WorldWideScience

Sample records for access control framework

  1. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  2. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  3. An Access Control Model for the Uniframe Framework

    Science.gov (United States)

    2005-05-01

    is called active software capabilities framework ( ASCap ) that centers around the idea of a policy object, which instead of being embedded into the...access control component, is delivered by the client. The client firsts requests an ASCap (policy object) from the security server. Then the client...and the object server both must instantiate proxies. The client ASCap proxy may then request additional credentials from other servers which may

  4. A threat intelligence framework for access control security in the oil industry

    Science.gov (United States)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  5. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  6. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  7. Minor access control of Hong Kong under the Framework Convention on Tobacco Control.

    Science.gov (United States)

    Kan, Ming-yue; Lau, Maggie

    2010-05-01

    Asia's tobacco control movement was strengthened owing to the need to fulfill the Framework Convention on Tobacco Control (FCTC). The present study aims to assess the compliance rates of tobacco retailers to the law forbidding the sales of tobacco to minors in Hong Kong before and after the growth of the tobacco control movement brought by the enactment of the newly amended tobacco control law with effect from 2007. The legislation was enacted to fulfill the FCTC. Two waves of territory-wide compliance checks conducted in 2006 and 2008 were compared. The compliance check was conducted using Standard Protocol. The overall compliance rate was still low though it increased from 18.9% in 2006 to 27.0% in 2008. The compliance rate of convenience stores and newspaper stands improved whereas the rate for restaurants, grocery stores and petrol stations worsened. Less tobacco retailing outlets displayed a specified warning sign required in 2008 (33.7%) comparing to 2006 (41.4%). The indoor smoking ban of the FCTC unintentionally changed the cigarette retailing landscape and finally improved the compliance rate. The case study also demonstrated that the Asia region still has much room for improvement in fulfilling the FCTC in term of effective implementation and enforcement. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  8. Towards a Uniform Framework for Dynamic Analysis of Access Control Models

    OpenAIRE

    Amthor, Peter

    2017-01-01

    Security-critical system requirements are increasingly enforced through mandatory access control systems. These systems are controlled by security policies, highly sensitive system components, which emphasizes the paramount importance of formally verified security properties regarding policy correctness. For the class of safety-properties, addressing potential dynamic right proliferation, a number of known and tested formal analysis methods and tools already exist. Unfortunately, these method...

  9. Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment

    Directory of Open Access Journals (Sweden)

    Shalini Bhartiya

    2017-10-01

    Full Text Available Interoperability in healthcare environment deals with sharing of patient’s Electronic Health Records (EHR with fellow professionals in inter as well as intra departments or organizations. Healthcare environment experiences frequent shifting of doctors, paramedical staff in inter as well as intra departments or hospitals. The system exhibits dynamic attributes of users and resources managed through access control policies defined for that environment. Rules obtained on merging of such policies often generate policy-conflicts thereby resulting in undue data leakages to unintended users. This paper proposes an access control framework that applies a Hierarchy Similarity Analyzer (HSA on the policies need to be merged. It calculates a Security_Level (SL and assigns it to the users sharing data. The SL determines the authorized amount of data that can be shared on successful collaboration of two policies. The proposed framework allows integration of independent policies and identifies the possible policy-conflicts arising due to attribute disparities in defined rules. The framework is implemented on XACML policies and compared with other access models designed using centralized and decentralized approaches. Conditional constraints and properties are defined that generate policy-conflicts as prevalent in the policies.

  10. A Framework for Concrete Reputation-Systems with Applications to History-Based Access Control

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian; Nielsen, Mogens; Sassone, Vladimiro

    2005-01-01

    In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction. However, while trust management is a component in security decision-making, many existing reputation......-based trust-management systems provide no formal security-guarantees. In this extended abstract, we describe a mathematical framework for a class of simple reputation-based systems. In these systems, decisions about interaction are taken based on policies that are exact requirements on agents' past histories...

  11. Controlling Access to RDF Graphs

    Science.gov (United States)

    Flouris, Giorgos; Fundulaki, Irini; Michou, Maria; Antoniou, Grigoris

    One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.

  12. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  13. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    Science.gov (United States)

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  14. Health access livelihood framework reveals potential barriers in the control of schistosomiasis in the Dongting Lake area of Hunan Province, China.

    Directory of Open Access Journals (Sweden)

    Julie Balen

    Full Text Available Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China, considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis.Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care.We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed.There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached.

  15. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    . Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  16. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  17. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  18. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  19. Access control Tutorial 5

    CERN Document Server

    CERN. Geneva; Oberknapp, Bernd

    2007-01-01

    This tutorial will review current access management technologies and invite participants to discuss use cases and requirements for access management, particularly with respect to scholarly archives and their users. The presenters will describe the concepts and architecture of Federated Access Management (FAM) with reference to some large-scale federation implementations, and discuss the challenges faced particularly in Identity Management by academic institutions. The tutorial will include a practical demonstration of how FAM can be applied to an Open Archive repository.

  20. SIDECACHE: Information access, management and dissemination framework for web services

    Directory of Open Access Journals (Sweden)

    Robbins Kay A

    2011-06-01

    Full Text Available Abstract Background Many bioinformatics algorithms and data sets are deployed using web services so that the results can be explored via the Internet and easily integrated into other tools and services. These services often include data from other sites that is accessed either dynamically or through file downloads. Developers of these services face several problems because of the dynamic nature of the information from the upstream services. Many publicly available repositories of bioinformatics data frequently update their information. When such an update occurs, the developers of the downstream service may also need to update. For file downloads, this process is typically performed manually followed by web service restart. Requests for information obtained by dynamic access of upstream sources is sometimes subject to rate restrictions. Findings SideCache provides a framework for deploying web services that integrate information extracted from other databases and from web sources that are periodically updated. This situation occurs frequently in biotechnology where new information is being continuously generated and the latest information is important. SideCache provides several types of services including proxy access and rate control, local caching, and automatic web service updating. Conclusions We have used the SideCache framework to automate the deployment and updating of a number of bioinformatics web services and tools that extract information from remote primary sources such as NCBI, NCIBI, and Ensembl. The SideCache framework also has been used to share research results through the use of a SideCache derived web service.

  1. Framework for control system development

    International Nuclear Information System (INIS)

    Cork, C.; Nishimura, Hiroshi

    1992-01-01

    Control systems being developed for the present generation of accelerators will need to adapt to changing machine and operating state conditions. Such systems must also be capable of evolving over the life of the accelerator operation. In this paper we present a framework for the development of adaptive control systems

  2. Service-Oriented Access Control

    Science.gov (United States)

    2014-09-01

    backbone. A battalion may use this approach in conducting digital communications exercises , where the unit establishes this network test its digital...derivation, third scenario . . . . . . . . 60 ix THIS PAGE INTENTIONALLY LEFT BLANK x List of Acronyms and Abbreviations ACL access control list BGP...configuration, access control list ( ACL ) placement, or routing design). Changing the network’s logical organization affects how data flows in a

  3. The Joint COntrols Project Framework

    CERN Document Server

    González-Berges, M

    2003-01-01

    The Framework is one of the subprojects of the Joint COntrols Project (JCOP), which is collaboration between the four LHC experiments and CERN. By sharing development, this will reduce the overall effort required to build and maintain the experiment control systems. As such, the main aim of the Framework is to deliver a common set of software components, tools and guidelines that can be used by the four LHC experiments to build their control systems. Although commercial components are used wherever possible, further added value is obtained by customisation for HEP-specific applications. The supervisory layer of the Framework is based on the SCADA tool PVSS, which was selected after a detailed evaluation. This is integrated with the front-end layer via both OPC (OLE for Process Control), an industrial standard, and the CERN-developed DIM (Distributed Information Management System) protocol. Several components are already in production and being used by running fixed-target experiments at CERN as well as for th...

  4. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  5. Forum on Implementing Accessibility Frameworks for ALL Students

    Science.gov (United States)

    Warren, S.; Christensen, L.; Chartrand, A.; Shyyan, V.; Lazarus, S.; Thurlow, M.

    2015-01-01

    Sixty individuals representing staff from state departments of education, school districts, other countries, testing and testing-related companies, and other educational organizations participated in a forum on June 22, 2015 in San Diego, California, to discuss implementing accessibility frameworks for all students, including students in general…

  6. Framework for monitoring equity in access and health systems ...

    African Journals Online (AJOL)

    ART programmes should therefore be developed and expanded in ways that will not aggravate inequities or result in the inappropriate withdrawal of resources from other health interventions or from other parts of the health system. This paper, proposes a framework for monitoring equity in access and health systems issues ...

  7. A theoretical framework for an access programme encompassing ...

    African Journals Online (AJOL)

    A theoretical framework for an access programme encompassing further education training: remedy for educational wastage? ... learners who have dropped out of school without completing their secondary-school education, there are the special needs of adult learners in the workplace that must be taken into consideration.

  8. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  9. Controlling Access to Suicide Means

    Science.gov (United States)

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  10. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  11. Controlling access to suicide means.

    Science.gov (United States)

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-12-01

    Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords "suicide means", "suicide method", "suicide prediction" or "suicide prevention" and other relevant keywords. A number of factors may influence an individual's decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing "safe rooms" in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  12. A Conceptual Framework of Mapping Access to Health Care across EU Countries: The Patient Access Initiative.

    Science.gov (United States)

    Souliotis, Kyriakos; Hasardzhiev, Stanimir; Agapidaki, Eirini

    Research evidence suggests that access to health care is the key influential factor for improved population health outcomes and health care system sustainability. Although the importance of addressing barriers in access to health care across European countries is well documented, little has been done to improve the situation. This is due to different definitions, approaches and policies, and partly due to persisting disparities in access within and between European countries. To bridge this gap, the Patient Access Partnership (PACT) developed (a) the '5As' definition of access, which details the five critical elements (adequacy, accessibility, affordability, appropriateness, and availability) of access to health care, (b) a multi-stakeholders' approach for mapping access, and (c) a 13-item questionnaire based on the 5As definition in an effort to address these obstacles and to identify best practices. These tools are expected to contribute effectively to addressing access barriers in practice, by suggesting a common framework and facilitating the exchange of knowledge and expertise, in order to improve access to health care between and within European countries. © 2016 S. Karger AG, Basel.

  13. Access Control based on Attribute Certificates for Medical Intranet Applications

    Science.gov (United States)

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  14. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  15. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  16. Smart Contract-Based Access Control for the Internet of Things

    OpenAIRE

    Zhang, Yuanyu; Kasahara, Shoji; Shen, Yulong; Jiang, Xiaohong; Wan, Jianxiong

    2018-01-01

    This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-object pair, and implements both static access right validation based on predefined policies and dynami...

  17. Review of SDDOT's highway access control process

    Science.gov (United States)

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  18. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  19. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  20. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  1. COSO internal control integrated framework 2013

    CERN Document Server

    American Institute of Certified Public Accountants

    2013-01-01

    Issued by the Committee of Sponsoring Organizations of the Treadway Commission (COSO), the 2013 Internal Control – Integrated Framework(Framework) is expected to help organizations design and implement internal control in light of many changes in business and operating environments since the issuance of the original Framework in 1992. The new Framework retains the core definition of internal control and the five components of internal control, and it continues to emphasize the importance of management judgment in designing, implementing, and conducting a system of internal control, and in assessing its effectiveness. It broadens the application of internal control in addressing operations and reporting objectives, and clarifies the requirements for determining what constitutes effective internal control.

