of VHA patients with MS who resided in each time band and the number of patients who lived more than 2 hours from the nearest specialty clinic in fiscal year 2007. We demonstrate the utility of using GIS tools in decision-making by providing three examples of how patients' access to care is affected when additional specialty clinics are added. The mapping technique used in this study provides a powerful and valuable tool for policy and planning personnel who are evaluating how to address underserved populations and areas within the VHA healthcare system.

  5. The equipment access software for a distributed UNIX-based accelerator control system

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  6. 78 FR 37481 - Consolidation of Permit Procedures; Denial and Revocation of Permits

    2013-06-21

    ... 2, 2013 (78 FR 25565-25572), and its provisions for denial and revocation of permits are...-AD76 Consolidation of Permit Procedures; Denial and Revocation of Permits AGENCY: Animal and Plant... moved interstate under the permit, to maintain and be physically present during normal business hours...

  7. Hate in the Classroom: Free Expression, Holocaust Denial, and Liberal Education

    Cohen-Almagor, Raphael

    2008-01-01

    This article is concerned with a specific type of hate speech: Holocaust denial. It is concerned with the expression of this idea by educators. Should we allow Holocaust deniers to teach in schools? This article attempts to answer this question through a close look at the Canadian experience. First, I will establish that Holocaust denial is a…

  8. 12 CFR 303.223 - Applicant's right to hearing following denial.

    2010-01-01

    ... Criminal Offenses) § 303.223 Applicant's right to hearing following denial. An applicant may request a... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Applicant's right to hearing following denial. 303.223 Section 303.223 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION PROCEDURE AND RULES...

  9. Rocking the Racism Boat: School-Based Activists Speak Out on Denial and Avoidance

    Lund, Darren E.

    2006-01-01

    The present study seeks insights from current school activists on the tendency of educators and others to engage in denial and avoidance when discussing issues surrounding racism, and how that affects the daily work on social justice projects in schools. The author outlines contemporary and historical aspects of the denial of racism in Canada, and…

  10. Cognitive dissonance as an explanation of the genesis, evolution and persistence of Thabo Mbeki's HIV denialism.

    Kenyon, Chris

    2008-05-01

    The ongoing damage that the newer forms of HIV denialism are visiting upon our country is evidenced by the recent firing of Nozizwe Madlala-Routledge, the South African Deputy Minister of Health. It is widely believed that the underlying reason for her dismissal was her support of orthodox HIV treatment and prevention strategies and her disdain for HIV denialism. This paper seeks to understand the origins, spread and metamorphosis of President Thabo Mbeki's HIV denialism in South Africa. Using the theory of cognitive dissonance, I argue that, given the structural beliefs of the African National Congress (ANC) and the pattern of emergence of HIV in the 1980s, a degree of scepticism around the putative science of HIV was probable in ANC circles. On assuming the Presidency in 1999, Mbeki tapped into this scepticism to formulate his initial biological version of HIV denialism, which claimed that 'a virus can't cause a syndrome.' The steady erosion of support for this flagrant HIV denialism, together with the rise of neoliberal thinking in the ANC, would lead to the evolution of this biological denialism into a form of treatment denialism. This ideology argued against the widespread provision and use of antiretroviral treatment. Empirical evidence is presented to demonstrate the extent to which ongoing HIV denial in the general population is continuing to fuel the spread of HIV. PMID:25871269

  11. A New Time-Hopping Multiple Access Communication System Simulator: Application to Ultra-Wideband

    José M. Páez-Borrallo

    2005-03-01

    Full Text Available Time-hopping ultra-wideband technology presents some very attractive features for future indoor wireless systems in terms of achievable transmission rate and multiple access capabilities. This paper develops an algorithm to design time-hopping system simulators specially suitable for ultra-wideband, which takes advantage of some of the specific characteristics of this kind of systems. The algorithm allows an improvement of both the time capabilities and the achievable sampling rate and can be used to research into the influence of different parameters on the performance of the system. An additional result is the validation of a new general performance formula for time-hopping ultra-wideband systems with multipath channels.

  12. Towards the Adoption of Open Source and Open Access Electronic Health Record Systems

    Ilias Maglogiannis

    2012-01-01

    Full Text Available As the Electronic Health Record (EHR systems constantly expand to support more clinical activities and their implementations in healthcare organizations become more widespread, several communities have been working intensively for several years to develop open access and open source EHR software, aiming at reducing the costs of EHR deployment and maintenance. In this paper, we describe and evaluate the most popular open source electronic medical records such as openEMR, openMRS and patientOS, providing their technical features and potentials. These systems are considered quite important due to their prevalence. The article presents the key features of each system and outlines the advantages and problems of Open Source Software (OSS Systems through a review of the literature, in order to demonstrate the possibility of their adoption in modern electronic healthcare systems. Also discussed are the future trends of OS EHRs in the context of the Personal Health Records and mobile computing paradigm.

  13. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.;

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  14. Distributed archive and single access system for accelerometric event data : a NERIES initiative

    Péquegnat, Catherine; Gueguen, Philippe; Godey, Stéphanie; Frobert, Laurent; 10.1007/978-94-007-0152-6_10

    2012-01-01

    We developed a common access facility to homogeneously formatted accelerometric event data and to the corresponding sheet of ground motion parameters. This paper is focused on the description of the technical development of the accelerometric data server and the link with the accelerometric data explorer. The server is the third node of the 3-tier architecture of the distributed archive system for accelerometric data. The server is the link between the data users and the accelero- metric data portal. The server follows three main steps: (1) Reading and analysis of the end-user request; (2) Processing and converting data; and (3) Archiving and updating the accelerometric data explorer. This paper presents the description of the data server and the data explorer for accessing data.

  15. Reduce Threats in Competitive Intelligence System: A Generic Information Fusion Access Control Model

    Anass El haddadi

    2011-03-01

    Full Text Available Information fusion is a cornerstone of competitive intelligence activity that aims at supporting decisionmaking by collecting, analyzing and disseminating information. This information comes fromheterogeneous data sources. In this paper we present an approach of access control. This approach isfocused both on the information that must be bring to decision-makers and the privacy of individuals whosedata is used to extract this information. This model is based on the standard “Role Based Access Control”(RBAC and is implemented within the entire life cycle of Xplor Every Where (Web service of Tetralogie,it follows methodologies tailored to design privacy-aware systems to be compliant with data protectionregulations.

  16. Open-Access, Low-Magnetic-Field MRI System for Lung Research

    Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William

    2009-01-01

    An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.

  17. Denial of reward in the neonate shapes sociability and serotonergic activity in the adult rat.

    Anastasia Diamantopoulou

    Full Text Available BACKGROUND: Manipulations of the early environment are linked to long-lasting alterations of emotionality and social capabilities. Denial of rewarding mother-pup interactions in early life of rats could serve as model for child neglect. Negative consequences for social competence in later life, accompanied by changes in the serotonergic system would be expected. In contrast, rewarding mother-pup contact should promote adequate social abilities. METHODOLOGY/PRINCIPAL FINDINGS: Male Wistar rats trained in a T-maze during postnatal days 10-13 under denial (DER or permission (RER of maternal contact were tested for play behavior in adolescence and for coping with defeat in adulthood. We estimated serotonin (5-HT levels in the brain under basal conditions and following defeat, as well as serotonin receptor 1A (5-HT1A and serotonin transporter (SERT expression. DER rats exhibited increased aggressive-like play behavior in adolescence (i.e. increased nape attacks, p<0.0001 and selected a proactive coping style during defeat in adulthood (higher sum of proactive behaviors: number of attacks, flights, rearings and defensive upright posture; p = 0.011, p<0.05 vs RER, non-handled-NH. In adulthood, they had lower 5-HT levels in both the prefrontal cortex (p<0.05 vs RER and the amygdala (p<0.05 vs NH, increased 5-HT levels following defeat (PFC p<0.0001 and decreased serotonin turnover (amygdala p = 0.008. The number of 5-HT1A immunopositive cells in the CA1 hippocampal area was increased (p<0.05 DER, vs RER, NH; SERT levels in the amygdala were elevated (p<0.05 vs RER, NH, but were lower in the prefrontal cortex (p<0.05 vs NH. CONCLUSIONS/SIGNIFICANCE: Denial of expected maternal reward early in life negatively affects sociability and the serotonergic system in a complex manner. We propose that our animal model could contribute to the identification of the neurobiological correlates of early neglect effects on social behavior and coping with challenges, but

  18. 28 CFR 16.71 - Exemption of the Office of the Deputy Attorney General System-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Office of the Deputy Attorney General System-limited access. 16.71 Section 16.71 Judicial Administration DEPARTMENT OF JUSTICE... candidate for a Presidential appointee or Department attorney position. Access could reveal the identity...

  19. “Future Directions”: m-government computer systems accessed via cloud computing – advantages and possible implementations

    Daniela LIŢAN

    2015-01-01

    In recent years, the activities of companies and Public Administration had been automated and adapted to the current information system. Therefore, in this paper, I will present and exemplify the benefits of m-government computer systems development and implementation (which can be accessed from mobile devices and which are specific to the workflow of Public Administrations) starting from the “experience” of e-government systems implementation in the context of their access and usage through ...

  20. Holocaust Denial is a Form of Hate Speech

    Raphael Cohen-Almagor

    2009-01-01

    In this short piece I wish to take issue with the assertion that Holocaust denial is not hateful per se. My aim is to show that it is, and...

  1. Performance analysis on data access patterns in layered Information Systems, an Architectural Perspective

    Gholamali Nejad Hajali Irani

    2012-05-01

    Full Text Available Layered architectures are the main architectures that are used in architecture of Information Systems. Data Access Layer (DAL is a common layer in all layered architecture of Information Systems. One of the most important steps in architectural design of information systems is designing the DAL. More than 20 Data Access Patterns (DAP have been developed for DALs. So providing a DAL based on existing DAPs is major activity in architectural design. Therefore an architect should be familiar to all existing DAPs and their evaluation parameters. Performance is one of most important parameter in architecture evaluation. In this paper, different aspects of performance of existing DAPs have been investigated and analyzed. To obtain this aim, firstly, a new classification has been provided for categorizing all DAPs based on architectures difference of them. Secondly, a simulation program as named DALSim has been developed for measuring performance of all DAPs. Finally, some comparisons of DAPs have been provided based on DALSim results. Based on provided classification for DAPs and performance comparison results of them, architects of information systems can easily compare and evaluate existing DAPs. With fully development of provided results in other aspect such as modifiability, extensibility, security etc., a complete framework for all DAPs can be provided.

  2. Wideband Wireless Access Systems Interference Robustness: Its Effect on Quality of Video Streaming

    Aderemi A. Atayero

    2012-01-01

    Full Text Available A necessary requirement incumbent on any information communication system and/or network is the capacity to transmit information with a predefined degree of accuracy in the presence of inevitable interference. The transmission of audio and video streaming services over different conduits (wireless access systems, Internet, etc. is becoming ever more popular. As should be expected, this widespread increase is accompanied by the attendant new and difficult task of maintaining the quality of service of streaming video. The use of very accurate coding techniques for transmissions over wireless networks alone cannot guarantee a complete eradication of distortions characteristic of the video signal. A software-hardware composite system has been developed for investigating the effect of single bit error and bit packet errors in wideband wireless access systems on the quality of H.264/AVC standard bursty video streams. Numerical results of the modeling and analysis of the effect of interference robustness on quality of video streaming are presented and discussed.

  3. A Frequency—Diversity Spread—Spectrum Multiple Access System with Random Signature Sequences

    CaoYewen; XiangHaige

    1995-01-01

    A new scheme for the spread-spectrum multiple access system named Frequency-Diver-sity Spread-Spectrum Multiple Access(FD-DDMA)system,is proposed.In this FD-SSMA sys-tem,the same information will be modulated on a group of mutually orthogonal frequency compo-nents(carriers)with a random signature sequence at the same time,and it will be demodulated by a coherent receiver for every component and then incorporated (ad if using frequency diversity)on the basis of this random sequence.The spectrum of the modulated signal is very close to that of a white-noise in a wider frequency band due to orthogonality for all frequency components and prop-erty of the random sequence,the system becomes a spread-spectrum one.The (Inverse)Fast Froier Transform(IFFT,FFT)can be applied in the system ,which provides additional flexibility.The performance in an asynchronous mode,such as ability of multiusers,anti-interferences ,is an-alyzed.