  2. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  3. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  4. A Framework for Multi Robot Guidance Control

    Science.gov (United States)

    Keskin, Onur; Uyar, Erol

    In this paper we present a framework for path planning and path finding for multiple mobile robots with global vision. Our framework model considers the agents’ dynamic status and their environment with obstacles to perform given tasks. The global vision system provides feedback to main controller computer and mobile robots are directed towards to their tasks with avoiding obstacles and without any collision. Different kinds of scenario are prepared to simulate manipulating tasks and non-collision behavior with our framework. Experiment results with Lego Mindstorms NXT shows that our framework can be used where a multi robot system is needed with minimum resources.

  5. A Component-Based Access Control Monitor

    Science.gov (United States)

    Liu, Zhiming; Morisset, Charles; Stolz, Volker

    A control of access to information is increasingly becoming necessary as the systems managing this information is more and more open and available through non secure networks. Integrating an access control monitor within a large system is a complex task, since it has to be an "all or nothing" integration. The least error or mistake could lead to jeopardize the whole system. We present a formal specification of an access control monitor using the calculus of refinement of component and object systems (rCOS). We illustrate this implementation with the well known Role Based Access Control (RBAC) policy and we show how to integrate it within a larger system. Keywords: Component, Access Control, RBAC, Composition

  6. Adaptive Feedfoward Feedback Control Framework Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An Adaptive Feedforward and Feedback Control (AFFC) Framework is proposed to suppress the aircraft's structural vibrations and to increase the resilience of the...

  7. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  8. A Framework for Collateral Risk Control Determination

    OpenAIRE

    Didier Cossin; Zhijiang Huang; Daniel Aunon-Nerin; Fer nando González

    2002-01-01

    This paper derives a general framework for collateral risk control determination in repurchase transactions or repos. The objective is to treat consistently heterogeneous collateral so that the collateral taker has a similar risk exposure whatever the collateral pledged. The framework measures the level of risk with the probability of incurring a loss higher than a pre-specified level given two well-known parameters used to manage the intrinsic risk of collateral: marking to market and haircu...

  9. GLOBAL FRAMEWORK CONVENTION ON TOBACCO CONTROL ...

    African Journals Online (AJOL)

    At the World Health Assembly in May 2003 the. Member States of the World Health Organization. (WHO) have agreed on a groundbreaking public health treaty to control tobacco supply and consumption. The text of the WHO Framework. Convention on Tobacco Control (FCTC) covers tobacco taxation, smoking prevention ...

  10. AFECS. multi-agent framework for experiment control systems

    International Nuclear Information System (INIS)

    Gyurjyan, V; Abbott, D; Heyes, G; Jastrzembski, E; Timmer, C; Wolin, E

    2008-01-01

    AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC

  11. AFECS. Multi-Agent Framework for Experiment Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Vardan Gyurjyan; David Abbott; William Heyes; Edward Jastrzembski; Carl Timmer; Elliott Wolin

    2008-01-23

    AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC.

  12. Proximity Displays for Access Control

    Science.gov (United States)

    2012-09-01

    to evaluate the appropriateness of an ac- cess once all the facts are known. As Blakely suggests, “make users ask forgiveness, not permission” [18...control designed for individuals at the endpoints. 138 In Proceedings of the workshop on New security paradigms workshop, 2009. 2.3.1 [51] Sara Kaemer...factors in computing systems, 2010. 8.2 141 [89] Sara Sinclaire, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, and Anthony Portera. Information

  13. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  14. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  15. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  16. [Towards a theoretical framework for rethinking cultural accessibility].

    Science.gov (United States)

    Landini, Fernando; Cowes, Valeria González; D'Amore, Eliana

    2014-02-01

    Health services accessibility is a key health policy issue. However, few in-depth studies have addressed it theoretically. Most distinguish between availability, accessibility, and acceptability, or between geographic, financial, administrative, and cultural accessibility. We discuss and analyze the concept of accessibility as conflictive articulation between supply and demand in health. The article addresses the importance of cultural accessibility, rethinking it as a social interface, i.e., a social arena with clashing worldviews (namely, those of physicians and patients). The approach sheds light on the complex processes of grasping, translating, and reshaping knowledge and recommendations within such interaction.

  17. Solving transactional control in current management frameworks

    OpenAIRE

    Roque, Vitor; Oliveira, José Luís; Lopes, Rui Pedro

    2004-01-01

    Policy Based Network Management has been presented as a paradigm for efficient and customisable management systems. The IETF has provided a framework to describe the concept but some aspects still open like transactional control. In fact transactional control mechanisms are receiving today great attention in the scope of network management. In here, we identify the lacks of current management paradigms concerning transactional control and we propose a policy-based network manageme...

  18. Solving Transactional Control in Current Management Frameworks

    OpenAIRE

    Roque, Vítor

    2004-01-01

    Policy Based Network Management has been presented as a paradigm for efficient and customisable management systems. The IETF has provided a framework to describe the concept but some aspects still open like transactional control. In fact transactional control mechanisms are receiving today great attention in the scope of network management. In here, we identify the lacks of current management paradigms concerning transactional control and we propose a policy-based network management system th...

  19. A Robust Control Framework for Malware Filtering

    OpenAIRE

    Bloem, Michael; Alpcan, Tansu; Basar, Tamer

    2009-01-01

    We study and develop a robust control framework for malware filtering and network security. We investigate the malware filtering problem by capturing the tradeoff between increased security on one hand and continued usability of the network on the other. We analyze the problem using a linear control system model with a quadratic cost structure and develop algorithms based on H infinity-optimal control theory. A dynamic feedback filter is derived and shown via numerical analysis to be an impro...

  20. Television White Space (TVWS) Access Framework for Developing Regions

    CSIR Research Space (South Africa)

    Masonta, MT

    2013-09-01

    Full Text Available Region (SADC). The framework is based on the co-evolution process which defines three key domains of change or external forces in the wireless communications environment: policy/regulation, technology, and business sector. This framework can be used as a...

  1. Cryptographically Enforced Distributed Data Access Control

    NARCIS (Netherlands)

    Ibraimi, L.

    2011-01-01

    Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is

  2. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  3. Policy framework for utilisation. A pillar of better accessibility

    International Nuclear Information System (INIS)

    2008-01-01

    The goals and frameworks for traffic and transport policy for the Netherlands to 2020 are described in the Mobility Document. Whereas government policy previously viewed mobility as a problem or as something permissible, the assumption is now that mobility is a must. Mobility, for people as well as goods, is a prerequisite for society and the economy to function well. The Mobility Document contains ambitious goals to deal with current and anticipated traffic and transport problems: door to door, faster, cleaner and safer. Three interrelated pillars are to help achieve these goals: Building, Pricing and Utilisation. Work is being done on the Building and Pricing pillars; Utilisation is elaborated further in this policy framework. The Policy Framework for Utilisation is an elaboration of the Mobility Document for the 2008-2020 period and aims for faster, cleaner, safer travel from door to door. The purpose of this policy framework is to describe the direction of development of utilisation, in terms of content as well as process, to indicate actions that are required and to provide perspective on the expected effects. The policy framework is in line with current developments or plans, caters to new opportunities (technological and otherwise), encourages the innovative potential of the market and provides room for joint ventures between the government and the market. It will result in actions for the short term and provide direction for activities and developments for the longer term

  4. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  5. Remote Access of Computer Controlled Experiments

    Directory of Open Access Journals (Sweden)

    Kristian Nilsson

    2008-11-01

    Full Text Available Abstract—in this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program. In this way, the solution is not dependent on the specific laboratory equipment, as long as the equipment can be remotely controlled. The system can easily be altered to be used in another laboratory setup. Students are able to make reservations of experiment sessions through a web interface, which is administrated by the system administrator. The solution proposed in this paper is one way to speed up the development of remote accessible laboratories. Most of the proposed solution is based on open source software and the hardware is built on ordinary consumer parts, which makes the proposed remote laboratory architecture cost effective.

  6. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  7. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...

  8. Adaptive spectrum decision framework for heterogeneous dynamic spectrum access networks

    CSIR Research Space (South Africa)

    Masonta, M

    2015-09-01

    Full Text Available proposes an adaptive spectrum decision framework (ASDF) which is a channel allocation scheme that selects suitable channels from a list of available channels based on SU preferred options. The scheme relies on a geo-location spectrum database...

  9. A Framework for Transparently Accessing Deep Web Sources

    Science.gov (United States)

    Dragut, Eduard Constantin

    2010-01-01

    An increasing number of Web sites expose their content via query interfaces, many of them offering the same type of products/services (e.g., flight tickets, car rental/purchasing). They constitute the so-called "Deep Web". Accessing the content on the Deep Web has been a long-standing challenge for the database community. For a user interested in…

  10. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  11. Equitable Access by Design. A Conceptual Framework for Integrated Student Supports within Linked Learning Pathways

    Science.gov (United States)

    de Velasco, Jorge Ruiz; Newman, Elizabeth; Borsato, Graciela

    2016-01-01

    This report proposes a conceptual framework for defining and implementing a system of integrated student supports that provides equitable access to college and career readiness via Linked Learning pathways in high schools. The framework emphasizes the central commitment of the Linked Learning approach to challenge prevailing norms of…

  12. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M [Knoxville, TN

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  13. Interaction framework for loosely-coupled controllers

    DEFF Research Database (Denmark)

    Falsig, Simon

    2011-01-01

    of these are illustrated; for instance tightly-coupled structures and protocols and a lack of clear interfaces and documentation. A look is taken at some existing architectures for robot controllers, but as these describe widely varying concepts of the controller (ranging between hardware, software and data...... of programmable logic for flexible interfacing. The terms used to describe the various core aspects of the Node-on-Chip architecture are fully defined and arranged into taxonomies, to help provide a consistent vocabulary for work in robotic controllers. The TosNet protocol, network and framework are presented...... that do not need the distributed functionality of the full TosNet network, a scaled-down, single-node version, µTosNet, is also presented. To make sure that TosNet works in “real” robots, and to provide a number of demonstrations of what it actually does, three existing robots at Robolab, the Mini...

  14. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  15. What is access to radiation therapy? A conceptual framework and review of influencing factors.

    Science.gov (United States)

    Sundaresan, Puma; Stockler, Martin R; Milross, Christopher G

    2016-02-01

    Optimal radiation therapy (RT) utilisation rates (RURs) have been defined for various cancer indications through extensive work in Australia and overseas. These benchmarks remain unrealised. The gap between optimal RUR and actual RUR has been attributed to inadequacies in 'RT access'. We aimed to develop a conceptual framework for the consideration of 'RT access' by examining the literature for existing constructs and translating it to the context of RT services. We further aimed to use this framework to identify and examine factors influencing 'RT access'. Existing models of health care access were reviewed and used to develop a multi-dimensional conceptual framework for 'RT access'. A review of the literature was then conducted to identify factors reported to affect RT access and utilisation. The electronic databases searched, the host platform and date range of the databases searched were Ovid MEDLINE, 1946 to October 2014 and PsycINFO via OvidSP,1806 to October 2014. The framework developed demonstrates that 'RT access' encompasses opportunity for RT as well as the translation of this opportunity to RT utilisation. Opportunity for RT includes availability, affordability, adequacy (quality) and acceptability of RT services. Several factors at the consumer, referrer and RT service levels affect the translation of this opportunity for RT to actual RT utilisation. 'Access' is a term that is widely used in the context of health service related research, planning and political discussions. It is a multi-faceted concept with many descriptions. We propose a conceptual framework for the consideration of 'RT access' so that factors affecting RT access and utilisation may be identified and examined. Understanding these factors, and quantifying them where possible, will allow objective evaluation of their impact on RT utilisation and guide implementation of strategies to modify their effects.

  16. Access to primary health care services for Indigenous peoples: A framework synthesis.

    Science.gov (United States)

    Davy, Carol; Harfield, Stephen; McArthur, Alexa; Munn, Zachary; Brown, Alex

    2016-09-30

    Indigenous peoples often find it difficult to access appropriate mainstream primary health care services. Securing access to primary health care services requires more than just services that are situated within easy reach. Ensuring the accessibility of health care for Indigenous peoples who are often faced with a vast array of additional barriers including experiences of discrimination and racism, can be complex. This framework synthesis aimed to identify issues that hindered Indigenous peoples from accessing primary health care and then explore how, if at all, these were addressed by Indigenous health care services. To be included in this framework synthesis papers must have presented findings focused on access to (factors relating to Indigenous peoples, their families and their communities) or accessibility of Indigenous primary health care services. Findings were imported into NVivo and a framework analysis undertaken whereby findings were coded to and then thematically analysed using Levesque and colleague's accessibility framework. Issues relating to the cultural and social determinants of health such as unemployment and low levels of education influenced whether Indigenous patients, their families and communities were able to access health care. Indigenous health care services addressed these issues in a number of ways including the provision of transport to and from appointments, a reduction in health care costs for people on low incomes and close consultation with, if not the direct involvement of, community members in identifying and then addressing health care needs. Indigenous health care services appear to be best placed to overcome both the social and cultural determinants of health which hamper Indigenous peoples from accessing health care. Findings of this synthesis also suggest that Levesque and colleague's accessibility framework should be broadened to include factors related to the health care system such as funding.

  17. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  18. An autonomous control framework for advanced reactors

    Directory of Open Access Journals (Sweden)

    Richard T. Wood

    2017-08-01

    Full Text Available Several Generation IV nuclear reactor concepts have goals for optimizing investment recovery through phased introduction of multiple units on a common site with shared facilities and/or reconfigurable energy conversion systems. Additionally, small modular reactors are suitable for remote deployment to support highly localized microgrids in isolated, underdeveloped regions. The long-term economic viability of these advanced reactor plants depends on significant reductions in plant operations and maintenance costs. To accomplish these goals, intelligent control and diagnostic capabilities are needed to provide nearly autonomous operations with anticipatory maintenance. A nearly autonomous control system should enable automatic operation of a nuclear power plant while adapting to equipment faults and other upsets. It needs to have many intelligent capabilities, such as diagnosis, simulation, analysis, planning, reconfigurability, self-validation, and decision. These capabilities have been the subject of research for many years, but an autonomous control system for nuclear power generation remains as-yet an unrealized goal. This article describes a functional framework for intelligent, autonomous control that can facilitate the integration of control, diagnostic, and decision-making capabilities to satisfy the operational and performance goals of power plants based on multimodular advanced reactors.

  19. An autonomous control framework for advanced reactors

    Energy Technology Data Exchange (ETDEWEB)

    Wood, Richard T.; Upadhyaya, Belle R.; Floyd, Dan C. [Dept. of Nuclear Engineering, University of Tennessee, Knoxville (United States)

    2017-08-15

    Several Generation IV nuclear reactor concepts have goals for optimizing investment recovery through phased introduction of multiple units on a common site with shared facilities and/or reconfigurable energy conversion systems. Additionally, small modular reactors are suitable for remote deployment to support highly localized microgrids in isolated, underdeveloped regions. The long-term economic viability of these advanced reactor plants depends on significant reductions in plant operations and maintenance costs. To accomplish these goals, intelligent control and diagnostic capabilities are needed to provide nearly autonomous operations with anticipatory maintenance. A nearly autonomous control system should enable automatic operation of a nuclear power plant while adapting to equipment faults and other upsets. It needs to have many intelligent capabilities, such as diagnosis, simulation, analysis, planning, reconfigurability, self-validation, and decision. These capabilities have been the subject of research for many years, but an autonomous control system for nuclear power generation remains as-yet an unrealized goal. This article describes a functional framework for intelligent, autonomous control that can facilitate the integration of control, diagnostic, and decision-making capabilities to satisfy the operational and performance goals of power plants based on multimodular advanced reactors.

  20. Framework for virtual control desk projects

    International Nuclear Information System (INIS)

    Mol, Antonio Carlos A.; Freitas, Victor Goncalves G.; Espieito Santos, Andre Cotelli do; Aghina, Mauricio A. da C. e

    2011-01-01

    Through the recent advances of the Brazilian nuclear program, the creation of virtual control desks allows an ergonomic evaluation and technique of the same, even before its physical implementation, reducing costs and time in addition to allow the virtual training of operators. This project intends to develop a 'framework' where the components of a real control desk are available for creating a virtual desk, continuing the project control desk developed at the Laboratorio de Interface Homem Sistema do IEN (LABHIS/IEN). Through the C++ programming language integrated with the OPENGL graphics library was possible to create the desk and it's components, allowing a graphical modeling in 3D (stereo) of a virtual control desk where the operator, with the aid of GLUI user interface library, can choose what and where the components are positioned on the bench, and select the type of desk wanted from the pre-defined templates. Finally, with the control desk mounted and configured, enabling a virtual interaction with operators, making possible to reproduce its functionalities. (author)

  1. Framework for virtual control desk projects

    Energy Technology Data Exchange (ETDEWEB)

    Mol, Antonio Carlos A.; Freitas, Victor Goncalves G.; Espieito Santos, Andre Cotelli do; Aghina, Mauricio A. da C. e, E-mail: mol@ien.gov.b, E-mail: vgoncalves@ien.gov.b, E-mail: mag@ien.gov.b [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2011-07-01

    Through the recent advances of the Brazilian nuclear program, the creation of virtual control desks allows an ergonomic evaluation and technique of the same, even before its physical implementation, reducing costs and time in addition to allow the virtual training of operators. This project intends to develop a 'framework' where the components of a real control desk are available for creating a virtual desk, continuing the project control desk developed at the Laboratorio de Interface Homem Sistema do IEN (LABHIS/IEN). Through the C++ programming language integrated with the OPENGL graphics library was possible to create the desk and it's components, allowing a graphical modeling in 3D (stereo) of a virtual control desk where the operator, with the aid of GLUI user interface library, can choose what and where the components are positioned on the bench, and select the type of desk wanted from the pre-defined templates. Finally, with the control desk mounted and configured, enabling a virtual interaction with operators, making possible to reproduce its functionalities. (author)

  2. The levers of control framework : An exploratory analysis of balance

    NARCIS (Netherlands)

    Kruis, A.; Speklé, R.F.; Widener, S.

    2016-01-01

    The impact of the Levers of Control (LOC) framework on the accounting literature is undeniably large. The framework, however, has also been criticized for being vague and ambiguous. One of the central, but unclear, concepts in the LOC framework is the notion of balance. That is, the framework holds

  3. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  4. Generic Model Predictive Control Framework for Advanced Driver Assistance Systems

    NARCIS (Netherlands)

    Wang, M.

    2014-01-01

    This thesis deals with a model predictive control framework for control design of Advanced Driver Assistance Systems, where car-following tasks are under control. The framework is applied to design several autonomous and cooperative controllers and to examine the controller properties at the

  5. Software Framework for Controlling Unsupervised Scientific Instruments.

    Science.gov (United States)

    Schmid, Benjamin; Jahr, Wiebke; Weber, Michael; Huisken, Jan

    2016-01-01

    Science outreach and communication are gaining more and more importance for conveying the meaning of today's research to the general public. Public exhibitions of scientific instruments can provide hands-on experience with technical advances and their applications in the life sciences. The software of such devices, however, is oftentimes not appropriate for this purpose. In this study, we describe a software framework and the necessary computer configuration that is well suited for exposing a complex self-built and software-controlled instrument such as a microscope to laymen under limited supervision, e.g. in museums or schools. We identify several aspects that must be met by such software, and we describe a design that can simultaneously be used to control either (i) a fully functional instrument in a robust and fail-safe manner, (ii) an instrument that has low-cost or only partially working hardware attached for illustration purposes or (iii) a completely virtual instrument without hardware attached. We describe how to assess the educational success of such a device, how to monitor its operation and how to facilitate its maintenance. The introduced concepts are illustrated using our software to control eduSPIM, a fluorescent light sheet microscope that we are currently exhibiting in a technical museum.

  6. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  7. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...

  8. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  9. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  10. A hierarchical framework for air traffic control

    Science.gov (United States)

    Roy, Kaushik

    Air travel in recent years has been plagued by record delays, with over $8 billion in direct operating costs being attributed to 100 million flight delay minutes in 2007. Major contributing factors to delay include weather, congestion, and aging infrastructure; the Next Generation Air Transportation System (NextGen) aims to alleviate these delays through an upgrade of the air traffic control system. Changes to large-scale networked systems such as air traffic control are complicated by the need for coordinated solutions over disparate temporal and spatial scales. Individual air traffic controllers must ensure aircraft maintain safe separation locally with a time horizon of seconds to minutes, whereas regional plans are formulated to efficiently route flows of aircraft around weather and congestion on the order of every hour. More efficient control algorithms that provide a coordinated solution are required to safely handle a larger number of aircraft in a fixed amount of airspace. Improved estimation algorithms are also needed to provide accurate aircraft state information and situational awareness for human controllers. A hierarchical framework is developed to simultaneously solve the sometimes conflicting goals of regional efficiency and local safety. Careful attention is given in defining the interactions between the layers of this hierarchy. In this way, solutions to individual air traffic problems can be targeted and implemented as needed. First, the regional traffic flow management problem is posed as an optimization problem and shown to be NP-Hard. Approximation methods based on aggregate flow models are developed to enable real-time implementation of algorithms that reduce the impact of congestion and adverse weather. Second, the local trajectory design problem is solved using a novel slot-based sector model. This model is used to analyze sector capacity under varying traffic patterns, providing a more comprehensive understanding of how increased automation

  11. A Framework for Managing Access of Large-Scale Distributed Resources in a Collaborative Platform

    Directory of Open Access Journals (Sweden)

    Su Chen

    2009-01-01

    Full Text Available In an e-Science environment, large-scale distributed resources in autonomous domains are aggregated by unified collaborative platforms to support scientific research across organizational boundaries. In order to enhance the scalability of access management, an integrated approach for decentralizing the task from resource owners to administrators on the platform is needed. We propose an extensible access management framework to meet this requirement by supporting an administrative delegation policy. This feature allows administrators on the platform to make new policies based on the original policies made by resources owners. An access protocol that merges SAML and XACML is also included in the framework. It defines how distributed parties operate with each other to make decentralized authorization decisions.

  12. PID motion control tuning rules in a damping injection framework

    NARCIS (Netherlands)

    Tadele, T.S.; de Vries, Theodorus J.A.; Stramigioli, Stefano

    2013-01-01

    This paper presents a general design approach for a performance based tuning of a damping injection framework impedance controller by using insights from PID motion control tuning rules. The damping injection framework impedance controller is suitable for human friendly robots as it enhances safety

  13. First Experiences Using XACML for Access Control in Distributed Systems

    Science.gov (United States)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  14. Towards Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...... emergency response scenario which highlights the novel challenges that arise when enforcing access control in an environment with moving subjects and objects. To address a realistic application scenario, we consider movement on road networks, and we identify complex access control decisions relevant...

  15. Aber-OWL: a framework for ontology-based data access in biology

    KAUST Repository

    Hoehndorf, Robert

    2015-01-28

    Background: Many ontologies have been developed in biology and these ontologies increasingly contain large volumes of formalized knowledge commonly expressed in the Web Ontology Language (OWL). Computational access to the knowledge contained within these ontologies relies on the use of automated reasoning. Results: We have developed the Aber-OWL infrastructure that provides reasoning services for bio-ontologies. Aber-OWL consists of an ontology repository, a set of web services and web interfaces that enable ontology-based semantic access to biological data and literature. Aber-OWL is freely available at http://aber-owl.net. Conclusions: Aber-OWL provides a framework for automatically accessing information that is annotated with ontologies or contains terms used to label classes in ontologies. When using Aber-OWL, access to ontologies and data annotated with them is not merely based on class names or identifiers but rather on the knowledge the ontologies contain and the inferences that can be drawn from it.