  4. National Geothermal Data System (USA): an Exemplar of Open Access to Data

    Allison, M. Lee; Richard, Stephen; Blackman, Harold; Anderson, Arlene; Patten, Kim

    2014-05-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in April, 2014 will provide open access to millions of data records, sharing -relevant geoscience and longer term to land use data to propel geothermal development and production. NGDS serves information from all of the U.S. Department of Energy's sponsored development and research projects and geologic data from all 50 states, using free and open source software. This interactive online system is opening new exploration opportunities and potentially shortening project development by making data easily discoverable, accessible, and interoperable. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 6 million records online, including 1.72 million well headers (oil and gas, water, geothermal), 670,000 well logs, and 497,000 borehole temperatures and is growing rapidly. There are over 312 interoperable Web services and another 106 WMS (Web Map Services) registered in the system as of January, 2014. Companion projects run by Southern Methodist University and U.S. Geological Survey (USGS) are adding millions of additional data records. The DOE Geothermal Data Repository, currently hosted on OpenEI, is a system node and clearinghouse for data from hundreds of U.S. DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS complies with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with support from the US

  5. Development of the exposure and access control dosimeter system for nuclear facilities

    Chang, Si Young; Lee, B. J.; Kim, B. H.; Kim, J. S.; Lee, K. C.; Kang, B. H.; Kim, C. K.; Ham, C. S.; Kwon, K. C.; Park, W. M.; Kim, C. H.; Kim, J. T.; Koo, C. H.; Park, S. J.; Kim, T. W

    1999-12-01

    In this paper an electronic personal dosimeter(EPD) adopt in a PIN type silicon semiconductor as a radiation detector has been developed, designed and a prototype dosimeter has been manufactured. A series of performance test of this EPD on reference radiation field has been carried out. A dosimeter reader which reads the radiation dose from EPD and make a real time access control in connection with the entrance door to radiation controlled area has been developed, designed and manufactured. S/W program supporting hangul (Korean language) has been developed to operate the EPD and reader system with a personal computer. (author)

  6. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  7. Design of Nutrition Catering System for Athletes Based on Access Database

    Hongjiang Wu,

    2015-08-01

    Full Text Available In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO and Structure Query Language (SQL were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring nutrition of common food and recommended of functional nourishing food could be achieved for different events and different level of athletes.

  8. Enabling worldwide access to climate simulation data: the earth system grid (ESG)

    With support from the U.S. Department of Energy's Scientific Discover Through Advanced Computing (SciDAC) program, we have developed and deployed the Earth System Grid (ESG) to make climate simulation data easily accessible to the global climate modelling and analysis community. ESG currently has 2500 registered users and manages 160 TB of data in archives distributed around the nation. From this past year alone, more than 200 scientific journal articles have been published from analyses of data delivered by the ESG

  9. Towards a Next Generation Universally Accessible ‘Online Shopping-for-Apparel’ System

    Kristensen, Kasper; Borum, Nanna; Christiansen, Line Gad;

    2013-01-01

    This paper reports initial research findings from on-going longitudinal participatory design studies within a national (Danish) funded project to realize a gesture-controlled ‘Online shopping-for-apparel’ system – A Virtual Dressing Room (VDR). A product that reduces customer purchase returns...... of online shopping for apparel where conclusions point to the need for adaptive user interface improvements. Unforeseen was that wheelchair-bound public especially responded positively to the potentials for the concept due to their limited mobility in shopping and this accessibility aspect can be a...

  10. Development of the exposure and access control dosimeter system for nuclear facilities

    In this paper an electronic personal dosimeter(EPD) adopt in a PIN type silicon semiconductor as a radiation detector has been developed, designed and a prototype dosimeter has been manufactured. A series of performance test of this EPD on reference radiation field has been carried out. A dosimeter reader which reads the radiation dose from EPD and make a real time access control in connection with the entrance door to radiation controlled area has been developed, designed and manufactured. S/W program supporting hangul (Korean language) has been developed to operate the EPD and reader system with a personal computer. (author)

  11. Web Accessibility Evaluation of Massive Open Online Courses on Geographical Information Systems

    Calle Jiménez, Tania; Sánchez Gordón, Sandra; Luján Mora, Sergio

    2014-01-01

    This paper describes some of the challenges that exist to make accessible massive open online courses (MOOCs) on Geographical Information Systems (GIS). These courses are known by the generic name of Geo-MOOCs. A MOOC is an online course that is open to the general public for free, which causes a massive registration. A GIS is a computer application that acquire, manipulate, manage, model and visualize geo-referenced data. The goal of a Geo-MOOC is to expand the culture of spatial thinking an...

  12. The integration of open access journals in the scholarly communication system: Three science fields

    Faber Frandsen, Tove

    2009-01-01

    The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences...... across disciplines. This study is an analysis of the citing behaviour in journals within three science fields: biology, mathematics, and pharmacy and pharmacology. It is a statistical analysis of OAJs as well as non-OAJs including both the citing and cited side of the journal to journal citations...

  13. The development of access control system in Fukushima No.2 nuclear power station

    Ookubo, S.; Nakai, Y.; Oohira, N.; Kishishita, S. [Tokyo Electric power Co., Tokyo (Japan); Kobayashi, H.; Sano, F. [Fuji Electric Co., Tokyo (Japan); Masuda, M.; Tajima, T.; Oohira, K. [Toshiba Corporation, Tokyo (Japan)

    2002-07-01

    A new radiation work control system has been developed for controlling the entrance and exit of workers from the radiation controlled area in a nuclear power station and has been run in the Fukushima No. 2 Nuclear Power Station of Tokyo Electric Power Co., Inc. since October, 1999. The system is designed to reduce workers burden by simplifying the operation of each equipment that controls access to radiation controlled areas, and to minimize radiation exposure by automatically acquiring dose data during each access and each task. The new system adopted electronic personal dosimeters (gamma radiation EPD) which permit data collection by radio communication, thus improving the conventional alarm-equipped personal dosimeter (EPD) and increasing reliability as primary dosimeters. Furthermore, additional electronic personal dosimeters capable of measuring beta radiation (gamma and beta radiations EPD) were also utilized in specific tasks in October 2001. After a six-month test run of these EPDs, the film badges were discontinued in April 2002 and replaced solely with the EPDs. EPDs are now used as the primary dosimetry for radiation workers.

  14. Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization

    Laurent Segers

    2014-02-01

    Full Text Available Indoor localization of persons and objects poses a great engineering challenge. Previously developed localization systems demonstrate the use of wideband techniques in ultrasound ranging systems. Direct sequence and frequency hopping spread spectrum ultrasound signals have been proven to achieve a high level of accuracy. A novel ranging method using the frequency hopping spread spectrum with finite impulse response filtering will be investigated and compared against the direct sequence spread spectrum. In the first setup, distances are estimated in a single-access environment, while in the second setup, two senders and one receiver are used. During the experiments, the micro-electromechanical systems are used as ultrasonic sensors, while the senders were implemented using field programmable gate arrays. Results show that in a single-access environment, the direct sequence spread spectrum method offers slightly better accuracy and precision performance compared to the frequency hopping spread spectrum. When two senders are used, measurements point out that the frequency hopping spread spectrum is more robust to near-far effects than the direct sequence spread spectrum.

  15. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Zummo SalamA

    2008-01-01

    Full Text Available Abstract We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  16. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  17. National Geothermal Data System: an Exemplar of Open Access to Data

    Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.

    2013-12-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational

  18. Use of the tools of an operating system kernel to control access to the entities of application servers

    A method has been proposed for using the tools of kernel of an operating system to control access to the entities of application servers. The possibility of using an information protection system incorporated into the operating system to store and implement security policy has been demonstrated for a database management system

  19. Ocean Surface Topography Mission (OSTM) /Jason-2: Near Real-Time Altimetry Validation System (NRTAVS) QA Reports (NODC Accession 0044984)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains the descriptions for the OSTM/Jason-2 Near Real-Time Altimetry Validation System Quality Reports, which are served through the NOAA/NESDIS...

  20. Effective use of multibeam antenna and space-time multiple access technology in modern mobile communication systems

    Moskalets, N. V.

    2015-01-01

    A possibility for efficient use of radio-frequency spectrum and of corresponding increase in productivity of mobile communication system with space-time multiple access obtained by use of multibeam antenna of base station is considered.

  1. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  2. Smartphone-based system to improve transportation access for the cognitively impaired.

    Anderson, Shane M; Riehle, Timothy H; Lichter, Patrick A; Brown, Allen W; Panescu, Dorin

    2015-08-01

    This project developed and evaluated a smartphone-based system to improve mobility and transportation access for the cognitively impaired. The proposed system is intended to allow the cognitively impaired to use public transportation systems, community transportation and dedicated transportation services for the disabled with greater ease and safety. Individuals with cognitive disabilities are often unable to operate an automobile, or may require a prolonged recovery period before resuming driving. Public transportation systems represent a significant means to allow these individuals to maintain independence. Yet public transportation systems can pose significant challenges to individuals with cognitive impairment. The goal of this project is to develop a system to reduce these barriers via a technological solution consisting of components developed both for the cognitively impaired user and their caregiver or family member. The first component consists of a cognitive prosthetic device featuring traditional memory cueing and reminders as well as custom location-based transportation specific functions. This cognitive mobility assistant will leverage the computing power and GPS location determination capabilities of inexpensive, powerful smart phones. The second component consists of a management application which offers caregivers the ability to configure and program the reminder and transit functions remotely via the Internet. Following completion of the prototype system a pilot human test was performed with cognitively disabled individuals and family members or caregivers to assess the usability and acceptability of both system components. PMID:26738091

  3. Holocaust Denial is a Form of Hate Speech

    Raphael Cohen-Almagor

    2009-12-01

    Full Text Available

    In this short piece I wish to take issue with the assertion that Holocaust denial is not hateful per se. My aim is to show that it is, and therefore that Facebook should reconsider its position. All Internet providers and web-hosting companies whose terms of service disallow hateful messages on their servers should not host or provide forums for such hate-mongering. This is of urgent need as Holocaust denial is prevalent in Europe, the United States (USA and across the Arab and Muslim parts of the world. 

  4. Denial of shipments of radioactive materials in Paraguay

    The Denials, Delays and Abandonment of the Radioactive Materials is a problem at world level that has been increased in the last times with more emphasis starting from the attack of September 11 the 2001 in the USA. From then radioactive materials have been denial or delayed and until abandoned. The materials of short periods used mainly in nuclear medicine as the 99mTc or the 131I, when they are rejected, delayed it usually causes the lost of the material because it has surpassed their useful life and in many cases they are abandoned. The rejections, delays and later abandonment of the materials in special of Medical use have originated serious damages for the nuclear medicine patients as much of diagnoses as of treatments, in Teleterapia for many patients of cancer who could not be treated. In the petroliferous prospecting and Industry has originated numerous economic damages due to the delays since most of the used sources they are of long period but the delay causes an important increase in the cost. (author)

  5. Study on Mandatory Access Control in a Secure Database Management System

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  6. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose;

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services...... applications. For demonstration, we transmit a 2.5 Gbit/s signal through the proposed system and successfully achieve a bit-error-rate (BER) performance well below the 7% overhead forward error correction limit of the BER of 2 × 10¿3 for both the wireline and the wireless signals in the 60 GHz band after 25 km...... single-mode fiber plus up to 6 m wireless distance....

  7. The need for a greater commitment to america region to prevent denials of shipments of radioactive materials

    Radioactive sources are used worldwide in a wide range of applications in industry health care, industrial applications, manufacturing materials, exploration and technological development, as well as basic scientific research. The ability to use such radioactive material in these sectors depends on both its safe transport within a country and between different countries, for developed and developing countries can have access to this technology, in a timely manner and in conditions economically acceptable. In this paper the issue of denials and restraints of shipment of radioactive material and the need for greater commitment that Member States of the International Atomic Energy Agency (IAEA) must assume to facilitate the transport of radioactive materials for the benefit of society is analyzed

  8. Incident and Trafficking Database: New Systems for Reporting and Accessing State Information

    The IAEA's Incident and Trafficking Database (ITDB) is the Agency's authoritative source for information on incidents in which nuclear and other radioactive material is out of national regulatory control. It was established in 1995 and, as of June 2014, 126 States participate in the ITDB programme. Currently, the database contains over 2500 confirmed incidents, out of which 21% involve nuclear material, 62% radioactive source and 17% radioactively contaminated material. In recent years, the system for States to report incidents to the ITDB has been evolving — moving from fax-based to secure email and most recently to secure on-line reporting. A Beta version of the on-line system was rolled out this June, offering a simple, yet secure, communication channel for member states to provide information. In addition the system serves as a central hub for information related to official communication of the IAEA with Member States so some communication that is traditionally shared by e-mail does not get lost when ITDB counterparts change. In addition the new reporting system incorporates optional features that allow multiple Member State users to collaboratively contribute toward an INF. States are also being given secure on-line access to a streamlined version of the ITDB. This improves States' capabilities to retrieve and analyze information for their own purposes. In addition, on-line access to ITDB statistical information on incidents is available to States through an ITDB Dashboard. The dashboard contains aggregate information on number and types of incidents, material involved, as well some other statistics related to the ITDB that is typically provided in the ITDB Quarterly reports. (author)

  9. A web-accessible content-based cervicographic image retrieval system

    Xue, Zhiyun; Long, L. Rodney; Antani, Sameer; Jeronimo, Jose; Thoma, George R.