  16. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  17. Urban air quality management and information systems in Europe: legal framework and information access

    International Nuclear Information System (INIS)

    Karatzas, K.; Moussiopoulos, N.

    2000-01-01

    The European Union (EU) legislative framework related to air quality, together with national legislation and relevant declarations of the United Nations (UN), requires an integrated approach concerning air quality management (AQM), and accessibility of related information for the citizens. In the present paper, the main requirements of this legislative framework are discussed and main air quality management and information system characteristics are drawn. The use of information technologies is recommended for the construction of such systems. The World Wide Web (WWW) is considered a suitable platform for system development and integration and at the same time as a medium for communication and information dissemination. (author)

  18. An RFID-Based Manufacturing Control Framework for Loosely Coupled Distributed Manufacturing System Supporting Mass Customization

    Science.gov (United States)

    Chen, Ruey-Shun; Tsai, Yung-Shun; Tu, Arthur

    In this study we propose a manufacturing control framework based on radio-frequency identification (RFID) technology and a distributed information system to construct a mass-customization production process in a loosely coupled shop-floor control environment. On the basis of this framework, we developed RFID middleware and an integrated information system for tracking and controlling the manufacturing process flow. A bicycle manufacturer was used to demonstrate the prototype system. The findings of this study were that the proposed framework can improve the visibility and traceability of the manufacturing process as well as enhance process quality control and real-time production pedigree access. Using this framework, an enterprise can easily integrate an RFID-based system into its manufacturing environment to facilitate mass customization and a just-in-time production model.

  19. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  20. Primer Control System Cyber Security Framework and Technical Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  1. A Framework for the Evaluation of a Self-Access Language Learning Centre

    Directory of Open Access Journals (Sweden)

    Bruce Morrison

    2011-12-01

    Full Text Available For self-access language learning centres (SACs to be accepted as efficient and effective alternatives or complements to more established modes of language learning and teaching, it is of serious concern that there is no research-based framework specifically developed for their evaluation. In this paper, a framework for the evaluation of a SAC is proposed which aims to recognize both the elements common to most SACs as well as the diversity inherent in a centre that predicates upon learner individuality. The study upon which this paper reports employed a grounded theory methodology examining data collected from participants representing various SAC stakeholder roles and subsequently proposing an evaluation framework consisting of 4 elements: context, key questions, decisions and actions. These elements, although presented individually, are interdependent and provide the framework with a multidimensional aspect that allows the evaluation team to carefully plan the various aspects of the evaluation while at the same time ensuring that these are brought together to ensure coherence in terms of aims, methodology and reporting. Central to the framework is recognition that the evaluation should be theory based and thus that it should incorporate a means of clearly representing the particular SAC theory (or mapping upon which the evaluation is to be focused. The paper concludes with brief discussion of potential implications of the use of such a framework, both theoretical and practical.

  2. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  3. Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lee, C.

    2014-01-01

    This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF)

  4. Transaction-Based Building Controls Framework, Volume 1: Reference Guide

    Energy Technology Data Exchange (ETDEWEB)

    Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Akyol, Bora A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez, Nicholas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Foster, Nikolas AF [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mayhorn, Ebony T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Steckley, Andrew C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Taylor, Zachary T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-12-01

    This document proposes a framework concept to achieve the objectives of raising buildings’ efficiency and energy savings potential benefitting building owners and operators. We call it a transaction-based framework, wherein mutually-beneficial and cost-effective market-based transactions can be enabled between multiple players across different domains. Transaction-based building controls are one part of the transactional energy framework. While these controls realize benefits by enabling automatic, market-based intra-building efficiency optimizations, the transactional energy framework provides similar benefits using the same market -based structure, yet on a larger scale and beyond just buildings, to the society at large.

  5. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  6. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures for...

  7. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  8. An optimal control framework for estimating autopilot safety margins

    NARCIS (Netherlands)

    Govindarjan, N.; De Visser, C.C.; Van Kampen, E.; Krishnakumar, K.; Barlow, J.; Stepanyan, V.

    2014-01-01

    This paper presents an optimal control framework to determine a collection of open-loop command signals that mathematically guarantees operation of an aircraft within certain prescribed state constraints. The framework is specifically applied to estimate margins for the reference command inputs of

  9. Spacecraft Attitude Control in Hamiltonian Framework

    DEFF Research Database (Denmark)

    Wisniewski, Rafal

    2000-01-01

    The objective of this paper is to give a design scheme for attitude control algorithms of a generic spacecraft. Along with the system model formulated in the Hamilton's canonical form the algorithm uses information about a required potential energy and a dissipative term. The control action...

  10. Risk and train control : a framework for analysis

    Science.gov (United States)

    2001-01-01

    This report develops and demonstrates a framework for examining the effects of various train control strategies on some of the major risks of railroad operations. Analysis of hypothetical 1200-mile corridor identified the main factors that increase r...

  11. A Framework for Optimal Control Allocation with Structural Load Constraints

    Science.gov (United States)

    Frost, Susan A.; Taylor, Brian R.; Jutte, Christine V.; Burken, John J.; Trinh, Khanh V.; Bodson, Marc

    2010-01-01

    Conventional aircraft generally employ mixing algorithms or lookup tables to determine control surface deflections needed to achieve moments commanded by the flight control system. Control allocation is the problem of converting desired moments into control effector commands. Next generation aircraft may have many multipurpose, redundant control surfaces, adding considerable complexity to the control allocation problem. These issues can be addressed with optimal control allocation. Most optimal control allocation algorithms have control surface position and rate constraints. However, these constraints are insufficient to ensure that the aircraft's structural load limits will not be exceeded by commanded surface deflections. In this paper, a framework is proposed to enable a flight control system with optimal control allocation to incorporate real-time structural load feedback and structural load constraints. A proof of concept simulation that demonstrates the framework in a simulation of a generic transport aircraft is presented.

  12. Adaptive Feedfoward Feedback Control Framework, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — A novel approach is proposed for the suppression of the aircraft's structural vibration to increase the resilience of the flight control law in the presence of the...

  13. A Formal Framework for Adaptive Access Control Models.

    NARCIS (Netherlands)

    Spaccapietra, S.; Rinderle, S.B.; Reichert, M.U.

    For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an enterprise architecture. In particular, changes of organizational structures often become necessary. The information about

  14. Legal framework related to access to information and public participation on nuclear activity

    International Nuclear Information System (INIS)

    Arias, M. C.; Bernaldez, A.L.; Ghiggeri, M.; Tula, C.

    2011-01-01

    The right of access to information by citizens about activities related to scientific and technological development of nuclear energy for peaceful uses, has evolved over time. Governments began to perceive the necessity and the benefits of informing the community, who manifested certain prejudices about nuclear activity as a consequence of the propelling of nuclear bombs in Nagasaki and Hiroshima. With the advent of environmental law and the influence of its principles, the idea of transparency of information in the nuclear field was imposed, and also the importance of both the inhabitants of countries with nuclear developments and neighbouring countries who may be affected by the bordering effects of ionizing radiation, could have access to information and to participate actively. The access to information and citizen participation has been institutionalized and reflected in international regulations through international conventions subscribed by our country and nationally through the National Constitution, the Provincials Constitutions, the City of Buenos Aires Constitution, Laws No. 25.675, 25.831 and PEN Decree No. 1172/03, among others. The present work aims to make an overview of the legal framework related to access to information on nuclear activity. (authors) [es

  15. Cyber Security: Critical Infrastructure Controls Assessment Framework

    Science.gov (United States)

    2011-05-01

    Industry SANS ‐ CAG OASIS Private   ISA‐99 <more…> SOX <more…> OWASP <more…> And Growing Day by Day……………….. CIP Security Controls Assessment...NERC-CIP NIST-Cyber Grid Chemical Cyber Physical System Security Standards PCI OASIS OWASP Nuclear Transportation ISA-99 CIP Security Controls...the Advancement of Structured Information Standards 22. OWASP  ‐ Open Web Application Security Project  23. PCI – Payment Card Industry 24. PCS

  16. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  17. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Lin

    2016-10-01

    Full Text Available Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  18. A Hierarchical Learning Control Framework for an Aerial Manipulation System

    Science.gov (United States)

    Ma, Le; Chi, yanxun; Li, Jiapeng; Li, Zhongsheng; Ding, Yalei; Liu, Lixing

    2017-07-01

    A hierarchical learning control framework for an aerial manipulation system is proposed. Firstly, the mechanical design of aerial manipulation system is introduced and analyzed, and the kinematics and the dynamics based on Newton-Euler equation are modeled. Secondly, the framework of hierarchical learning for this system is presented, in which flight platform and manipulator are controlled by different controller respectively. The RBF (Radial Basis Function) neural networks are employed to estimate parameters and control. The Simulation and experiment demonstrate that the methods proposed effective and advanced.

  19. A new access control system by fingerprint for radioisotope facilities

    International Nuclear Information System (INIS)

    Kawamura, Hiroko; Hirata, Yasuki; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-01-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user's access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  20. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  1. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  2. Analytical Framework for Preliminary Planning of Very High-Speed Digital Subscriber Line Access Networks

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-07-01

    Full Text Available In this paper, we introduce an analytical framework for the performance evaluation of the VDSL2-based access systems. It allows for the obtaining of approximations of the achievable bit rate per user, taking into account several factors, such as the bit-loading limitation per sub-carrier; interference scenario, including the number and positions of the active interferers along the cable; crosstalk statistics; and vectoring. A closed-form expression for the maximum sub-carrier frequency that can be loaded with the maximum number of allowed bits is also presented. Formulas are obtained assuming log-normal statistics for the signal-to-interference-plus-noise ratio (SINR per sub-carrier. The validity of the proposed formulas has been assessed by computer calculations. A very good agreement between the exact and the approximated bit rates has been obtained. The framework can be used for preliminary design of VDSL2 systems in terms of the bit rate coverage, as well as to analyze performance of other access technologies such as ADSL and G.fast.

  3. Advanced Control Facility for the CERN-UNICOS Framework

    CERN Document Server

    Pezzetti, M; Coppier, H

    2010-01-01

    CERN, during last decade, has extensively applied the CERN/UNICOS framework to large scale cryoplant control system. An increase of interested to advanced control techniques and innovative simulation environment applied to cryogenic processes has also occur. Since new control algorithm development into UNICOS framework requires significant time, a control testing platform which can be externally connected can improve and simplify the procedure of testing advanced controllers implementation. In this context, the present paper describes the development of a control testing tool at CERN, which allows rapid control strategies implementation through the Matlab/Simulink® environment, coupled with the large scale cryogenics UNICOS control system or with the CERN PROCOS simulation environment. The time delays which are inherently introduced by network links and communication protocols are analyzed and experimentally identified. Security and reliability issues are also discussed.

  4. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  5. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  6. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  7. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  8. Access Control to Information in Pervasive Computing Environments

    National Research Council Canada - National Science Library

    Hengartner, Urs

    2005-01-01

    ... feelings. Some of this information is confidential and should be released only to authorized entities. In this thesis, I show how existing solutions for controlling access to information are not sufficient for pervasive computing...

  9. IMPROVEMENTS IN THE CONTROL FRAMEWORKS: COSO AND COBIT

    Directory of Open Access Journals (Sweden)

    Oana Diana OPREA

    2014-06-01

    Full Text Available After the corporate scandals from the beginning of the 21st century, there was a general lack of confidence in the quality of the financial reporting. The Sarbanes-Oxley Act came to address this issue, by imposing rules that would prevent such scandals in the future. In order to help companies with the compliance, control frameworks have been issued. The framework of the Committee of Sponsoring Organisations of the Treadway Commission offers guidance in matters of internal controls, whereas the Control Objectives for Information and related Technology focus on IT controls. The present paper intends to critically address the changes in the COSO and COBIT framework, that took place during 2012 and 2013.