    2008-03-01

    Content-based image retrieval (CBIR) is the process of retrieving images by directly using image visual characteristics. In this paper, we present a prototype system implemented for CBIR for a uterine cervix image (cervigram) database. This cervigram database is a part of data collected in a multi-year longitudinal effort by the National Cancer Institute (NCI), and archived by the National Library of Medicine (NLM), for the study of the origins of, and factors related to, cervical precancer/cancer. Users may access the system with any Web browser. The system is built with a distributed architecture which is modular and expandable; the user interface is decoupled from the core indexing and retrieving algorithms, and uses open communication standards and open source software. The system tries to bridge the gap between a user's semantic understanding and image feature representation, by incorporating the user's knowledge. Given a user-specified query region, the system returns the most similar regions from the database, with respect to attributes of color, texture, and size. Experimental evaluation of the retrieval performance of the system on "groundtruth" test data illustrates its feasibility to serve as a possible research tool to aid the study of the visual characteristics of cervical neoplasia.

  10. A Hybrid System for Acquisition of and Access to the Data from Foundry Technical Standards

    A. Macioł

    2007-07-01

    Full Text Available The growing importance of automatized systems for interchange of commercial and technical information prompts searching for new forms of knowledge modelling. One of the possible solutions presented in this article is the use of relational databases for acquisition of information comprised in technical standards and of a rule-based reasoning system providing access to these bases. The study describes the structure of a database created under the assumption that concepts describing knowledge will be recorded in data collecting system and not in relational schema. The user is free to define by himself the structure of the knowledge without the need of introducing any changes to the relational schema. At the same time, the reasoning system enables very efficient knowledge searching. At present, tests are carried out on a software operating on a MS SQL Server. The project work and test performance of the system confirm that the adopted assumptions have been right and correct. The development of a new interface is anticipated using internet techniques. As a next step, the information resources collected in the system will be successively expanded using also information sources other than the technical standards.

  11. An approach to assessing multicity implementation of healthful food access policy, systems, and environmental changes.

    Silberfarb, Laura Oliven; Savre, Sonja; Geber, Gayle

    2014-01-01

    Local governments play an increasingly important role in improving residents' access to healthful food and beverages to reduce obesity and chronic disease. Cities can use multiple strategies to improve community health through, for example, land use and zoning policies, city contracting and procurement practices, sponsorship of farmers markets and community gardens, and vending and concession practices in parks and recreation facilities. With 41 cities in the Hennepin County Human Services and Public Health Department jurisdiction, the county undertook to measure the extent to which cities were engaged in making policy, systems, and environmental (PSE) changes to increase residents' access to healthful food. The results revealed that some cities, particularly those with higher resident demand for healthful food, are making nationally recommended PSE changes, such as sponsoring farmers markets and community gardens. Cities have moved more slowly to make changes in areas with perceived negative cost consequences or lesser public demand, such as parks and recreation vending and concessions. This article describes the assessment process, survey tools, findings, and implications for other health departments seeking to undertake a similar assessment. PMID:24762528

  12. System architecture and information model for integrated access to distributed biomedical information

    Kim, Dongkyu; Alaoui, Adil; Levine, Betty; Leondaridis, Leonidas; Shields, Peter; Byers, Steve; Cleary, Kevin

    2009-02-01

    The current trend towards systems medicine will rely heavily on computational and bioinformatics capabilities to collect, integrate, and analyze massive amounts of data from disparate sources. The objective is to use this information to make medical decisions that improve patient care. At Georgetown University Medical Center, we are developing an informatics capability to integrate several research and clinical databases. Our long term goal is to provide researchers at Georgetown's Lombardi Comprehensive Cancer Center better access to aggregated molecular and clinical information facilitating the investigation of new hypotheses that impact patient care. We also recognize the need for data mining tools and intelligent agents to help researchers in these efforts. This paper describes our initial work to create a flexible platform for researchers and physicians that provides access to information sources including clinical records, medical images, genomic, epigenomic, proteomic and metabolomic data. This paper describes the data sources selected for this pilot project and possible approaches to integrating these databases. We present the different database integration models that we considered. We conclude by outlining the proposed Information Model for the project.

  13. New System For Tokamak T-10 Experimental Data Acquisition, Data Handling And Remote Access

    For carrying out the experiments on nuclear fusion devices in the Institute of Nuclear Fusion, Moscow, a system for experimental data acquisition, data handling and remote access (further 'DAS-T10') was developed and has been used in the Institute since the year 2000. The DAS-T10 maintains the whole cycle of experimental data handling: from configuration of data measuring equipment and acquisition of raw data from the fusion device (the Device), to presentation of math-processed data and support of the experiment data archive. The DAS-T10 provides facilities for the researchers to access the data both at early stages of an experiment and well afterwards, locally from within the experiment network and remotely over the Internet.The DAS-T10 is undergoing a modernization since the year 2007. The new version of the DAS-T10 will accommodate to modern data measuring equipment and will implement improved architectural solutions. The innovations will allow the DAS-T10 to produce and handle larger amounts of experimental data, thus providing the opportunities to intensify and extend the fusion researches. The new features of the DAS-T10 along with the existing design principles are reviewed in this paper

  14. Software interface system for Geophysical Data Access and Management System (GPDAMS-CD)

    Kunte, P.D.

    This report examines the principles underlying GPDAMS, philosophy behind data management, and describes functionalities, limitations and usage of GPDAMS. GPDAMS is a complete marine geophysical data management system that provides user...

  15. Implementing portable channel access server software in the KEKB accelerator control system

    KEKB (KEK B-factory) accelerators are under construction and the control computer system for them is also in the last phase of installation. KEKB accelerators are composed of two storage rings, namely, HER (High Energy Ring for electrons of 8 GeV) and LER (Low Energy Ring for positrons of 3.5 GeV). These rings are placed in the underground tunnel in which former TRISTAN electron-positron colliding accelerator was. We have been constructing control system for KEKB from the scratch based on EPICS (Experimental Physics and Industrial Control Systems). But, for the injector linac, its control computer system was rejuvenated just a few years ago and it is not an EPICS based system but an original one. To operate KEKB accelerators, tuning of the linac as the injector for the KEKB rings is thought to be very essential. Ideally, KEKB control system can control both KEKB rings and linac. And both operators at linac control room and at KEKB control room should be able to monitor and adjust equipment of the other accelerators. For that purpose, we have to develop suitable method in between two systems to communicate with each other. In the EPICS collaborations, there is a Portable CA (Channel Access) Server for EPICS developed at Los Alamos National Laboratory for SUN workstations. We decided to modify it for our purposes and have been implementing it to KEKB control system step by step. And now, we can monitor and set magnetic field of Q-magnets in the linac, control beam transport magnets in the linac beam line, control klystrons, and measure beam positions by strip-line monitors through EPICS. In the near future, other equipment of the linac will be added to the CA server before the commissioning of the KEKB rings. (author)

  16. An exploration of the enablers and barriers in access to the Dutch healthcare system among Ghanaians in Amsterdam

    Boateng Linda

    2012-03-01

    Full Text Available Abstract Background Sub-Saharan African populations are growing in many European countries. Data on the health of these populations are rare. Additionally, many sub-Saharan African migrants are confronted with issues of low socio-economic status, acculturation and language difficulties, which may hamper their access to health care. Despite the identification of some of those barriers, little is known about the enabling factors. Knowledge about the enablers and barriers in access to healthcare experienced is important in addressing their health needs and promoting healthcare access. This study aimed to investigate the enabling factors as well as barriers in access to the Dutch healthcare system among the largest sub-Saharan African migrant group (Ghanaians living in Amsterdam, the Netherlands. Methods Six focus groups were conducted from November 2009 to February 2010. A semi-structured interview guideline was used. Discussions were conducted in English or Twi (Ghanaian dialect, recorded and transcribed verbatim. Analysis was based on the Andersen model of healthcare utilisation using MAXQDA software. Results Knowledge and perceived quality of the health system, awareness of diseases, family and community support, community initiatives and availability of social support were the main enablers to the healthcare system. Difficulties with the Dutch language and mistrust in health care providers were major barriers in access to healthcare. Conclusions Access to healthcare is facilitated mainly by knowledge of and the perceived efficiency and quality of the Dutch healthcare system. However, poor Dutch language proficiency and mistrust in health care providers appear to be important barriers in accessing healthcare. The enablers and barriers identified by this study provide useful information for promoting healthcare access among this and similar Sub-Saharan African communities.

  17. Implementing funding modalities for free access: The case for a "purchasing fund system" to cover medical care

    Philippe, Vinard; Karim, Diop; Taverne, Bernard

    2008-01-01

    The principle of free access to ARVs was recognized in Senegal in 2003. Debate now focuses on its expansion to cover all therapeutic care (consultations, exams, treatment for opportunistic infections). Expenditures incurred by this complementary packet often impede access to care. The main difficulty does not really arise from the need for funding but rather from how this treatment is managed and its impact on the current financing systems. In fact, four types of possible funding exist: (1) p...

  18. On the implementation of accessible transport system in urban villages: a case study of Shenzhen Futian district

    Liu, Q.; Lu, X; Wang, J

    2010-01-01

    Urban village is a type of living space in rapid urbanized area within P. R. China, the main spatial features of which are highly the assembling buildings and the principal dwelling space for transient population and poor foreigners. Considering the fact that these urban villages may stay for long time, the implementation of accessible transportation may help reduce social exclusion issues. The major difficulties to implement the Accessible Transport System (ATS) there lie in the exceedingly ...

  19. Access Management Processes in Cargotec’s Financial Reporting Systems : An approach to improve throughput time and increase quality

    Magnusson, Johan

    2013-01-01

    This study investigates the access management process for a globally implemented financial reporting system. Through this research the goal is to find inefficiencies and bottlenecks in the process which prohibit the access management process from running at optimal speed. Best practices from the fields of operations management and business process design are synthesized to create a conceptual framework which incorporates the concepts at the heart of well-designed and well-implemented bus...

  20. A framework for systematic analysis of Open Access journals and its application in software engineering and information systems

    Graziotin, Daniel; Wang, Xiaofeng; Abrahamsson, Pekka

    2013-01-01

    This article is a contribution towards an understanding of Open Access (OA) publishing. It proposes an analysis framework of 18 core attributes, divided into the areas of Bibliographic information, Activity metrics, Economics, Accessibility, and Predatory issues of OA journals. The framework has been employed in a systematic analysis of 30 OA journals in software engineering (SE) and information systems (IS), which were selected among 386 OA journals in Computer Science from the Directory of ...

  1. Design and analysis of a biometric access control system using an electronic olfactory device to identify human odour characteristics

    McMillan, Stephen

    2000-01-01

    The use of an electronic olfactory device, termed an electronic 'nose', was investigated for the detection of unique human odour characteristics. The detection of these unique odours was applied to the field of biometrics for access control, where a human's unique characteristics were used to authenticate a user of an access control system. An electronic odour sensing device was designed and constructed using an array of conducting polymer gas sensors in order to facilitate the regular screen...

  2. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  3. Effects of interaction of an early experience of reward through maternal contact or its denial with social stress during adolescence on the serotonergic system and the stress responsiveness of adult female rats.