  10. A self-description data framework for Tokamak control system design

    International Nuclear Information System (INIS)

    Zhang, Ming; Zhang, Jing; Zheng, Wei; Hu, Feiran; Zhuang, Ge

    2015-01-01

    Highlights: • The SDD framework can be applied to different Tokamak devices. • We explain how configuration settings of control systems are described in SDD models, namely components and connections. • Evolving SDD models are stored in a dynamic schema database. • The SDD editor supports plug-and-play SDD models. - Abstract: A Tokamak device consists of numerous control systems, which need to be integrated. CODAC (Control, Data Access and Communication) system requires the configuration settings of these control systems to carry out the integration smoothly. SDD (Self-description data) is designed to describe the static configuration of control systems. ITER CODAC group has released an SDD software package for control system designers to manage the static configuration, but it is specific for ITER plant control systems. Following the idea of ITER SDD, we developed a flexible and scalable SDD framework to develop SDD software for J-TEXT and other sophisticated devices. The SDD framework describes the configuration settings of various control systems, including physical and logical elements and their relation information, in SDD models which are classified into Components and Connections. The framework is composed of three layers: the MongoDB database, an open-source, dynamic schema, NoSQL (Not Only SQL) database; the SDD service, which maps SDD models to MongoDB and handles the transaction and business logic; the SDD applications, which can be used to create and maintain SDD information, and generate various kinds of output using the stored SDD information.

  11. A self-description data framework for Tokamak control system design

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Ming; Zhang, Jing [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China); Zheng, Wei, E-mail: zhengwei@hust.edu.cn [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China); Hu, Feiran; Zhuang, Ge [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China)

    2015-10-15

    Highlights: • The SDD framework can be applied to different Tokamak devices. • We explain how configuration settings of control systems are described in SDD models, namely components and connections. • Evolving SDD models are stored in a dynamic schema database. • The SDD editor supports plug-and-play SDD models. - Abstract: A Tokamak device consists of numerous control systems, which need to be integrated. CODAC (Control, Data Access and Communication) system requires the configuration settings of these control systems to carry out the integration smoothly. SDD (Self-description data) is designed to describe the static configuration of control systems. ITER CODAC group has released an SDD software package for control system designers to manage the static configuration, but it is specific for ITER plant control systems. Following the idea of ITER SDD, we developed a flexible and scalable SDD framework to develop SDD software for J-TEXT and other sophisticated devices. The SDD framework describes the configuration settings of various control systems, including physical and logical elements and their relation information, in SDD models which are classified into Components and Connections. The framework is composed of three layers: the MongoDB database, an open-source, dynamic schema, NoSQL (Not Only SQL) database; the SDD service, which maps SDD models to MongoDB and handles the transaction and business logic; the SDD applications, which can be used to create and maintain SDD information, and generate various kinds of output using the stored SDD information.

  12. Framework Based Guidance Navigation and Control Flight Software Development

    Science.gov (United States)

    McComas, David

    2007-01-01

    This viewgraph presentation describes NASA's guidance navigation and control flight software development background. The contents include: 1) NASA/Goddard Guidance Navigation and Control (GN&C) Flight Software (FSW) Development Background; 2) GN&C FSW Development Improvement Concepts; and 3) GN&C FSW Application Framework.

  13. Implementation of the Framework Convention on Tobacco Control in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will allow the Southeast Asia Tobacco Control Alliance (SEATCA) to coordinate a research program in support of the successful implementation (in the case of Cambodia) and ratification (in the case of Lao PDR) of the World Health Organization's Framework Convention on Tobacco Control (WHO FCTC).

  14. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  15. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  16. An Austrian framework for PET quality control

    International Nuclear Information System (INIS)

    Nicoletti, R.; Dobrozemsky, G.; Minear, G.; Bergmann, H.

    2002-01-01

    Full text: The European patient protection directive (97/43 EURATOM) requires regular routine quality control (QC) of PET imaging devices. Since no standards were available covering this area and in order to comply with the directive a joint working party of the Austrian societies of nuclear medicine and of medical physics have developed a set of procedures suitable for both dedicated PET scanners and gamma cameras operating in coincidence mode (GCPET). The routine procedures proposed include both manufacturer recommended procedures and tests for specific parameters and calibration procedures. Wherever possible, procedures adapted or derived from NEMA standards publication NU 2-2001 were used to permit direct comparison with specified parameters of image quality. For dedicated PET scanners the most important procedures are the checking of detector sensitivities and the attenuation calibration scan. With full ring scanners the attenuation calibration scan is a blank scan, with partial ring devices a special attenuation calibration phantom has to be used. Test protocols are specific to manufacturer and scanner type. They are usually performed automatically overnight. In addition, some instruments require special calibrations, e.g. gain adjustments or coincidence timing calibration. GCPET procedures include the frequent assessment in coincidence mode of detector uniformity, energy resolution and system sensitivity. Common to both dedicated PET and GCPET are the regular quarterly assessment of tomographic spatial resolution and the calibration of the system for quantitative measurements. As a total performance test for both systems assessment of image quality following NU 2-2001 was included, to be carried out after major system changes or repairs. The suite of QC procedures was tested on several dedicated PET and GCPET systems including all major manufacturers' systems. Due to missing hardware or software not all tests could be performed on all systems. Some of the

  17. A control system framework for the Hobby-Eberly telescope

    Science.gov (United States)

    Ramsey, Jason; Drory, Niv; Bryant, Randy; Elliott, Linda; Fowler, James; Hill, Gary J.; Landriau, Martin; Leck, Ron; Vattiat, Brian

    2016-08-01

    We present the development framework for the distributed control systems, scripting frontend, and monitoring facilities of the recently upgraded Hobby-Eberly Telescope (HET). A common flexible control and data acquisition layer in C++, with message passing implemented on top of ZeroMQ, wraps the final designs of each new hardware component including tracking, metrology, instrumentation and calibration equipment. A homogeneous command, response and event layer normalizes the diversity of the lower level software interfaces easing the development of the Telescope Control System (TCS). Applications developed in the framework easily interface to the new tracker and legacy instrumentation of the primary mirror, weather, dome, and tracker support structure. The framework facilitates testing, vetting, and characterization of the telescope and TCS. Examples of the real-time monitoring capabilities and the Python scripting methods of various telescope components yield insight into overall system performance. Lessons learned along the way, future refinements, and anticipated enhancements, are detailed.

  18. Offset Free Tracking Predictive Control Based on Dynamic PLS Framework

    Directory of Open Access Journals (Sweden)

    Jin Xin

    2017-10-01

    Full Text Available This paper develops an offset free tracking model predictive control based on a dynamic partial least square (PLS framework. First, state space model is used as the inner model of PLS to describe the dynamic system, where subspace identification method is used to identify the inner model. Based on the obtained model, multiple independent model predictive control (MPC controllers are designed. Due to the decoupling character of PLS, these controllers are running separately, which is suitable for distributed control framework. In addition, the increment of inner model output is considered in the cost function of MPC, which involves integral action in the controller. Hence, the offset free tracking performance is guaranteed. The results of an industry background simulation demonstrate the effectiveness of proposed method.

  19. A Framework for Distributed Rover Control and Three Sample Applications

    Science.gov (United States)

    McGuire, Steve

    2001-01-01

    In order to develop quality control software for multiple robots, a common interface is required. By developing components in a modular fashion with well-defined boundaries, roboticists can write code to program a generic rover, and only require very simple modifications to run on any robot with a properly implemented framework. The proposed framework advances a Generic Rover that could be any rover, from Real World Interface's All Terrain Robot Vehicle Jr. series to the Fido-class rovers from the Jet Propulsion Laboratory to any other research robot. Using these generic hardware interfaces, software designers and engineers can concentrate on the actual code, and not have to worry about hardware details. In addition to the hardware support framework, three sample applications have been developed to demonstrate the flexibility and extensibility of the framework.

  20. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  1. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  2. The control software framework of the web base

    International Nuclear Information System (INIS)

    Nakatani, Takeshi; Inamura, Yasuhiro; Ito, Takayoshi; Otomo, Toshiya

    2015-01-01

    Web browsers are one of the most platform-independent user interfaces. In particular, web pages created using responsive web design (RWD) are available for use on desktop and laptop computers, as well as tablet terminals and smart phones. We developed a common software framework, IROHA, for the instrument control system in the Materials and Life Science Experimental Facility at the Japan Proton Accelerator Research Complex to build a flexible and scalable system by adopting XML/HTTP. However, its user interface was platform-dependent, and we wanted it to be more user-friendly. In 2013, we developed the prototype of a new software framework, IROHA2, comprising several device control servers and an instrument management server, retaining the flexibility and scalability of IROHA. We also adopted the Bootstrap framework to create an RWD user interface for these servers. (author)

  3. Maternity Leave Access and Health: A Systematic Narrative Review and Conceptual Framework Development.

    Science.gov (United States)

    Andres, Ellie; Baird, Sarah; Bingenheimer, Jeffrey Bart; Markus, Anne Rossier

    2016-06-01

    Background Maternity leave is integral to postpartum maternal and child health, providing necessary time to heal and bond following birth. However, the relationship between maternity leave and health outcomes has not been formally and comprehensively assessed to guide public health research and policy in this area. This review aims to address this gap by investigating both the correlates of maternity leave utilization in the US and the related health benefits for mother and child. Methods We searched the peer-reviewed scholarly literature using six databases for the years 1990 to early 2015 and identified 37 studies to be included in the review. We extracted key data for each of the included studies and assessed study quality using the "Weight of the Evidence" approach. Results The literature generally confirms a positive, though limited correlation between maternity leave coverage and utilization. Likewise, longer maternity leaves are associated with improved breastfeeding intentions and rates of initiation, duration and predominance as well as improved maternal mental health and early childhood outcomes. However, the literature points to important disparities in access to maternity leave that carry over into health outcomes, such as breastfeeding. Synthesis We present a conceptual framework synthesizing what is known to date related to maternity leave access and health outcomes.

  4. FRAMEWORK LEGISLATION FOR THE REALISATION OF THE RIGHT TO HAVE ACCESS TO SUFFICIENT FOOD

    Directory of Open Access Journals (Sweden)

    Anél Terblanche

    2012-12-01

    Full Text Available Various South African government reports list food security as a development priority. Despite this prioritisation and despite the fact that South Africa is currently food self-sufficient, ongoing food shortages remain a daily reality for approximately 35 percent of the South African population. The government's commitment to food security to date of writing this contribution manifests in related policies, strategies, programmes and sectoral legislation with the focus on food production, distribution, safety and assistance. A paradigm shift in the international food security debate was encouraged during 2009, namely to base food security initiatives on the right to sufficient food. During a 2011 visit to South Africa, the Special Rapporteur for the Right to Food of the United Nations, accordingly confirmed that a human rights-based approach to food security is necessary in the South African legal and policy framework in order to address the huge disparities in terms of food security (especially concerning geography, gender and race. A human rights-based approach to food security will add dimensions of dignity, transparency, accountability, participation and empowerment to food security initiatives. The achievement of food security is further seen as the realisation of existing rights, notably the right of access to sufficient food. The right of access to sufficient food, as entrenched in section 27(1(b of the Constitution of the Republic of South Africa, 1996 will accordingly play a central role within a human rights-based approach to food security. Section 27(2 of the Constitution of the Republic of South Africa, 1996 qualifies section 27(1(b by requiring the state to take reasonable legislative and other measures, within its available resources, to achieve the progressive realisation of each of the section 27(1 rights. The South African government's commitment to food security, as already mentioned, currently manifests in related policies

  5. DARC: Next generation decentralized control framework for robot applications

    DEFF Research Database (Denmark)

    Kjærgaard, Morten; Andersen, Nils Axel; Ravn, Ole

    2013-01-01

    This paper presents DARC, a next generation control framework for robot applications. It is designed to be equally powerful in prototyping research projects and for building serious commercial robots running on low powered embedded hardware, thus closing the gab between research and industry...

  6. A Framework for Control and Observation in Distributed Environments

    Science.gov (United States)

    Smith, Warren

    2001-01-01

    As organizations begin to deploy large computational grids, it has become apparent that systems for observation and control of the resources, services, and applications that make up such grids are needed. Administrators must observe the operation of resources and services to ensure that they are operating correctly and they must control the resources and services to ensure that their operation meets the needs of users. Further, users need to observe the performance of their applications so that this performance can be improved and control how their applications execute in a dynamic grid environment. In this paper we describe our software framework for control and observation of resources, services, and applications that supports such uses and we provide examples of how our framework can be used.

  7. Controlling Thermal Expansion: A Metal?Organic Frameworks Route

    OpenAIRE

    Balestra, Salvador R. G.; Bueno-Perez, Rocio; Hamad, Said; Dubbeldam, David; Ruiz-Salvador, A. Rabdel; Calero, Sofia

    2016-01-01

    Controlling thermal expansion is an important, not yet resolved, and challenging problem in materials research. A conceptual design is introduced here, for the first time, for the use of metal?organic frameworks (MOFs) as platforms for controlling thermal expansion devices that can operate in the negative, zero, and positive expansion regimes. A detailed computer simulation study, based on molecular dynamics, is presented to support the targeted application. MOF-5 has been selected as model m...

  8. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, Rune; Hjorth, Theis

    2010-01-01

    This paper describes methods to lower the entry barrier for creating products that interoperate in the emerging heterogeneous residential control network domain. For designing reconfigurable, layer-component-based communication stacks, a flexible framework is proposed that supports several types ...... shown how the framework facilitates fast prototyping and makes developing secure wireless control systems less complex....... of nodes such as bridges, controllers, sensor/actuators - as well as secure communication between them. A special messaging system facilitates inter-component communication, and a Virtual Port Service protocol enables resource addressing. The end-devices in the heterogeneous network are made accessible...... on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...

  9. Layer-component-based communication stack framework for wireless residential control systems

    DEFF Research Database (Denmark)

    Torbensen, R.; Hjorth, Theis S.

    2011-01-01

    This paper describes methods to lower the entry barrier for creating products that interoperate in the emerging heterogeneous residential control network domain. For designing reconfigurable, layer-component-based communication stacks, a flexible framework is proposed that supports several types ...... shown how the framework facilitates fast prototyping and makes developing secure wireless control systems less complex....... of nodes such as bridges, controllers, sensor/actuators – as well as secure communication between them. A special messaging system facilitates inter-component communication, and a Virtual Port Service protocol enables resource addressing. The end-devices in the heterogeneous network are made accessible...... on a common IP infrastructure, regardless of individual wireless technology. Legacy home automation devices are also supported. A prototype has been implemented on multiple resource-constrained hardware platforms, to demonstrate that the solution is both feasible for low-cost devices and portable. It has been...

  10. A Service Access Security Control Model in Cyberspace

    Science.gov (United States)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  11. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  12. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  13. GSL: An Open Source Framework for the Rapid Development of Data Archive Access Services

    Science.gov (United States)

    McWhirter, J.; Boler, F. M.; Bock, Y.; Squibb, M. B.; Ratzesberger, L.

    2011-12-01

    The Geodetic Seamless Archive Center (GSAC) project is a NASA ROSES ACCESS funded effort with the goal to define and implement a web service API for uniform querying across multiple geodetic data repositories. The project information technology partners include two International GNSS Service (IGS) Data Centers, CDDIS and SOPAC, and a third global NSF and NASA-funded Data Center, UNAVCO. A science partner, the University of Nevada, Reno Geodetic Laboratory is utilizing the services and contributing new quality assessment products. Each of the participant data centers has its own internal database schema and various web-based access mechanisms to suit the needs of their individual user communities. The software engineering challenge that we faced was to unify these access mechanisms into a common web service API. To facilitate the development of the GSAC interfaces within these disparate repositories we have developed a Java-based open source middleware framework called the GSAC Service Layer (GSL). It was recognized early on in the project that much of the required functionality within each repository could be provided by a common software layer, thus achieving a substantial reduction in the development effort required by each partner institution. The GSL provides a range of common services for repository configuration, initialization, database management, web interface generation, and data model and metadata creation. Each repository implementation then simply focuses on the core task of responding to query requests and delivering to the GSL layer the internal results. The GSL layer is then responsible for encoding the results in the desired format. A fundamental challenge in developing a framework such as the GSL is balancing the trade-off between the agnosticism needed within the GSL so that it is applicable to a wide range of problem domains and the specific needs required for a particular repository implementations. The GSL addresses this challenge through an

  14. Robust and optimal control a two-port framework approach

    CERN Document Server

    Tsai, Mi-Ching

    2014-01-01

    A Two-port Framework for Robust and Optimal Control introduces an alternative approach to robust and optimal controller synthesis procedures for linear, time-invariant systems, based on the two-port system widespread in electrical engineering. The novel use of the two-port system in this context allows straightforward engineering-oriented solution-finding procedures to be developed, requiring no mathematics beyond linear algebra. A chain-scattering description provides a unified framework for constructing the stabilizing controller set and for synthesizing H2 optimal and H∞ sub-optimal controllers. Simple yet illustrative examples explain each step. A Two-port Framework for Robust and Optimal Control  features: ·         a hands-on, tutorial-style presentation giving the reader the opportunity to repeat the designs presented and easily to modify them for their own programs; ·         an abundance of examples illustrating the most important steps in robust and optimal design; and ·   �...

  15. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  16. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  17. Addressing access barriers to health services: an analytical framework for selecting appropriate interventions in low-income Asian countries.

    Science.gov (United States)

    Jacobs, Bart; Ir, Por; Bigdeli, Maryam; Annear, Peter Leslie; Van Damme, Wim

    2012-07-01

    While World Health Organization member countries embraced the concept of universal coverage as early as 2005, few low-income countries have yet achieved the objective. This is mainly due to numerous barriers that hamper access to needed health services. In this paper we provide an overview of the various dimensions of barriers to access to health care in low-income countries (geographical access, availability, affordability and acceptability) and outline existing interventions designed to overcome these barriers. These barriers and consequent interventions are arranged in an analytical framework, which is then applied to two case studies from Cambodia. The aim is to illustrate the use of the framework in identifying the dimensions of access barriers that have been tackled by the interventions. The findings suggest that a combination of interventions is required to tackle specific access barriers but that their effectiveness can be influenced by contextual factors. It is also necessary to address demand-side and supply-side barriers concurrently. The framework can be used both to identify interventions that effectively address particular access barriers and to analyse why certain interventions fail to tackle specific barriers.

  18. A framework for improving access and customer service times in health care: application and analysis at the UCLA Medical Center.

    Science.gov (United States)

    Duda, Catherine; Rajaram, Kumar; Barz, Christiane; Rosenthal, J Thomas

    2013-01-01

    There has been an increasing emphasis on health care efficiency and costs and on improving quality in health care settings such as hospitals or clinics. However, there has not been sufficient work on methods of improving access and customer service times in health care settings. The study develops a framework for improving access and customer service time for health care settings. In the framework, the operational concept of the bottleneck is synthesized with queuing theory to improve access and reduce customer service times without reduction in clinical quality. The framework is applied at the Ronald Reagan UCLA Medical Center to determine the drivers for access and customer service times and then provides guidelines on how to improve these drivers. Validation using simulation techniques shows significant potential for reducing customer service times and increasing access at this institution. Finally, the study provides several practice implications that could be used to improve access and customer service times without reduction in clinical quality across a range of health care settings from large hospitals to small community clinics.

  19. Leveraging the Unified Access Framework: A Tale of an Integrated Ocean Data Prototype

    Science.gov (United States)

    O'Brien, K.; Kern, K.; Smith, B.; Schweitzer, R.; Simons, R.; Mendelssohn, R.; Diggs, S. C.; Belbeoch, M.; Hankin, S.

    2014-12-01

    The Tropical Pacific Observing System (TPOS) has been functioning and capturing measurements since the mid 1990s during the very successful Tropical Ocean Global Atmosphere (TOGA) project. Unfortunately, in the current environment, some 20 years after the end of the TOGA project, sustaining the observing system is proving difficult. With the many advances in methods of observing the ocean, a group of scientists is taking a fresh look at what the Tropical Pacific Observing System requires for sustainability. This includes utilizing a wide variety of observing system platforms, including Argo floats, unmanned drifters, moorings, ships, etc. This variety of platforms measuring ocean data also provides a significant challenge in terms of integrated data management. It is recognized that data and information management is crucial to the success and impact of any observing system. In order to be successful, it is also crucial to avoid building stovepipes for data management. To that end, NOAA's Observing System Monitoring Center (OSMC) has been tasked to create a testbed of integrated real time and delayed mode observations for the Tropical Pacific region in support of the TPOS. The observing networks included in the prototype are: Argo floats, OceanSites moorings, drifting buoys, hydrographic surveys, underway carbon observations and, of course, real time ocean measurements. In this presentation, we will discuss how the OSMC project is building the integrated data prototype using existing free and open source software. We will explore how we are leveraging successful data management frameworks pioneered by efforts such as NOAA's Unified Access Framework project. We will also show examples of how conforming to well known conventions and standards allows for discoverability, usability and interoperability of data.

  20. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  1. XML in an Adaptive Framework for Instrument Control

    Science.gov (United States)

    Ames, Troy J.

    2004-01-01

    NASA Goddard Space Flight Center is developing an extensible framework for instrument command and control, known as Instrument Remote Control (IRC), that combines the platform independent processing capabilities of Java with the power of the Extensible Markup Language (XML). A key aspect of the architecture is software that is driven by an instrument description, written using the Instrument Markup Language (IML). IML is an XML dialect used to describe interfaces to control and monitor the instrument, command sets and command formats, data streams, communication mechanisms, and data processing algorithms.

  2. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  3. Assessment of Digital Access Control Methods Used by Selected ...

    African Journals Online (AJOL)

    Assessment of Digital Access Control Methods Used by Selected Academic Libraries in South-West Nigeria. ... information professionals with the knowledge that would enable them establish an effective strategy to protect e-resources from such abuses as plagiarism, piracy and infringement of intellectual property rights.

  4. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  5. Compulsory licensing, price controls, and access to patented foreign products

    OpenAIRE

    Eric Saggi; Saggi Saggi

    2012-01-01

    Motivated by existing multilateral rules regarding intellectual property, we develop a North-South model to highlight the dual roles price controls and compulsory licensing play in determining Southern access to a patented Northern product. The Northern patent-holder chooses whether and how to work its patent in the South (either via entry or voluntarily licensing) while the South determines the price control and whether to issue a compulsory license. The threat of compulsory licensing benefi...