    Raftogianni, A; Diamantopoulou, A; Alikaridis, F; Stamatakis, A; Stylianopoulou, F

    2012-05-01

    Experiences during critical periods, such as the neonatal and adolescence, play a critical role in determining adult stress-coping behavior. Based on the aforementioned we developed an experimental protocol, which included a neonatal experience and a social stress during adolescence. The serotonergic system is known as an important modulator of coping ability and, in general, emotional balance in both normal and pathological states, such as depression and anxiety, for which females are more vulnerable. Thus in the present work we used female rats and determined 5-HT, 5-hydroxyindoleacetic acid (5-HIAA), and 5-hydroxytryptamine receptor type 1A (5-HT(1A)) receptor levels in the prefrontal cortex (PFC) and the amygdala (AMY). During postnatal days 10-13 (PND 10-13) rat pups were exposed to a T-maze, one arm of which lead to the mother. One group of animals was allowed contact with the mother (rewarded-receiving expected reward (RER)), whereas the other was denied the expected reward (DER). High performance liquid chromatography (HPLC) analysis revealed that in both the PFC and in AMY, adult RER animals had higher basal 5-HT levels. Furthermore, in the AMY of this group of animals, higher levels of 5-HT(1A) receptors were detected by Western blot analysis. In adulthood rats were exposed to the Forced Swimming Test/Stress (FST/S). RER animals not exposed to the adolescent stress exhibited longer immobility time during both the first and second day of FST. Corticosterone levels following the FST fell faster in the DER animals. Adolescent stress affected the responses to the adult FSS only in the DER animals, which had decreased 5-HT in the AMY and increased immobility time on both days of the FST, compared with the DER, not stressed in adolescence. The phenotype of the DER animals is in line with the "match-mismatch" hypothesis, which states that if two events during critical periods of life "match" in being mildly stressful, their interaction can be adaptive. PMID

  4. RFID card based access control system with counter for Indus Complex

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  5. Multiagent -Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Li Husheng

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of -learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the -learning are illustrated using a Metrick-Polak plot, which shows the traces of -values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent -learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  6. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Musick, Charles R.; Critchlow, Terence; Ganesh, Madhaven; Slezak, Tom; Fidelis, Krzysztof

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  7. Posture-Dependent Human 3He Lung Imaging in an Open Access MRI System: Initial Results

    Tsai, L L; Li, C -H; Rosen, M S; Patz, S; Walsworth, R L

    2007-01-01

    The human lung and its functions are extremely sensitive to orientation and posture, and debate continues as to the role of gravity and the surrounding anatomy in determining lung function and heterogeneity of perfusion and ventilation. However, study of these effects is difficult. The conventional high-field magnets used for most hyperpolarized 3He MRI of the human lung, and most other common radiological imaging modalities including PET and CT, restrict subjects to lying horizontally, minimizing most gravitational effects. In this paper, we briefly review the motivation for posture-dependent studies of human lung function, and present initial imaging results of human lungs in the supine and vertical body orientations using inhaled hyperpolarized 3He gas and an open-access MRI instrument. The open geometry of this MRI system features a "walk-in" capability that permits subjects to be imaged in vertical and horizontal positions, and potentially allows for complete rotation of the orientation of the imaging su...

  8. Multiagent Q-Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Husheng Li

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of Q-learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the Q-learning are illustrated using a Metrick-Polak plot, which shows the traces of Q-values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent Q-learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  9. A Mechanism Denial Study on the Madden-Julian Oscillation

    In-Sik Kang

    2011-12-01

    Full Text Available A series of Madden-Julian oscillation (MJO mechanism-denial experiments is performed using an atmospheric general circulation model (AGCM. Daily climatological seasonal cycles of i surface latent heat flux, ii net radiative heating rate, and iii surface wind stress are obtained from a control simulation and prescribed in place of the normal interactive computations of these fields in order to turn off the i wind-induced surface heat exchange (WISHE, ii cloud-radiation interaction (CRI, and iii frictional wave-CISK (FWC mechanisms, respectively. Dual and triple mechanism denial experiments are also conducted by switching off multiple mechanisms together. The influence of each mechanism is assessed by comparing experiments with that mechanism turned off to those in which it is not. CRI and WISHE are both found to be important to the simulated MJO amplitude and propagation speed, while FWC has weaker and less systematic effects. The MJO is weakened when CRI is turned off, but strengthened when WISHE is turned off, indicating that CRI amplifies the MJO in the control simulation while WISHE weakens it. The negative influence of WISHE is shown to result from simulated phase relationships between surface winds, surface fluxes and convection which differ significantly from those found in observations, and thus is not interpreted as evidence against a positive role for WISHE in the development and maintenance of the observed MJO. The positive influence of CRI in the model is consistent with a strong simulated relationship between daily grid-point column-integrated radiative and convective heating; the mean ratio of the latter to the former exceeds 0.2 for rain rates less than 14 mm d-1. CRI is also shown to suppress an excessive excitation of the convectively coupled Kelvin wave so that the amplitude and frequency of the MJO is maintained.

  10. A web product data management system based on Simple Object Access Protocol

    2003-01-01

    A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the serverside technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture,a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.

  11. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  12. The Colombian health insurance system and its effect on access to health care.

    Alvarez, Luz Stella; Salmon, J Warren; Swartzman, Dan

    2011-01-01

    In 1993, the Colombian government sought to reform its health care system under the guidance of international financial institutions (the World Bank and International Monetary Fund). These institutions maintain that individual private health insurance systems are more appropriate than previously established national public health structures for overcoming inequities in health care in developing countries. The reforms carried out following international financial institution guidelines are known as "neoliberal reforms." This qualitative study explores consumer health choices and associated factors, based on interviews with citizens living in Medellin, Colombia, in 2005-2006. The results show that most study participants belonging to low-income and middle-income strata, even with medical expense subsidies, faced significant barriers to accessing health care. Only upper-income participants reported a selection of different options without barriers, such as complementary and alternative medicines, along with private Western biomedicine. This study is unique in that the informal health system is linked to overall neo-liberal policy change. PMID:21563628

  13. System for accessing a collection of histology images using content-based strategies

    Histology images are an important resource for research, education and medical practice. The availability of image collections with reference purposes is limited to printed formats such as books and specialized journals. When histology image sets are published in digital formats, they are composed of some tens of images that do not represent the wide diversity of biological structures that can be found in fundamental tissues; making a complete histology image collection available to the general public having a great impact on research and education in different areas such as medicine, biology and natural sciences. This work presents the acquisition process of a histology image collection with 20,000 samples in digital format, from tissue processing to digital image capturing. The main purpose of collecting these images is to make them available as reference material to the academic community. In addition, this paper presents the design and architecture of a system to query and explore the image collection, using content-based image retrieval tools and text-based search on the annotations provided by experts. The system also offers novel image visualization methods to allow easy identification of interesting images among hundreds of possible pictures. The system has been developed using a service-oriented architecture and allows web-based access in http://www.informed.unal.edu.co

  14. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José; Tafur Monroy, Idelfonso

    2014-01-01

    We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate the...

  15. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being...

  16. Public information: control, secret and right of access

    Carmem Lúcia Batista

    2012-01-01

    Recently, in November 2011, it was published the law on access to public information, legal and historic mark in the struggle for human rights in Brazil. This achievement is the result of a process marked by denial of access to public archives, as it was the case of the Araguaia Guerrilla, valuing the culture of secrecy, abuse of power and relations between public and private in Brazil. Thus, the aim of this paper is to present a brief history about the control of access to public information...

  17. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  18. Retention in a public health care system with free access to treatment

    Helleberg, Marie; Engsig, Frederik N; Kronborg, Gitte; Larsen, Carsten S; Pedersen, Gitte; Pedersen, Court; Gerstoft, Jan; Obel, Niels

    2012-01-01

    National Hospital Registry and The Danish Civil Registration System. Incidence rates (IR), risk factors for LTFU and return to care and mortality rate ratios (MRR) were estimated using Poisson regression analyses. RESULTS:: We included 4,745 HIV patients who were followed for 36,692 person-years. Patients.......0-1.3)). Five years after LTFU the probability of return to care was 0.87 (95% CI: 0.84-0.90). The risk of death was significantly increased after LTFU (MRR 1.9 (95% CI: 1.6-2.6)) and =6 months after return to care (MRR=10.9 (95% CI: 5.9-19.9)). CONCLUSIONS:: Retention in care of Danish HIV patients is high......, especially after initiation of HAART. Absence from HIV care is associated with increased mortality. We conclude that high rates of retention can be achieved in a health care system with free access to treatment and is associated with a favorable outcome....

  19. The Earth System Grid Federation : an Open Infrastructure for Access to Distributed Geospatial Data

    Cinquini, Luca; Crichton, Daniel; Mattmann, Chris; Harney, John; Shipman, Galen; Wang, Feiyi; Ananthakrishnan, Rachana; Miller, Neill; Denvil, Sebastian; Morgan, Mark; Pobre, Zed; Bell, Gavin M.; Drach, Bob; Williams, Dean; Kershaw, Philip; Pascoe, Stephen; Gonzalez, Estanislao; Fiore, Sandro; Schweitzer, Roland

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  20. A multi-agent conversational system with heterogeneous data sources access

    Eisman, Eduardo M.

    2016-01-28

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  1. PHOTO ENCODING OF ANALOG WATER METER FOR USER ACCESS AND PAYMENT SYSTEM

    GODFREY A. MILLS

    2012-07-01

    Full Text Available This paper presents design reconfiguration of analog water meter to provide remote access to user water consumption and billing records, payments, and meter device monitoring using photo-encoding as the detecting method for water consumption, a PIC18F2423 microcontroller for data processing, and SMS (short message service technology for data transportation. To validate the system design, an analog water meter was converted into a digital equivalent and interfaced to the cellular network to transmit parameters of the meter to-and-from aconsolidation server (CS. The prototype was tested for operations such as user consumption and billing records, payments, device control, and tamper notification. Test results conducted within a 12km radius gave an average response time of 16 seconds spanning from time of SMS request to the CS to read data from meter through dataprocessing and submission to user. To manage system congestion from multi-users, a multi-threaded algorithm was implemented with each SMS request handling a single thread.

  2. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems.

    Shehzad, Danish; Bozkuş, Zeki

    2016-01-01

    Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models. PMID:27413363

  3. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems

    Bozkuş, Zeki

    2016-01-01

    Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models. PMID:27413363

  4. Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures

    Pau, L. -F.

    2013-01-01

    This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection me...

  5. Development of access control system in Fukushima No.2 nuclear power station

    A new radiation work control system has been developed for controlling the entrance and exit of workers from the radiation controlled area in a nuclear power station and has been run in the Fukushima No.2 Nuclear Power Station of Tokyo Electric Power Co. Inc., since October, 1999. The newly developed system uses an access control device (ACD) for automatically lending an alarm-equipped personal dosimeter (APD) to each worker, and also radio communication for gathering dose data while contamination is measured by a body surface monitor upon exit, to reduce the workload for workers. The APD accurately measures both x-rays and γ-rays and sounds an alarm if the set dose level is reached. The ACD incorporates a charging function for 150 dosimeters in addition to the identification (ID) card reading and entrance/exit qualification judgment functions that are available with conventional entrance/exit control devices. Also, at the time of entrance, the ID number and alarm setpoint are written into an APD, which is then lent automatically, thereby making entry quicker and easier for workers. After returning the APD, it can be recharged rapidly and trend data during work can be automatically collected. The body surface monitor system is designed as follows. While contamination of the body surface is being measured at the time of exit, the data of the APD and ID card is read to perform an exit check. After completion of contamination measurement, the results of the exit check and dose data are printed out and collected by the tested person. Radio communication is used to transmit and receive the APD data, and to ensure precise radio communication during body surface monitoring two antennas are used, one for transmission and one for reception, so data can be read during contamination measurement. The developed system reduces workers' burden and improves functionality and reliability. (Suetake, M.)

  6. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  7. Computerised NMA System Compliant with Regulation COM(2002)99 for the Application Countries (ACCESS)

    ACCESS (Applicant Countries' Co-operation with the EURATOM Safeguards System) is a project to prepare applicant countries for membership in the EU in the area of nuclear safeguards. Chapter VII of the EURATOM Treaty requires that: '...the Commission shall satisfy itself that, in the territories of Member States, (a) ores, source materials and special fissile materials are not diverted from their intended uses as declared by the users; (b) the provisions relating to supply and any particular safeguarding obligations assumed by the Community under an agreement concluded with a third State or an international organisation are complied with.' In practice this means, inter alia, that operators of nuclear installations must send reports on inventory changes of nuclear materials once per month, physical inventory listings and material balance reports as appropriate. The format, content, frequency and timelines of these reports are described in detail in Regulations 3227/76 and COM(2002)99 (in preparation). It is markedly different from the rules governing reporting of nuclear materials accountancy data to the International Atomic Energy Agency, as currently implemented in all the Applicant Countries. In previous enlargement rounds preparation of the new member states was limited to two-day seminars and a round of meetings. The ensuing difficulties after the date of joining the EURATOM Safeguards System were clear evidence that this preparation was insufficient. Clearing up technical and conceptual reporting errors after the event is costly to the operators and to EURATOM Safeguards. It is also embarrassing for the Member State and the European Commission, especially if the reporting errors to EURATOM result in reporting errors to the IAEA. It is the objective of the ACCESS project to provide operators in the Applicant Countries with hardware, software, training and procedures to electronically report nuclear materials accountancy data to EURATOM Safeguards in full

  8. Health systems and access to antiretroviral drugs for HIV in Southern Africa: service delivery and human resources challenges.

    Schneider, Helen; Blaauw, Duane; Gilson, Lucy; Chabikuli, Nzapfurundi; Goudge, Jane

    2006-05-01

    Without strengthened health systems, significant access to antiretroviral (ARV) therapy in many developing countries is unlikely to be achieved. This paper reflects on systemic challenges to scaling up ARV access in countries with both massive epidemics and weak health systems. It draws on the authors' experience in southern Africa and the World Health Organization's framework on health system performance. Whilst acknowledging the still significant gap in financing, the paper focuses on the challenges of reorienting service delivery towards chronic disease care and the human resource crisis in health systems. Inadequate supply, poor distribution, low remuneration and accelerated migration of skilled health workers are increasingly regarded as key systems constraints to scaling up of HIV treatment. Problems, however, go beyond the issue of numbers to include productivity and cultures of service delivery. As more countries receive funds for antiretroviral access programmes, strong national stewardship of these programmes becomes increasingly necessary. The paper proposes a set of short- and long-term stewardship tasks, which include resisting the verticalisation of HIV treatment, the evaluation of community health workers and their potential role in HIV treatment access, international action on the brain drain, and greater investment in national human resource functions of planning, production, remuneration and management. PMID:16713875

  9. EMODnet Physics: One-stop Portal to access Multiplatform Observing Systems

    Novellino, Antonio; Benedetti, Giacomo; D'Angelo, Paolo; Gorringe, Patrick; Thjisse, Peter; Schaap, Dick; Pouliquen, Sylvie; Manzella, Giuseppe

    2016-04-01

    The EMODnet Physics is being developed through a stepwise approach in three major stages and is currently in its second phase of development (2013 - 2016). It is a one-stop portal to access to near real time and historical achieved data sets. It provides a combined array of services and functionalities (such as dynamic map facility for viewing and downloading, dashboard reporting and machine-to-machine communication services) to users for obtaining free of charge data, meta-data and data products on the physical conditions of European sea basins and oceans. Moreover, the system provides full interoperability with third-party software through WMS service, Web Service and Web catalogues in order to exchange data and products according to the most recent standards. In particular, interoperability is assured with the IODE Ocean Data Portal with which EMODnet Physics is collaborating. EMODnet Physics is built on and it is working in coordination and cooperation EuroGOOS-ROOSs, CMEMS and the SeaDataNet network of NODCs. By means of joint activities with its three pillars and with the most relevant Organizations and associations within the sector, EMODnet is undergoing significant improvements and expansion. In the last year, EMODnet Physics has steadily enhanced the number and type of platforms covered providing high quality data integrating sources from a growing network. In particular, a major step forward sees the integration of emerging measuring systems such as HF radars, which are able to provide the resolution of surface current speeds and directions covering large regions of the coastal oceans, and that now do populate the EMODnet Platform. Nowadays the system does integrate information by more than 7.300 stations, among which 2915 moorings, 2728 drifting buoys and around 1200 ARGO floats. EMODnet Physics was also updated with two ready-to-use data products: the Ice (Copernicus CMEMS - SEAICE_GLO_SEAICE_L4_NRT_OBSERVATIONS_011_001) and Sea Level Trends (produced

  10. Electronic access to care system: improving patient's access to clinical information through an Interactive Voice Response (IVR) system and Web portal.

    Do, Nhan; Marinkovich, Andre; Koisch, John; Wheeler, Gary

    2003-01-01

    Our clinical providers spend an estimated four hours weekly answering phone messages from patients. Our nurses spend five to ten hours weekly on returning phone calls. Most of this time is spent conveying recent clinical results, reviewing with patients the discharge instructions such as consults or studies ordered during the office visits, and handling patients' requests for medication renewals. Over time this will lead to greater patients' dissatisfaction because of lengthy waiting time and lack of timely access to their medical information. This would also lead to greater nursing and providers' dissatisfaction because of unreasonable work load. PMID:14728335

  11. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  12. Remote Access to Wireless Communications Systems Laboratory--New Technology Approach

    Kafadarova, Nadezhda; Sotirov, Sotir; Milev, Mihail

    2012-01-01

    Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable students to use expensive laboratory equipment, which is not usually available to students. In…

  13. Overview of Radio Resource Management (RRM) issues in multi-radio access systems

    Jorguseski, L.; Prasad, R.

    2004-01-01

    The concept of multi-radio access networks is currently considered as a strong candidate for the next generation wireless access networks. This concept incorporates conventional cellular networks such as GERAN or UTRAN for wide area coverage while local-area networks such as IEEE 802.11, HIPERLAN/2,

  14. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    2010-10-01

    ... SECURITY SECURE FLIGHT PROGRAM Collection and Transmission of Secure Flight Passenger Data for Watch List... covered aircraft operator of the results of watch list matching for that passenger or non-traveling..., as provided in 49 CFR part 1544, subpart B or 49 CFR part 1546, subpart B, to ensure that...

  15. Low-Cost Encoding Device for Optical Code Division Multiple Access System

    Mohammad S. Ab-Rahman

    2009-01-01

    Full Text Available Problem statement: Instead of using Fiber Bragg Grating (FBG to develop the coded spectrums, which consist of expensive elements, the grating also are highly sensitive to environmental changes and this will contribute to the increment of capital and operational expenditures (CAPEX and OPEX. Approach: This study presented the development of low-cost 16-ports encoding device for Optical Code Division Multiple Access (OCDMA systems based on Arrayed Waveguide Grating (AWG devices and optical switches. The encoding device is one of the new technologies that used to transmit the coded data in the optical communication system by using AWG and optical switches. It provided a high security for data transmission due to all data will be transmitted in binary code form. The output signals from AWG were coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmitted to the receiver. The 16-ports encoding device used 16 Double Pole Double Throw (DPDT toggle switches to control the polarization of voltage source from +5 V to -5 V for 16 optical switches. When +5 V was given, the optical switch will give code '1' and vice versa. Results: We found that the insertion loss, crosstalk, uniformity and Optical Signal-Noise-Ratio (OSNR for the developed prototype are Conclusion: We had successful developed the AWG-based OCDMA encoding device prototype and characterized using linearity testing and continuous signal testing. The developed prototype was expected to be applied in the optical communication system on Passive Optical Networks (PONs.

  16. Multilevel Access Control in a MANET for a Defense Messaging system using Elliptic Curve Cryptography

    J.Nafeesa Begum, K.Kumar, Dr.V.Sumathy

    2010-06-01

    Full Text Available The trend of the Civilian society has moved from the industrial age focus onautomation and scale towards information based on computing andcommunication. Today’s Warfare is also moving towards an information ageparadigm based on information sharing, situational awareness, and distributedpoints of intelligence, command and control. A widely-networked fighting force isbetter able to share information about tactical situations that may begeographically widespread, asymmetric, and rapidly changing. Commandersmust be able to better assess situations across broad theaters, with extensivedata, voice, and especially video feeds as strategic inputs. Thus, network-centricwarfare improves effectiveness at both the tactical "point of the spear" and in theachievement of broader strategic goals. Broadly disseminated knowledge assetsenable fighting forces that must self-synchronize, even as they physicallydisperse to address dynamic battlefield conditions. The speed of decision hasincreased and command decisions must be rapidly relayed and implemented, toimprove battlefield outcomes. Multilevel access control in a MANET for aDefense messaging system is used to have the command decisions relayed toall people who are active in the group and also to all people who have beenidentified as higher in the hierarchy instead of sending one to one messages toeach individual.. The system developed is secure, multi site and allows for globalcommunication using the inherent properties of Elliptic Curve cryptography .Elliptic Curve cryptography provides a greater security with less bit size and it isfast when compared to other schemes. The implementation suggests that it is asecure system which occupies fewer bits and can be used for low power devices.

  17. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  18. [Female migrants in the health care system. Health care utilisation, access barriers and health promotion strategies].

    Wimmer-Puchinger, B; Wolf, H; Engleder, A

    2006-09-01

    Due to the evident interaction between social factors and health, migrants are exposed to specific risk factors and access barriers to health services. Some examples are the lower education level, the low social position and/or the insufficient language skills. This concept is further elaborated in the multi-factorial impacts of health literacy. Female migrants often experience additional discrimination because of their gender. Despite the lack of representative data, consistent studies show that female migrants do not regularly take advantage of health care prevention and present themselves with higher degrees of stress. The current "inadequate health care" manifests itself in a lack of care in the areas of prevention and health education and an abundance in the context of medication and diagnostic procedures. To meet these demands and to further reduce barriers, in particular language barriers, specific strategies for this target group involving both politics and the health care system have to be developed. Besides the employment of interpreters with a native cultural background and the distribution of information booklets, it is an important strategy to reduce structural obstacles such as cultural diversity. To contact these women in their living environment should help to increase their self-determined health promotion. Selected models of good practice in Austria with regard to the themes of FGM (female genital mutilation), violence, heart disease and breast cancer are presented to highlight the specific health situation and risk factors of female migrants as well as successful strategies to confront them. PMID:16927035

  19. An evaluation of the Cortrak Enteral access system in our intensive care.

    Dolan, A M

    2012-05-01

    Appropriate nutrition is considered a cornerstone of Intensive care; however its successful initiation is frequently impeded by decreased gastric emptying secondary to opiates, sepsis, or ileus. The presence of a postpyloric tube will guarantee delivery of calories while reducing the incidence of reflux and aspiration. Enteral nutrition is approximately 100 fold cheaper than parenteral nutrition. A nasojejunal tube may be placed blindly (success 15%), by direct vision with a gastroscope, or under fluoroscopic guidance in the X-ray department. This study examines the use of the Cortrak Enteral access system (CEAS) in placement of nasojejunal tubes, a method facilitated by the use of an electromagnet. A retrospective review was conducted to evaluate the effectiveness of the CEAS for establishing nasojejunal feeding in the Intensive Care Unit (ICU) between January and December 2010. Our results found that the CEAS was successful in positioning a nasojejunal tube in ten out of twelve patients (83% success rate). Successful placement was confirmed by portable abdominal \\/ chest x-ray. Placement took an average of 30 minutes, and prokinetic agents were used to facilitate two placements. The duration of successful enteral nutrition varied from 2 to 15 days post placement. The CEAS is a simple bedside tool for placing postpyloric tubes. While there is a learning curve associated with its use, it may confer significant benefits to individual patients and also to those responsible for ever shrinking budgets.

  20. Trauma in elderly people: access to the health system through pre-hospital care1

    da Silva, Hilderjane Carla; Pessoa, Renata de Lima; de Menezes, Rejane Maria Paiva

    2016-01-01

    Objective: to identify the prevalence of trauma in elderly people and how they accessed the health system through pre-hospital care. Method: documentary and retrospective study at a mobile emergency care service, using a sample of 400 elderly trauma victims selected through systematic random sampling. A form validated by experts was used to collect the data. Descriptive statistical analysis was applied. The chi-square test was used to analyze the association between the variables. Results: Trauma was predominant among women (52.25%) and in the age range between 60 and 69 years (38.25%), average age 74.19 years (standard deviation±10.25). Among the mechanisms, falls (56.75%) and traffic accidents (31.25%) stood out, showing a significant relation with the pre-hospital care services (p<0.001). Circulation, airway opening, cervical control and immobilization actions were the most frequent and Basic Life Support Services (87.8%) were the most used, with trauma referral hospitals as the main destination (56.7%). Conclusion: trauma prevailed among women, victims of falls, who received pre-hospital care through basic life support services and actions and were transported to the trauma referral hospital. It is important to reorganize pre-hospital care, avoiding overcrowded hospitals and delivering better care to elderly trauma victims. PMID:27143543

  1. Trauma in elderly people: access to the health system through pre-hospital care

    Hilderjane Carla da Silva

    2016-01-01

    Full Text Available Objective: to identify the prevalence of trauma in elderly people and how they accessed the health system through pre-hospital care. Method: documentary and retrospective study at a mobile emergency care service, using a sample of 400 elderly trauma victims selected through systematic random sampling. A form validated by experts was used to collect the data. Descriptive statistical analysis was applied. The chi-square test was used to analyze the association between the variables. Results: Trauma was predominant among women (52.25% and in the age range between 60 and 69 years (38.25%, average age 74.19 years (standard deviation±10.25. Among the mechanisms, falls (56.75% and traffic accidents (31.25% stood out, showing a significant relation with the pre-hospital care services (p<0.001. Circulation, airway opening, cervical control and immobilization actions were the most frequent and Basic Life Support Services (87.8% were the most used, with trauma referral hospitals as the main destination (56.7%. Conclusion: trauma prevailed among women, victims of falls, who received pre-hospital care through basic life support services and actions and were transported to the trauma referral hospital. It is important to reorganize pre-hospital care, avoiding overcrowded hospitals and delivering better care to elderly trauma victims.