  6. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  7. ProShell – The MedAustron Accelerator Control Procedure Framework

    CERN Document Server

    Moser, R; Marchhart, M; Torcato de Matos, C; Gutleber, J; Dedič, J; Sah, S

    2011-01-01

    MedAustron is a centre for ion-therapy and research in currently under construction in Austria. It features a synchrotron particle accelerator for proton and carbon-ion beams. This paper presents the architecture and concepts for implementing a procedure framework called ProShell. Procedures to automate high level control and analysis tasks for commissioning and during operation modelled with Petri-Nets and user code is implemented with C#. It must be possible to execute procedures and monitor their execution progress remotely. Procedures include starting up devices and subsystems in a controlled manner, configuring, operating O(1000) devices and tuning their operational settings using iterative optimization algorithms. Device interfaces must be extensible to accommodate yet unanticipated functionalities. The framework implements a template for procedure specific graphical interfaces to access device specific information such as monitoring data. Procedures interact with physical devices thro...

  8. The regulatory framework for oil and gas access in B.C

    International Nuclear Information System (INIS)

    Cassidy, P.R.

    1998-01-01

    An overview of the regulatory framework for gaining access to oil and gas resources in British Columbia was presented. The paper was divided into two parts. Part one dealt with the oil and gas land tenure system and the complex interrelationship of agencies, ministries, planning boards, consultation groups, and legislations. Issues discussed included: (1) surface rights removals, (2) the Waste Management Act, (3) pipeline operations and consultation obligations, (4) forest practices, (5) surface rights on private crown lands, (6) the British Columbia Utilities Commission, and (7) industrial camp operations. The second part of the paper dealt with the disadvantages associated with this complex interrelationship, by analyzing two recent court decisions involving the first judicial interpretations of the Forest Practices Code of British Columbia Act arising from Imperial's oil well exploration project. An overview of the a new form of licence to cut timber called a 'Master Licence to Cut' was also presented. It was suggested that the regulatory 'red tape' in British Columbia is one of the contributing factors to the province's economic troubles. 47 refs

  9. Federated access to heterogeneous information resources in the Neuroscience Information Framework (NIF).

    Science.gov (United States)

    Gupta, Amarnath; Bug, William; Marenco, Luis; Qian, Xufei; Condit, Christopher; Rangarajan, Arun; Müller, Hans Michael; Miller, Perry L; Sanders, Brian; Grethe, Jeffrey S; Astakhov, Vadim; Shepherd, Gordon; Sternberg, Paul W; Martone, Maryann E

    2008-09-01

    The overarching goal of the NIF (Neuroscience Information Framework) project is to be a one-stop-shop for Neuroscience. This paper provides a technical overview of how the system is designed. The technical goal of the first version of the NIF system was to develop an information system that a neuroscientist can use to locate relevant information from a wide variety of information sources by simple keyword queries. Although the user would provide only keywords to retrieve information, the NIF system is designed to treat them as concepts whose meanings are interpreted by the system. Thus, a search for term should find a record containing synonyms of the term. The system is targeted to find information from web pages, publications, databases, web sites built upon databases, XML documents and any other modality in which such information may be published. We have designed a system to achieve this functionality. A central element in the system is an ontology called NIFSTD (for NIF Standard) constructed by amalgamating a number of known and newly developed ontologies. NIFSTD is used by our ontology management module, called OntoQuest to perform ontology-based search over data sources. The NIF architecture currently provides three different mechanisms for searching heterogeneous data sources including relational databases, web sites, XML documents and full text of publications. Version 1.0 of the NIF system is currently in beta test and may be accessed through http://nif.nih.gov.

  10. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  11. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations.......In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  12. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  13. Multi-objective optimization framework for networked predictive controller design.

    Science.gov (United States)

    Das, Sourav; Das, Saptarshi; Pan, Indranil

    2013-01-01

    Networked Control Systems (NCSs) often suffer from random packet dropouts which deteriorate overall system's stability and performance. To handle the ill effects of random packet losses in feedback control systems, closed over communication network, a state feedback controller with predictive gains has been designed. To achieve improved performance, an optimization based controller design framework has been proposed in this paper with Linear Matrix Inequality (LMI) constraints, to ensure guaranteed stability. Different conflicting objective functions have been optimized with Non-dominated Sorting Genetic Algorithm-II (NSGA-II). The methodology proposed in this paper not only gives guaranteed closed loop stability in the sense of Lyapunov, even in the presence of random packet losses, but also gives an optimization trade-off between two conflicting time domain control objectives. Copyright © 2012 ISA. All rights reserved.

  14. IEPLC Framework, Automated Communication in a Heterogeneous Control System Environment

    CERN Document Server

    Locci, F

    2014-01-01

    In CERN accelerators control system several components are essential such as: Programmable Logic Controller (PLC), PCI Extensions for Instrumentation (PXI), and other micro-controller families. Together with their weaknesses and their strength points they typically present custom communication protocols and it is therefore difficult to federate them into the control system using a single communication strategy. Furthermore this dependency to the physical device interfaces and protocols makes most of the code not reusable and the replacement of old technology a difficult problem. The purpose of IEPLC ([1]) is to mitigate the communication issues given by this heterogeneity; it proposes a framework to define communication interfaces in a hardware independent manner. In addition it automatically generates all the resources needed on master side (typically represented by a FEC: Front-End Computer) and slave side (typically represented by the controller) to implement a common and generic Ethernet communication. Th...

  15. A framework for evaluating the accessibility of raw materials from end-of-life products and the Earth's crust.

    Science.gov (United States)

    Mueller, Sandra R; Wäger, Patrick A; Turner, David A; Shaw, Peter J; Williams, Ian D

    2017-10-01

    An increasing number of geochemically scarce metallic raw materials are entering into our lives via new technologies. A reversal of this trend is not foreseeable, leading to concerns regarding the security of their supply. However, the evaluation of raw material supply is currently hampered by inconsistent use of fundamental terminologies and incomplete assessment criteria. In this paper, we aim to establish a consistent framework for evaluating raw material supply from both anthropogenic and geological sources. A method for concept extraction was applied to evaluate systematically the use of fundamental terms in the evaluation of raw material supply. The results have shown that 'availability' is commonly used in raw material supply evaluations, whilst other researchers suggest that raw material supply should be evaluated based on 'accessibility'. It was revealed that 'accessibility' actually comprises two aspects: 'availability' and 'approachability'. Raw material 'approachability' has not previously been explicitly addressed at a system level. A novel, consistent framework for evaluating raw material supply was therefore developed. To demonstrate the application of the established framework, we evaluated the raw material supply of four rare earth element case studies. Three case studies are End-of-Life products (the anthroposphere) from Switzerland: (i) phosphors in fluorescent lamps, (i) permanent magnets in the drive motors of electric cars and (iii) fibre optic cable. The fourth case study source is the Earth's crust (the geosphere): Mount Weld deposit in Australia. The framework comprises a comprehensive evaluation of six components relating to raw material mining and processing: their geological knowledge, eligibility, technology, economic, societal and environmental impacts. Our results show that metals are not considered to be fully accessible in any of the case studies due to a lack of necessary technologies and potential societal and environmental

  16. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    and verification of properties of XACML policies. Overall, we focus into two different area. The first part focuses on the access control language. More specifically our focus is on the understanding XACML 3.0. The second part focuses on how we use Logic Programming (LP) to model access control policies. We show...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...... framework using Answer Set Programming (ASP). With ASP we model an XACML PDP that loads XACML policies and evaluates XACML requests against these policies. The expressivity of ASP and the existence of efficient implementations of the answer set semantics provide the means for declarative specification...

  17. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  18. CORBA-Based Distributed Software Framework for the NIF Integrated Computer Control System

    Energy Technology Data Exchange (ETDEWEB)

    Stout, E A; Carey, R W; Estes, C M; Fisher, J M; Lagin, L J; Mathisen, D G; Reynolds, C A; Sanchez, R J

    2007-11-20

    The National Ignition Facility (NIF), currently under construction at the Lawrence Livermore National Laboratory, is a stadium-sized facility containing a 192-beam, 1.8 Megajoule, 500-Terawatt, ultra-violet laser system together with a 10-meter diameter target chamber with room for nearly 100 experimental diagnostics. The NIF is operated by the Integrated Computer Control System (ICCS) which is a scalable, framework-based control system distributed over 800 computers throughout the NIF. The framework provides templates and services at multiple levels of abstraction for the construction of software applications that communicate via CORBA (Common Object Request Broker Architecture). Object-oriented software design patterns are implemented as templates and extended by application software. Developers extend the framework base classes to model the numerous physical control points and implement specializations of common application behaviors. An estimated 140 thousand software objects, each individually addressable through CORBA, will be active at full scale. Many of these objects have persistent configuration information stored in a database. The configuration data is used to initialize the objects at system start-up. Centralized server programs that implement events, alerts, reservations, data archival, name service, data access, and process management provide common system wide services. At the highest level, a model-driven, distributed shot automation system provides a flexible and scalable framework for automatic sequencing of work-flow for control and monitoring of NIF shots. The shot model, in conjunction with data defining the parameters and goals of an experiment, describes the steps to be performed by each subsystem in order to prepare for and fire a NIF shot. Status and usage of this distributed framework are described.

  19. CORBA-based distributed software framework for the NIF integrated computer control system

    Energy Technology Data Exchange (ETDEWEB)

    Stout, E.A. [Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94550 (United States)], E-mail: stout6@llnl.gov; Carey, R.W.; Estes, C.M.; Fisher, J.M.; Lagin, L.J.; Mathisen, D.G.; Reynolds, C.A.; Sanchez, R.J. [Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94550 (United States)

    2008-04-15

    The National Ignition Facility (NIF), currently under construction at the Lawrence Livermore National Laboratory, is a stadium-sized facility containing a 192-beam, 1.8 MJ, 500 TW, ultra-violet laser system together with a 10-meter diameter target chamber with room for nearly 100 experimental diagnostics. The NIF is operated by the Integrated Computer Control System (ICCS) which is a scalable, framework-based control system distributed over 800 computers throughout the NIF. The framework provides templates and services at multiple levels of abstraction for the construction of software applications that communicate via CORBA (Common Object Request Broker Architecture). Object-oriented software design patterns are implemented as templates and extended by application software. Developers extend the framework base classes to model the numerous physical control points and implement specializations of common application behaviors. An estimated 140,000 software objects, each individually addressable through CORBA, will be active at full scale. Many of these objects have persistent configuration information stored in a database. The configuration data is used to initialize the objects at system start-up. Centralized server programs that implement events, alerts, reservations, data archival, name service, data access, and process management provide common system wide services. At the highest level, a model-driven, distributed shot automation system provides a flexible and scalable framework for automatic sequencing of workflow for control and monitoring of NIF shots. The shot model, in conjunction with data defining the parameters and goals of an experiment, describes the steps to be performed by each subsystem in order to prepare for and fire a NIF shot. Status and usage of this distributed framework are described.

  20. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    Science.gov (United States)

    2015-03-01

    Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia , Brazil, September 2014. Electronic Notes in Theoretical Computer Science (to... Brasilia , Brazil, September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on

  1. Planning Framework for Mesolevel Optimization of Urban Runoff Control Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Qianqian; Blohm, Andrew; Liu, Bo

    2017-04-01

    A planning framework is developed to optimize runoff control schemes at scales relevant for regional planning at an early stage. The framework employs less sophisticated modeling approaches to allow a practical application in developing regions with limited data sources and computing capability. The methodology contains three interrelated modules: (1)the geographic information system (GIS)-based hydrological module, which aims at assessing local hydrological constraints and potential for runoff control according to regional land-use descriptions; (2)the grading module, which is built upon the method of fuzzy comprehensive evaluation. It is used to establish a priority ranking system to assist the allocation of runoff control targets at the subdivision level; and (3)the genetic algorithm-based optimization module, which is included to derive Pareto-based optimal solutions for mesolevel allocation with multiple competing objectives. The optimization approach describes the trade-off between different allocation plans and simultaneously ensures that all allocation schemes satisfy the minimum requirement on runoff control. Our results highlight the importance of considering the mesolevel allocation strategy in addition to measures at macrolevels and microlevels in urban runoff management. (C) 2016 American Society of Civil Engineers.