  2. Rockfall hazard assessment for access road to dam 'Sveta Petka' using rockfall hazard rating system (RHRS)

    Large number of roads in our country are constructed in mountainous and hilly terrains. Execution of cuts in the hard rock masses is inevitable. In light of the geological nature of the rocks, processes like rockfalls and landslides in different forms and magnitude are very usual. They occur during construction activities and afterwards in exploitation of the roads. Correct protective measures must be undertaken in order to secure the safety of traffic and people using this roads. One such case is the access road to Dam “Sv.Petka”, where constant rockfalls, result of great rupture tectonics and steep cut angles built in marbly limestones, endanger the safety of traffic and construction workers using this road. In order to stress out the hazard invoked by rockfalls and the need of protective measures, we used the well established Rockfall Hazard Rating System (RHRS). Posted speed limit has great influence. Along other possibilities that this method offers is the planning of annual programs for protection measures, with separation of most dangerous zones according the classification, before any undertaking of geotechnical analyses of slope stability. Further software modeling is needed in order to get a better understanding of the nature of rockfalls.(Author)

  3. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  4. Effects of high-frequency electromagnetic fields emitted from card readers of access control systems on electronic pocket dosimeters

    Deji, Shizuhiko [Graduate School of Environmental Studies, Nagoya University, Furo-cho, Chikusa-ku, Nagoya 464-8602 (Japan); Nishizawa, Kunihide [Radioisotope Research Center, Nagoya University, Furo-cho, Chlkusa-ku, Nagoya 464-8602 (Japan)]. E-mail: j45616a@nucc.cc.nagoya-u.ac.jp

    2005-06-01

    High-frequency electromagnetic fields in the 120 kHz band emitted from card readers for access control systems caused abnormally high doses on electronic pocket dosimeters (EPDs). All EPDs recovered their normal performance by resetting after the exposure ceased. The electric and magnetic immunity levels of the EPDs were estimated by using the distances needed to prevent electromagnetic interference.

  5. 28 CFR 16.72 - Exemption of Office of the Associate Attorney General System-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of the Associate Attorney General System-limited access. 16.72 Section 16.72 Judicial Administration DEPARTMENT OF JUSTICE... subject the accounting of disclosures could reveal the identity of a confidential source. In...

  6. 28 CFR 16.75 - Exemption of the Office of the Inspector General Systems/Limited Access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Office of the Inspector General Systems/Limited Access. 16.75 Section 16.75 Judicial Administration DEPARTMENT OF JUSTICE... activities; of the identity of confidential sources, witnesses, and law enforcement personnel, and...

  7. 28 CFR 16.83 - Exemption of the Executive Office for Immigration Review System-limited access.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Executive Office for Immigration Review System-limited access. 16.83 Section 16.83 Judicial Administration DEPARTMENT OF JUSTICE... identity of confidential informants; or constitute unwarranted invasions of the personal privacy of...

  8. 28 CFR 700.31 - Exemption of the Office of Independent Counsel's systems of records-limited access.

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Exemption of the Office of Independent Counsel's systems of records-limited access. 700.31 Section 700.31 Judicial Administration OFFICE OF..., material compiled during the investigation, and the identity of witnesses and informants. Disclosure of...

  9. Teaching Poverty with Geographic Visualization and Geographic Information Systems (GIS): A Case Study of East Buffalo and Food Access

    Gjesfjeld, Christopher D.; Jung, Jin-Kyu

    2014-01-01

    Although various methods have been used to teach about poverty in the social work classroom (e.g., quantitative, historical, and qualitative), the use of geographic visualization and geographic information systems (GIS) has become a relatively new method. In our analysis of food access on the East Side of Buffalo, New York, we demonstrate the…

  10. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long‐distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  11. FUZZY MODELLING OF A NETWORK DENIAL OF SERVICE (DOS ATTACK PHENOMENON.

    IHEKWEABA. OGECHI

    2013-04-01

    Full Text Available This paper presents the fuzzy modeling of a network Denial of Service (DoS attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic approach as well as an improved mechanism for generating the fuzzy inference rules were outlined. Further, the paper discusses the basic concept of fuzzy logic, fuzzy systems and reasons for their adoption in modern control operations. DoS attack detection, using some basic traffic characteristics: bitrates, entropy and Hurst experiment as it’s inputs, was x-rayed. Here, an attack trace file collected atthe edge router of the Computer Science Department, University of California Los Angeles was used to develop the fuzzy inference model.The data set was partitioned into a training dataset and a testing dataset. The fuzzy concept learning system (FCLS algorithm was used for constructing the fuzzy decision tree, using the trace files.Inference rules were then generated from the constructed decision tree. The simulation and evaluation of the fuzzy model was performed with the testing dataset.

  12. 8 CFR 214.4 - Denial of certification, denial of recertification or withdrawal of SEVP certification.

    2010-01-01

    ... to comply with 8 CFR 214.3(g)(2). (iii) Failure of a DSO to notify SEVP of the attendance of an F-1 transfer student as required by 8 CFR 214.2(f)(8)(ii). (iv) Failure of a DSO to identify on the Form I-20... certification of a school or school system for the attendance of nonimmigrant students, pursuant to sections...

  13. Distributed Denial of Service (DDoS) Attacks Detection Mechanism

    Kumarasamy, Saravanan

    2012-01-01

    Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that probably belong to an attack. Upstream routers are also notified to drop such packets in order that the router's resources be used to route legitimate traffic hence term pushback. Client puzzles have been advocated as a promising countermeasure to DoS attacks in the recent years. In order to identify the attackers, the victim server issues a puzzle to the client that sent the traffic. When the client is able to solve the puzzle, it is assumed to be authentic and the traffic from it is allowed into the server. If the victim suspects that the puzzles are solved by most of the clients, it increases the complexity of the puz...

  14. MVSDAP: a new extensible, modifiable and secure data access pattern for layered Information Systems

    Gholamali Nejad Hajali Irani

    2012-03-01

    Full Text Available Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access pattern. We tried newly provided pattern not to lose performance. In this new pattern, respecting to object oriented heuristics, a module along with a tool has been provided that is able to be attached to every project and perform all data access tasks. This pattern has maximum reusability so it can be used in different kinds of projects of any size regardless to the methodology used.

  15. Planetary data in education: tool development for access to the Planetary Data System

    Atkinson, C. H.; Andres, P. M.; Liggett, P. K.; Lowes, L. L.; Sword, B. J.

    2003-01-01

    In this session we will describe and demonstrate the interface to the PDS access tools and functions developed for the scientific community, and discuss the potential for its utilization in K-14 formal and informal settings.

  16. Systems and Services for Real-Time Web Access to NPP Data Project

    National Aeronautics and Space Administration — Global Science & Technology, Inc. (GST) proposes to investigate information processing and delivery technologies to provide near-real-time Web-based access to...

  17. Ultra Wide Wavelength Division Multiplexing Optical Code Division Multiple Access Communication Systems in Wide Area Optical Communication Networks

    Ahmed Nabih Zaki Rashed

    2013-01-01

    Full Text Available The effect of dispersion of fiber on the performance of OCDMA systemand to find the limitations imposed by dispersion on number of user and length of transmission. It has been observed that in the bit error rate performance curve the error is decreased when the number of subscriber is increased side by side the optical power is reduced when the users is added. This paper has presented the ultra wide wavelength division multiplexing optical code division multiple access (OCDMA communication systems in wide area optical communication networks and the transmission efficiency to be evaluated in order to determine the impact ofmulti access interference.

  18. Factors influencing micro and small enterprises’ access to finance since the adoption of multi-currency system in Zimbabwe.

    Mabhungu Isaac; Masamha Blessing; Mhazo Simbarashe; Jaravaza Divaris; Chiriseri Lloyd

    2011-01-01

    Access to financial services is key to Micro and Small Enterprises’ (MSEs) operation and growth in Zimbabwe. A survey was done in a small town (Bindura), medium size city (Kadoma) and the city of Harare (large city) to determine major factors influencing MSEs’ access to finance since the adoption of the multi-currency system in Zimbabwe. A pilot study was done in the city of Gweru to 10 MSEs’. Structured questionnaires were administered to MSEs that have been operating for at least one year a...

  19. National Geothermal Data System: Transforming the Discovery, Access, and Analytics of Data for Geothermal Exploration

    Patten, Kim [Arizona Geological Survey

    2013-05-01

    Compendium of Papers from the 38th Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California February 11-13, 2013 The National Geothermal Data System (NGDS) is a distributed, interoperable network of data collected from state geological surveys across all fifty states and the nation’s leading academic geothermal centers. The system serves as a platform for sharing consistent, reliable, geothermal-relevant technical data with users of all types, while supplying tools relevant for their work. As aggregated data supports new scientific findings, this content-rich linked data ultimately broadens the pool of knowledge available to promote discovery and development of commercial-scale geothermal energy production. Most of the up-front risks associated with geothermal development stem from exploration and characterization of subsurface resources. Wider access to distributed data will, therefore, result in lower costs for geothermal development. NGDS is on track to become fully operational by 2014 and will provide a platform for custom applications for accessing geothermal relevant data in the U.S. and abroad. It is being built on the U.S. Geoscience Information Network (USGIN) data integration framework to promote interoperability across the Earth sciences community. The basic structure of the NGDS employs state-of-the art informatics to advance geothermal knowledge. The following four papers comprising this Open-File Report are a compendium of presentations, from the 38th Annual Workshop on Geothermal Reservoir Engineering, taking place February 11-13, 2013 at Stanford University, Stanford, California. “NGDS Geothermal Data Domain: Assessment of Geothermal Community Data Needs,” outlines the efforts of a set of nationwide data providers to supply data for the NGDS. In particular, data acquisition, delivery, and methodology are discussed. The paper addresses the various types of data and metadata required and why simple links to existing

  20. Authentication system deployment throughout protected access (UTM) for the Wireless Network in a hotel chain

    Escolà Henke, Jean Miquel

    2011-01-01

    A Hotel chain distributed over Europe wishes to provide wireless access to Internet for the hosted customers and offer an integral security through a Unified Threat Management ( UTM ) The project will consist; in one hand, based on the customer's needs, on adding a wireless access, with a captive portal authentication centralized at our company being able to manage users as well as the wireless networks remotely. On the other hand, the securization and management of the communication li...

  1. On the Deployment of Large-Scale High-Capacity Wireless Systems with Secondary Spectrum Access

    Obregon, Evanny

    2014-01-01

    The avalanche in mobile data consumption represents a big challenge for mobile networks operators and national regulators. This thesis focuses on finding additional spectrum to meet this demand in a cost-efficient way by considering shared spectrum access. Our studies aim at identifying key factors in achieving large-scale business success,quantifying the spectrum availability and identifying suitable regulatory/sharing polices for large-scale secondary access in the aeronautical and radar ba...

  2. A Random Access Protocol for Pilot Allocation in Crowded Massive MIMO Systems

    Björnson, Emil; de Carvalho, Elisabeth; Sørensen, Jesper H.; Larsson, Erik G.; Popovski, Petar

    2016-01-01

    The Massive MIMO (multiple-input multiple-output) technology has a great potential to manage the rapid growth of wireless data traffic. Massive MIMO achieve tremendous spectral efficiency by spatial multiplexing of many tens of user equipments (UEs). These gains are only achieved in practice if many more UEs can connect efficiently to the network than today. As the number of UEs increases, while each UE intermittently accesses the network, the random access functionality becomes essential to ...

  3. Climate Change Denial Books and Conservative Think Tanks: Exploring the Connection.

    Dunlap, Riley E; Jacques, Peter J

    2013-06-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites. PMID:24098056

  4. Distributed Denial of Service Attacks Detection Method Based on Conditional Random Fields

    Shi-wen CHEN

    2013-04-01

    Full Text Available In order to detect distributed denial of service (DDoS attacks accurately and efficiently, a new detection model based on conditional random fields (CRF was proposed. The CRF based model incorporates the signature-based and anomaly-based detection methods to a hybrid system. The selected features include source IP entropy, destination IP entropy, source port entropy, destination port entropy, protocol number and etc. The CRF based model combines these IP flow entropies and other fingerprints into a normalize entropy as the feature vectors to depict the states of the monitoring traffic. The training method of the detection model uses the L-BFGS algorithm. And the model only needs to inspect the IP header fields of each packet, which makes it possible for real-time implementation even on real time network traffic. The CRF based model may have the ability to detect new form of forthcoming attacks, because it is independent from any specific DDoS flooding attack tools. The experiment results show that the CRF based method has higher detection accuracy and sensitivity as well as lower false positive alarms. Experiment with KDD CUP1999, DARPA 2000 and generated attack datasets, the CRF based model outperforms other well-known detection methods such as Naïve Bayes, KNN, SVM and etc. The accuracy goes beyond 95.0% and the false alarm rate is less than 5.0%. Meanwhile, the CRF based model is robust under massive background network traffic.

  5. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  6. Customized PKI for SCADA System

    Anupam Saxena

    2010-03-01

    Full Text Available Security of SCADA (supervisory Control and Data Acquisition has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure is a well known framework for securing the communication. In SCADA system, due to limited bandwidth and rare communications among some RTUs (Remote Terminal Units, there is a need of customization of general PKI which can reduce the openness of Public Key, frequent transfer of certificates and reduction in DOS (Denial of Service attacks at MTUs (Master Terminal Units and RTUs. This paper intends to address the issues of securing data over communication channel in the constrained environment and presents the novel solutions pivoted on key distribution and key management schemes. This paper also presents a set of innovative methods of multicast and broadcast of messages in SCADA system.

  7. 24 CFR 960.204 - Denial of admission for criminal activity or drug abuse by household members.

    2010-04-01

    ... activity or drug abuse by household members. 960.204 Section 960.204 Housing and Urban Development... HOUSING Admission § 960.204 Denial of admission for criminal activity or drug abuse by household members. (a) Required denial of admission—(1) Persons evicted for drug-related criminal activity. The...

  8. 42 CFR 476.93 - Opportunity to discuss proposed initial denial determination and changes as a result of a DRG...

    2010-10-01

    ... determination and changes as a result of a DRG validation. 476.93 Section 476.93 Public Health CENTERS FOR... initial denial determination and changes as a result of a DRG validation. Before a QIO reaches an initial denial determination or makes a change as a result of a DRG validation, it must— (a) Promptly notify...

  9. 42 CFR 476.85 - Conclusive effect of QIO initial denial determinations and changes as a result of DRG validations.

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.85 Section 476.85 Public Health CENTERS FOR... denial determinations and changes as a result of DRG validations. A QIO initial denial determination or change as a result of DRG validation is final and binding unless, in accordance with the procedures...

  10. 42 CFR 476.96 - Review period and reopening of initial denial determinations and changes as a result of DRG...

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.96 Section 476.96 Public Health CENTERS FOR... initial denial determinations and changes as a result of DRG validations. (a) General timeframe. A QIO or... initial denial determination or a change as a result of a DRG validation. (b) Extended timeframes. (1)...

  11. Development of measurement system for radiation effect on static random access memory based field programmable gate array

    Based on the detailed investigation in field programmable gate array(FPGA) radiation effects theory, a measurement system for radiation effects on static random access memory(SRAM)-based FPGA was developed. The testing principle of internal memory, function and power current was introduced. The hardware and software implement means of system were presented. Some important parameters for radiation effects on SRAM-based FPGA, such as configuration RAM upset section, block RAM upset section, function fault section and single event latchup section can be gained with this system. The transmission distance of the system can be over 50 m and the maximum number of tested gates can reach one million. (authors)

  12. Enhancement of Mutual Discovery, Search, and Access of Data for Users of NASA and GEOSS-Cataloged Data Systems

    Teng, W. L.; Maidment, D. R.; Rodell, M.; Strub, R. F.; Arctur, D. K.; Ames, D. P.; Vollmer, B.; Seiler, E.

    2014-12-01

    An ongoing NASA-funded project has removed a longstanding barrier to accessing NASA data (i.e., accessing archived time-step array data as point-time series) for selected variables of the North American and Global Land Data Assimilation Systems (NLDAS and GLDAS, respectively) and other EOSDIS (Earth Observing System Data Information System) data sets. These time series ("data rods") are pre-generated or generated on-the-fly (OTF), leveraging the NASA Simple Subset Wizard (SSW), a gateway to NASA data centers. Data rods Web services are accessible through the CUAHSI Hydrologic Information System (HIS) and the Goddard Earth Sciences Data and Information Services Center (GES DISC) but are not easily discoverable by users of other non-NASA data systems. The Global Earth Observation System of Systems (GEOSS) is a logical mechanism for providing access to the data rods, both pre-generated and OTF. There is an ongoing series of multi-organizational GEOSS Architecture Implementation Pilots, now in Phase-7 (AIP-7) and with a strong water sub-theme, that is aimed at the GEOSS Water Strategic Target "to produce [by 2015] comprehensive sets of data and information products to support decision-making for efficient management of the world's water resources, based on coordinated, sustained observations of the water cycle on multiple scales." The aim of this "GEOSS Water Services" project is to develop a distributed, global registry of water data, map, and modeling services catalogued using the standards and procedures of the Open Geospatial Consortium and the World Meteorological Organization. This project has already demonstrated that the GEOSS infrastructure can be leveraged to help provide access to time series of model grid information (e.g., NLDAS, GLDAS) or grids of information over a geographical domain for a particular time interval. A new NASA-funded project was begun, to expand on these early efforts to enhance the discovery, search, and access of NASA data by non

  13. Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems

    Hamza, Doha R.

    2012-04-01

    In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment (ACK) when the received packet is decoded correctly. Lack of ARQ feedback is interpreted as erroneous reception or inactivity. We call this the explicit ACK scheme. The primary receiver may also send a negative acknowledgment (NACK) when the packet is received in error. Lack of ARQ feedback is interpreted as an ACK or no-transmission. This is called the explicit NACK scheme. Under both schemes, when the primary feedback is interpreted as a NACK, the secondary user assumes that there will be retransmission in the next slot and accesses the channel with a certain probability. When the primary feedback is interpreted as an ACK, the secondary user accesses the channel with either one of two probabilities based on the sensing outcome. Under these settings, we find the three optimal access probabilities via maximizing the secondary throughput given a constraint on the primary throughput. We compare the performance of the explicit ACK and explicit NACK schemes and contrast them with schemes based on either sensing or primary ARQ feedback only. © 2012 IEEE.

  14. Performance analysis of 2D asynchronous hard-limiting optical code-division multiple access system through atmospheric scattering channel

    Zhao, Yaqin; Zhong, Xin; Wu, Di; Zhang, Ye; Ren, Guanghui; Wu, Zhilu

    2013-09-01

    Optical code-division multiple access (OCDMA) systems usually allocate orthogonal or quasi-orthogonal codes to the active users. When transmitting through atmospheric scattering channel, the coding pulses are broadened and the orthogonality of the codes is worsened. In truly asynchronous case, namely both the chips and the bits are asynchronous among each active user, the pulse broadening affects the system performance a lot. In this paper, we evaluate the performance of a 2D asynchronous hard-limiting wireless OCDMA system through atmospheric scattering channel. The probability density function of multiple access interference in truly asynchronous case is given. The bit error rate decreases as the ratio of the chip period to the root mean square delay spread increases and the channel limits the bit rate to different levels when the chip period varies.

  15. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  16. Future mobile access for open-data platforms and the BBC-DaaS system

    Edlich, Stefan; Singh, Sonam; Pfennigstorf, Ingo

    2013-03-01

    In this paper, we develop an open data platform on multimedia devices to act as marketplace of data for information seekers and data providers. We explore the important aspects of Data-as-a-Service (DaaS) service in the cloud with a mobile access point. The basis of the DaaS service is to act as a marketplace for information, utilizing new technologies and recent new scalable polyglot architectures based on NoSql databases. Whereas Open-Data platforms are beginning to be widely accepted, its mobile use is not. We compare similar products, their approach and a possible mobile usage. We discuss several approaches to address the mobile access as a native app, html5 and a mobile first approach together with the several frontend presentation techniques. Big data visualization itself is in the early days and we explore some possibilities to get big data / open data accessed by mobile users.

  17. Denial of separation anxiety as measured by a serial tachistoscopic technique.

    Rubino, I A; Grasso, S; Pezzarossa, B

    1990-12-01

    A mother-child separation stimulus was repeatedly presented by standard Defense Mechanism Test procedure, at increasing durations of tachistoscopic exposure to 60 clinical and nonclinical subjects. Subjective verbal reports were coded blindly for evidence of perceptual distortions presumably indicative of denial of separation anxiety. Low scores on two items measuring sensitivity to separation anxiety and intolerance of aloneness were, as predicted, significantly more often characterized by codings of denial on the tachistoscopic exposures than subjects with high sensitivity to separation anxiety. Stability of effect became stronger when only very low and very high scores were compared for perceptual denial on the last four presentations of the series. This technique, employing other types of anxiety-evoking stimuli, may represent a reliable instrument to reveal the presence of defences toward each of the most relevant conflictual areas of the personality. PMID:2087385

  18. Development of a secure and cost-effective infrastructure for the access of arbitrary web-based image distribution systems

    Purpose: To build an infrastructure that enables radiologists on-call and external users a teleradiological access to the HTML-based image distribution system inside the hospital via internet. In addition, no investment costs should arise on the user side and the image data should be sent renamed using cryptographic techniques. Materials and Methods: A pure HTML-based system manages the image distribution inside the hospital, with an open source project extending this system through a secure gateway outside the firewall of the hospital. The gateway handles the communication between the external users and the HTML server within the network of the hospital. A second firewall is installed between the gateway and the external users and builds up a virtual private network (VPN). A connection between the gateway and the external user is only acknowledged if the computers involved authenticate each other via certificates and the external users authenticate via a multi-stage password system. All data are transferred encrypted. External users get only access to images that have been renamed to a pseudonym by means of automated processing before. Results: With an ADSL internet access, external users achieve an image load frequency of 0.4 CT images per second. More than 90% of the delay during image transfer results from security checks within the firewalls. Data passing the gateway induce no measurable delay. (orig.)

  19. A Single Hidden Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems

    J.Preethi

    2010-07-01

    Full Text Available In this paper, we propose a single hidden layered fuzzy neural algorithm, which is able to provide a better quality of service constraints in a multi-cell scenario with three different radio access technologies (RATs namely the Universal Mobile Telecommunication Systems (UMTS, the Wireless Local Area Network (WLAN and the Global System for Mobile Telecommunication (GSM /Enhanced Data rate for GSM Evolution (EDGE Radio access Network (GERAN. This proposed algorithm works in two steps; the first step is to select a suitable combination of cells among the three different RATs. The second step chooses the most appropriate RAT to which the users can be attached and to choose the suitable bandwidth to allocate for the users. The Joint Radio Resource Management (JRRM makes use of fuzzy neural approach to manage dynamically the allocation and deallocation of the different radio resources among thedifferent radio access systems for spectrum bands allocated to each of these systems. By simulation results, we have shown that the proposed algorithm selects the most appropriate RAT in a multi-cell scenario.

  20. Professional Access 2013 programming

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  1. Holocaust Denial in Iran and anti-semitic discourse in the Muslim world

    Jahanbegloo, Ramin

    2007-01-01

    Holocaust Denial was seen in the past in relation to anti-Semitic propaganda, but in today’s world it has become a new political force in the hand of religious and radical ideologies. Raising doubts about the veracity of the Holocaust is used both as a major and integral tool of contemporary anti-Semitism and as a trend for relativism and subjectivism in historical view. The persistent Holocaust denial by the Arab and Iranian leaders in the Middle East is a new attempt to demonize the Jews. I...

  2. Giovanni: A System for Rapid Access, Visualization and Analysis of Earth Science Data Online

    Shen, S.; Rui, H.; Liu, Z.; Zhu, T.; Lu, L.; Berrick, S.; Leptoukh, G.; Teng, W.; Acker, J.; Johnson, J.

    2005-01-01

    Collecting data and understanding data structures traditionally are the first steps that a user must take, before the core investigation can begin. This is a time-consuming and challenging task, especially when science objectives require users to deal with large multi-sensor data that are usually in different formats and internal structures. The Goddard Earth Sciences Data and Information Services Center (GES DISC) has created the GES DISC Interactive Online Visualization and ANalysis Infrastructure, Giovanni, to enable Web-based visualization and analysis of satellite remotely sensed meteorological, oceanographic, and hydrologic data sets, without users having to download data. The current operational Giovanni interfaces provide the capability to process a number of important satellite measurements, such as (1) ozone and other trace gases from TOMS, OMI, HALOE, and MLS; (2) air temperature, water vapor, and geopotential height from AIRS; (3) aerosols from MODIS TerrdAqua, and GOCART model; (4) precipitation from TRMM and ground measurements; (5) chlorophyll and other ocean color products from SeaWiFS and MODIS Aqua; and (6) sea surface temperature from MODIS Aqua. Depending on the input data structure, the system provides simple statistical analysis and creates time-averaged area plot, area-averaged time series, animations, Hovmoller latitude vs. time and longitude vs. time plots, as well as vertical profiles. The inter-comparison interfaces allow a user to compare observations from different instruments, to conduct anomaly analysis, and to study basic relationships between physical parameters. Giovanni handles data with different temporal and spatial resolutions and, thus, enables both regional and global long-term climate research and short-term special events investigation, as well as data validations and assessments. Because of its simplicity of usage, Giovanni is powerful and versatile, able to assist a wide range of users, from the discipline scientists

  3. Integrating in Silico and in Vitro Approaches To Predict Drug Accessibility to the Central Nervous System.

    Zhang, Yan-Yan; Liu, Houfu; Summerfield, Scott G; Luscombe, Christopher N; Sahi, Jasminder

    2016-05-01

    Estimation of uptake across the blood-brain barrier (BBB) is key to designing central nervous system (CNS) therapeutics. In silico approaches ranging from physicochemical rules to quantitative structure-activity relationship (QSAR) models are utilized to predict potential for CNS penetration of new chemical entities. However, there are still gaps in our knowledge of (1) the relationship between marketed human drug derived CNS-accessible chemical space and preclinical neuropharmacokinetic (neuroPK) data, (2) interpretability of the selected physicochemical descriptors, and (3) correlation of the in vitro human P-glycoprotein (P-gp) efflux ratio (ER) and in vivo rodent unbound brain-to-blood ratio (Kp,uu), as these are assays routinely used to predict clinical CNS exposure, during drug discovery. To close these gaps, we explored the CNS druglike property boundaries of 920 market oral drugs (315 CNS and 605 non-CNS) and 846 compounds (54 CNS drugs and 792 proprietary GlaxoSmithKline compounds) with available rat Kp,uu data. The exact permeability coefficient (Pexact) and P-gp ER were determined for 176 compounds from the rat Kp,uu data set. Receiver operating characteristic curves were performed to evaluate the predictive power of human P-gp ER for rat Kp,uu. Our data demonstrates that simple physicochemical rules (most acidic pKa ≥ 9.5 and TPSA < 100) in combination with P-gp ER < 1.5 provide mechanistic insights for filtering BBB permeable compounds. For comparison, six classification modeling methods were investigated using multiple sets of in silico molecular descriptors. We present a random forest model with excellent predictive power (∼0.75 overall accuracy) using the rat neuroPK data set. We also observed good concordance between the structural interpretation results and physicochemical descriptor importance from the Kp,uu classification QSAR model. In summary, we propose a novel, hybrid in silico/in vitro approach and an in silico screening model for the

  4. Dispersion-flattened-fiber based optical thresholder for multiple-access-interference suppression in OCDMA system.

    Wang, Xu; Hamanaka, Taro; Wada, Naoya; Kitayama, Ken-Ichi

    2005-07-11

    An optical thresholding technique based on super-continuum generation in dispersion flattened fiber is proposed and experimentally demonstrated to enable data-rate detection in optical code division multiple access networks. The proposed scheme exhibits an excellent discrimination between a desired signal and interference signals with features of pulse reshaping, low insertion loss, polarization independency as well as reasonable operation power. PMID:19498545

  5. Flexible OFDM-based access systems with intrinsic function of chromatic dispersion compensation

    Konishi, Tsuyoshi; Murakawa, Takuya; Nagashima, Tomotaka; Hasegawa, Makoto; Shimizu, Satoshi; Hattori, Kuninori; Okuno, Masayuki; Mino, Shinji; Himeno, Akira; Uenohara, Hiroyuki; Wada, Naoya; Cincotti, Gabriella

    2015-12-01

    Cost-effective and tunable chromatic dispersion compensation in a fiber link are still an open issue in metro and access networks to cope with increasing costs and power consumption. Intrinsic chromatic dispersion compensation functionality of optical fractional orthogonal frequency division multiplexing is discussed and experimentally demonstrated using dispersion-tunable transmitter and receiver based on wavelength selective switching devices.

  6. Widened Participation and Unequal Access to the System of Higher Education in Denmark

    Munk, Martin D.; Thomsen, Jens Peter

    This paper deals with access to Higher Education (HE), more specifically with social differentiation within Danish university field of studies and institutions. We use Danish register data and investigate choice of field of study and choice of university institution while controlling for a range of...

  7. 77 FR 65260 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    2012-10-26

    ... disability would thus be required to have an iPhone, iPad, or other Apple device in order to access the book... sale through its ``App Store,'' the only authorized source of iPhone and iPad applications. EFF further...--i.e., used (or perhaps unused) phones previously purchased or otherwise acquired by a...

  8. Instant Access in Forensics: Issues Created by the Internet and Electronic Information Systems in Forensic Competition.

    Scott, Shannon

    Although technology has created endless benefits for society, these benefits are accompanied by increased responsibilities and dangers. On-line research and the internet have completely altered the surface of forensics. Advantages of using the internet are the access to a wealth of information, which could constitute an equalizer for smaller…

  9. Resistance to Penicillium allii in accessions from a National Plant Germplasm System Allium collection.

    Accessions of Allium sativum (garlic), A. ampeloprasum (elephant garlic) and A. acuminatum, A. aflatunense, A. atroviolaceum, A. canadense, A. longicuspis, A. moly, A. ponticum, A. roseum, A. scorodoprasum, A. senescens, A. stipitatum, and Allium sp. (wild or ornamental species) were screened for re...

  10. A New Performance Analysis Method of Optical Code Division Multiple Access Systems with An Optical Hard-Limiter

    2001-01-01

    A new performance analysis method of Optical Code Division Multiple Access (OCDMA) systems with an optical hard-limiter is studied. The bit error probability of the OCDMA system is derived, and the numerical results of the system with and without an ideal optical hard-limiter are analyzed respectively. The results show that although the derived expression is different from the one derived by J A Salehi[1], the numerical results are the same as those analyzed by J A Salehi, and the numerical result can be easily achieved in this expression.

  11. Performance Analysis of Global Search Algorithm Based Multiuser Detector for Multi Carrier Code Division Multiple Access System under Clipping Noise

    S. Sivanesskumar

    2011-01-01

    Full Text Available Problem statement: Multi Carrier Code Division Multiple Access (MC-CDMA, a promising technology for the 4G communication systems. The major limitation of MC-CDMA system is the Multiple Access Interference (MAI which is due to near-far effect, frequency offset and nonlinear power amplification due to clipping noise. Approach: The performance of MC-CDMA under clipping noise using Global search algorithm based Multiuser detector in AWGN, Rayleigh and Rician channel is analyzed in this study. Results: The proposed method is simulated using BPSK modulation, Walsh spreading code, number of subcarriers 64 and number of users 16 and clipping noise. Conclusion: By simulation result, BER in AWGN channel outperforms other channels as SNR is increased. The performance of Rician fading channel is better than that of Rayleigh fading channel, because of the LOS path.

  12. Electrical Spreading Code-Based OFDM Optical Access Networks for Budget Enhancement and Reduced System Bandwidth Requirement

    Kumar, Pravindra; Srivastava, Anand

    2015-12-01

    Passive optical networks based on orthogonal frequency division multiplexing (OFDM-PON) give better performance in high-speed optical access networks. For further improvement in performance, a new architecture of OFDM-PON based on spreading code in electrical domain is proposed and analytically analyzed in this paper. This approach is referred as hybrid multi-carrier code division multiple access-passive optical network (MC-CDMA-PON). Analytical results show that at bit error rate (BER) of 10-3, there is 9.4 dB and 14.2 dB improvement in optical power budget for downstream and upstream, respectively, with MC-CDMA-PON system as compared to conventional OFDM-PON system for the same number of optical network units (ONUs).

  13. A dual track system to give more-rapid access to new drugs: applying a systems mindset to the US food and drug administration (FDA).

    Madden, Bartley J

    2009-02-01

    A widely applicable lesson learned from systems analysis is that a proposed change should always be studied in terms of value to the customer and not a gain in efficiency of any particular component of the system. A systems mindset reveals invalid assumptions that have caused the FDA to substitute its own needs for the needs of its customers (patients). Further, the key constraint to overall system improvement is the lack of consumer choice and competition due to FDA's monopoly over access to drugs. Therefore, we need legislation to implement a proposed dual track system for access to drugs that have successfully passed Phase I safety trials. On one track, an experimental drug would continue with conventional FDA clinical trials. On a new, free-to-choose track, patients, advised by their doctors, would make informed decisions about immediate access to not-yet-approved drugs. Internet access to a government-operated tradeoff evaluation database would provide patients and doctors with up-to-date information on all drug treatment outcomes for both tracks. Dual tracking is a dynamic process that overcomes the limitations of a static FDA regulatory process that ignores individual risk preferences. PMID:19036524

  14. Performance Analysis of Multiple Access 60 GHz System Using Frequency-shifted Gaussian Pulse and Non-carrier PSWF Pulse

    Hao Zhang; Wei Shi; Tingting Lu; Jingjing Wang; Xinjie Wang

    2013-01-01

    In this paper, a kind of impulse radio (IR) 60 GHz pulse based on Prolate Spheroidal Wave Functions (PSWF) is proposed. The capacity and performance for multiple access 60 GHz communication system based on carrier pulse and impulse radio pulse are analyzed separately. Both frequency-shifted Gaussian pulse and Prolate Spheroidal Wave Functions (PSWF) pulse are considered and devised according to the federal communication commission (FCC) power constraints. Pulse position modulation (PPM) with ...

  15. Internet access to the web resources of a geographically distributed system of near-and deep-space monitoring

    Chernenkov, V. N.; Vitkovskij, V. V.; Kalinina, N. A.

    2007-12-01

    The state and speed characteristics of Web access to the first five nodes of the projected geographically distributed system of scientific monitoring of near and deep space are analyzed. The possibility of developing an architecture involving user query redirection to a caching server is studied. This will make it possible to relieve hardware communication links substantially and speed up HTTP connection time, especially for nodes linked via heavily congested Internet links.

  16. Enabling clean access into Subglacial Lake Whillans: development and use of the WISSARD hot water drill system.

    Rack, Frank R

    2016-01-28

    Clean hot water drill systems (CHWDSs) are used with clean access protocols for the exploration of subglacial lakes and other subglacial aquatic environments (e.g. ice-shelf cavities) in Antarctica. A CHWDS developed for the Whillans Ice Stream Subglacial Access Research Drilling (WISSARD) project by the Science Management Office at the University of Nebraska-Lincoln (UNL-SMO), USA, was specifically designed for use in West Antarctica, where the US Antarctic Program's South Pole Traverse could assist with logistical support. The initial goal was to provide clean access holes through ice up to 1000 m thick following environmental stewardship guidelines; however, the existing design allows this CHWDS to be used for ice thicknesses up to 2000 m following modifications to accommodate longer hose lengths. In January 2013, the WISSARD CHWDS successfully provided for the first time a clean access borehole through 800 m of ice into Subglacial Lake Whillans beneath the West Antarctic Ice Sheet for the deployment of scientific instruments and sampling tools. The development and initial use of the WISSARD CHWDS required the project team to address a number of constraints while providing contingencies to meet the defined project scope, schedule and budget. PMID:26667915

  17. 门禁系统在博物馆的应用%Application of Access Control Systems in Museums

    王振

    2015-01-01

    在数字技术网络技术飞速发展的今天门禁技术得到了迅猛的发展。门禁系统早已超越了单纯的门道及钥匙管理,它已经逐渐发展成为一套完整的出入管理系统。它在工作环境安全、人事考勤管理等行政管理工作中发挥着巨大的作用。本文就门禁系统在博物馆的应用进行分析研究。%got rapid development in the rapid development of digital technology, network technology today access technology. Access control systems have already gone beyond the simple road and key management, it has gradual y developed into a complete access control system. It plays a great role in administrative work environment safety, personnel at endance management etc. In this paper, the museum entrance guard system in the research on the application of.

  18. Android Access Control Extension

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  19. FRAMES-2.0 Software System: Providing Password Protection and Limited Access to Models and Simulations

    One of the most important concerns for regulatory agencies is the concept of reproducibility (i.e., reproducibility means credibility) of an assessment. One aspect of reproducibility deals with tampering of the assessment. In other words, when multiple groups are engaged in an assessment, it is important to lock down the problem that is to be solved and/or to restrict the models that are to be used to solve the problem. The objective of this effort is to provide the U.S. Nuclear Regulatory Commission (NRC) with a means to limit user access to models and to provide a mechanism to constrain the conceptual site models (CSMs) when appropriate. The purpose is to provide the user (i.e., NRC) with the ability to ''lock down'' the CSM (i.e., picture containing linked icons), restrict access to certain models, or both.

  20. Use of Data Denial Experiments to Evaluate ESA Forecast Sensitivity Patterns

    Zack, J; Natenberg, E J; Knowe, G V; Manobianco, J; Waight, K; Hanley, D; Kamath, C

    2011-09-13

    wind speed and vertical temperature difference. Ideally, the data assimilation scheme used in the experiments would have been based upon an ensemble Kalman filter (EnKF) that was similar to the ESA method used to diagnose the Mid-Colombia Basin sensitivity patterns in the previous studies. However, the use of an EnKF system at high resolution is impractical because of the very high computational cost. Thus, it was decided to use the three-dimensional variational analysis data assimilation that is less computationally intensive and more economically practical for generating operational forecasts. There are two tasks in the current project effort designed to validate the ESA observational system deployment approach in order to move closer to the overall goal: (1) Perform an Observing System Experiment (OSE) using a data denial approach which is the focus of this task and report; and (2) Conduct a set of Observing System Simulation Experiments (OSSE) for the Mid-Colombia basin region. The results of this task are presented in a separate report. The objective of the OSE task involves validating the ESA-MOOA results from the previous sensitivity studies for the Mid-Columbia Basin by testing the impact of existing meteorological tower measurements on the 0- to 6-hour ahead 80-m wind forecasts at the target locations. The testing of the ESA-MOOA method used a combination of data assimilation techniques and data denial experiments to accomplish the task objective.