  2. A framework for evaluating safety-net and other community-level factors on access for low-income populations.

    Science.gov (United States)

    Davidson, Pamela L; Andersen, Ronald M; Wyn, Roberta; Brown, E Richard

    2004-01-01

    The framework presented in this article extends the Andersen behavioral model of health services utilization research to examine the effects of contextual determinants of access. A conceptual framework is suggested for selecting and constructing contextual (or community-level) variables representing the social, economic, structural, and public policy environment that influence low-income people's use of medical care. Contextual variables capture the characteristics of the population that disproportionately relies on the health care safety net, the public policy support for low-income and safety-net populations, and the structure of the health care market and safety-net services within that market. Until recently, the literature in this area has been largely qualitative and descriptive and few multivariate studies comprehensively investigated the contextual determinants of access. The comprehensive and systematic approach suggested by the framework will enable researchers to strengthen the external validity of results by accounting for the influence of a consistent set of contextual factors across locations and populations. A subsequent article in this issue of Inquiry applies the framework to examine access to ambulatory care for low-income adults, both insured and uninsured.

  3. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  4. Safety of Mixed Model Access Control in a Multilevel System

    Science.gov (United States)

    2014-06-01

    Control Policies.” IEEE International Conference on System of Systems Engineering 2009, n.p. [16] C. R. McDaniel, and M. L . Tardy, Role-Based...read O (Object) if and only if lo ls ( l represents the security clearance) and S has discretionary read access to O [3]. The *-Property (Star...Fun 1546 uri=“dc:author”> 1547 <Ind>Randy Arvay</Ind> 1548 </Fun> 1549 </Expr> 1550

  5. Simplified Key Management for Digital Access Control of Information Objects

    Science.gov (United States)

    2016-07-02

    parties had an interest in controlling access and copying technologies. Examples include: player piano rolls early in the 20th century [1] and video tape...0001, Task BC-5-2283, “ Architecture , Design of Services for Air Force Wide Distributed Systems,” for USAF HQ USAF SAF/CIO A6. The views, opinions...an approach that relies on high-assurance architectures and the protection elements they provide through PKI. The distribution of private keys is a

  6. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  7. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  8. Integration of access control and ancillary information systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  9. Consistency Checking of Safety and Availability in Access Control

    Science.gov (United States)

    Li, Ruixuan; Lu, Jianfeng; Lu, Zhengding; Ma, Xiaopu

    The safety and availability policies are very important in an access control system for ensuring security and success when performing a certain task. However, conflicts may arise between safety and availability policies due to their opposite focuses. In this paper, we address the problem of consistency checking for safety and availability policies, especially for the co-existence of static separation-of-duty (SSoD) policies with availability policies, which determines whether there exists an access control state that satisfies all of these policies. We present criteria for determining consistency with a number of special cases, and show that the general case and partial subcases of the problem are intractable (NP-hard) and in the Polynomial Hierarchy NPNP. We design an algorithm to efficiently solve the nontrivial size instances for the intractable cases of the problem. The running example shows the validity of the proposed algorithm. The investigation will help the security officer to specify reasonable access control policies when both safety and availability policies coexist.

  10. Distributed Framework for Dynamic Telescope and Instrument Control

    Science.gov (United States)

    Ames, Troy J.; Case, Lynne

    2002-01-01

    Traditionally, instrument command and control systems have been developed specifically for a single instrument. Such solutions are frequently expensive and are inflexible to support the next instrument development effort. NASA Goddard Space Flight Center is developing an extensible framework, known as Instrument Remote Control (IRC) that applies to any kind of instrument that can be controlled by a computer. IRC combines the platform independent processing capabilities of Java with the power of the Extensible Markup Language (XML). A key aspect of the architecture is software that is driven by an instrument description, written using the Instrument Markup Language (IML). IML is an XML dialect used to describe graphical user interfaces to control and monitor the instrument, command sets and command formats, data streams, communication mechanisms, and data processing algorithms. The IRC framework provides the ability to communicate to components anywhere on a network using the JXTA protocol for dynamic discovery of distributed components. JXTA (see httD://www.jxta.org,) is a generalized protocol that allows any devices connected by a network to communicate in a peer-to-peer manner. IRC uses JXTA to advertise a device's IML and discover devices of interest on the network. Devices can join or leave the network and thus join or leave the instrument control environment of IRC. Currently, several astronomical instruments are working with the IRC development team to develop custom components for IRC to control their instruments. These instruments include: High resolution Airborne Wideband Camera (HAWC), a first light instrument for the Stratospheric Observatory for Infrared Astronomy (SOFIA); Submillimeter And Far Infrared Experiment (SAFIRE), a Principal Investigator instrument for SOFIA; and Fabry-Perot Interferometer Bolometer Research Experiment (FIBRE), a prototype of the SAFIRE instrument, used at the Caltech Submillimeter Observatory (CSO). Most recently, we have

  11. State control, access to capital and firm performance

    Directory of Open Access Journals (Sweden)

    Oliver Zhen Li

    2012-06-01

    Full Text Available We study the effect of state control on capital allocation and investment in China, where the government screens prospective stock issuers. We find that state firms are more likely to obtain government approval to conduct seasoned equity offerings than non-state firms. Further, non-state firms exhibit greater sensitivities of subsequent investment and stock performance to regulatory decisions on stock issuances than state firms. Our work suggests that state control of capital access distorts resource allocation and impedes the growth of non-state firms. We also provide robust evidence that financial constraints cause underinvestment.

  12. Energy efficiency and renewable energy policy in the Czech Republic within the framework of accession to the European Union

    International Nuclear Information System (INIS)

    Wees, M.T. van; Uyterlinde, M.A.; Maly, M.

    2002-01-01

    The main barrier for end-use energy efficiency and renewable energy in the Czech Republic is the lack of a stable political and regulatory framework. Market incentives can only properly work if the market conditions and restrictions are clear and stable. However, no comprehensive policies and regulation have been implemented in the Czech Republic. Although the acquis communautaire of the European Union includes regulation on energy efficiency and renewable energy, this topic remains low on the negotiation agenda for accession. This paper reports on the current situation in the Czech Republic, including the potentials for end-use energy efficiency and renewable energy, on the existing policy and regulatory framework, and on the remaining gaps with the requirements of accession to the European Union. Also, the impact of the recent increase of nuclear capacity on energy efficiency and renewable energy in the Czech Republic is discussed

  13. Framework for controlling infection through isolation precautions in Japan.

    Science.gov (United States)

    Kawakami, Kazumi; Misao, Hanako

    2014-03-01

    In Japan, nurses certified in infection control face organizational and structural challenges to the implementation of the recommended isolation precautions. In this study, we developed a conceptual framework for the problem-solving process of certified nurses in infection control when implementing appropriate isolation-precaution measures. We conducted a qualitative, descriptive study using directed content analysis. Semistructured interviews were conducted with 40 nurses who had over five years' experience in infection control. Factors assessing the risk of infection in patients were identified, including microorganism characteristics, patient characteristics, and risk of infection to the entire unit. The nurses also assessed the risk of infection in institutions from the following perspectives: organizational culture, infection control system, human resources, environment surrounding the facility, ethical issues, and external factors. Individual characteristics, such as attributes, knowledge, expertise, and job function, were identified as major influencing factors in the problem-solving process. These findings could be useful for newly-certified nurses in infection control and provide recommendations on implementing isolation-precaution measures. © 2014 Wiley Publishing Asia Pty Ltd.

  14. TP-model transformation-based-control design frameworks

    CERN Document Server

    Baranyi, Péter

    2016-01-01

    This book covers new aspects and frameworks of control, design, and optimization based on the TP model transformation and its various extensions. The author outlines the three main steps of polytopic and LMI based control design: 1) development of the qLPV state-space model, 2) generation of the polytopic model; and 3) application of LMI to derive controller and observer. He goes on to describe why literature has extensively studied LMI design, but has not focused much on the second step, in part because the generation and manipulation of the polytopic form was not tractable in many cases. The author then shows how the TP model transformation facilitates this second step and hence reveals new directions, leading to powerful design procedures and the formulation of new questions. The chapters of this book, and the complex dynamical control tasks which they cover, are organized so as to present and analyze the beneficial aspect of the family of approaches (control, design, and optimization). Additionally, the b...

  15. A practical receding horizon control framework for path planning and control of autonomous vtol vehicles

    Science.gov (United States)

    Liu, C.; Chen, W.-H.

    2013-12-01

    This paper describes an integrated path planning and tracking control framework for autonomous vertical-take-off-and-landing (VTOL) vehicles, particularly quadrotors. The path planning adopts a receding horizon strategy to repeatedly plan a local trajectory that satisfies both the vehicle dynamics and obstacle-free requirement. A tracking controller is then designed to track the planned path. The differential flatness property of the quadrotor is exploited in both path planner and tracking controller designs. The proposed framework is verified by real-time simulations incorporating online optimization.

  16. Creativity and Control : A Paradox: Evidence from the Levers of Control Framework

    NARCIS (Netherlands)

    Speklé, R.F.; Elten, van H.J.; Widener, S.

    2017-01-01

    Both control and creativity are important drivers of organizational success (Gilson, Mathieu, Shally, and Ruddy 2005; Hirst, Van Knippenberg, Chen, and Sacramento 2011). However, they are often regarded as conflicting. We use the Levers of Control (LoC) framework to examine the relationships between

  17. Creativity and Control : A Paradox-Evidence from the Levers of Control Framework

    NARCIS (Netherlands)

    Speklé, R.F.; van Elten, Hilco; Widener, Sally

    2017-01-01

    Both control and creativity are important drivers of organizational success (Gilson, Mathieu, Shally, and Ruddy 2005; Hirst, Van Knippenberg, Chen, and Sacramento 2011). However, they are often regarded as conflicting. We use the Levers of Control (LoC) framework to examine the relationships between

  18. On properties of modeling control software for embedded control applications with CSP/CT framework

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2003-01-01

    This PROGRESS project (TES.5224) traces a design framework for implementing embedded real-time software for control applications by exploiting its natural concurrency. The paper illustrates the stage of yielded automation in the process of structuring complex control software architectures, modeling

  19. Effective access to justice against state and non-state actors in the Framework Convention on Global Health: A proposal.

    Science.gov (United States)

    Hevia, Martin; Vacaflor, Carlos Herrera

    2013-06-14

    A Framework Convention on Global Health (FCGH) seeks to have a profound, effective, and broad impact: bringing access to health rights to the largest global community possible. One of the main issues the FCGH will address is how to make the right to health justiciable. An FCGH must articulate functional remedies for violations of the right to health by state or non-state actors. This paper analyzes one approach to ensuring the recognition of the rights defended in a future FCGH. Following the incremental development approach inspired by the architecture of other successful framework convention protocols, we propose the inclusion of access to health justice guidelines in an FCGH. This proposal is based on the amparo remedy, a figure already extant in the legislation of several Latin American countries; since its incorporation, these countries have witnessed a significant increase in litigation defending health rights. This is only one of many important advantages to broadly adopting guidelines based on the amparo remedy. The proposed guidelines would serve as a basic agreement on broad principles on access to health justice. Copyright © 2013 Hevia and Vacaflor. This is an open access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.

  20. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ezell, Matthew A [ORNL; Rogers, Gary L [University of Tennessee, Knoxville (UTK); Peterson, Gregory D. [University of Tennessee, Knoxville (UTK)

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  1. ATLAS Event Data Organization and I/O Framework Capabilities in Support of Heterogeneous Data Access and Processing Models

    CERN Document Server

    Malon, David; The ATLAS collaboration; van Gemmeren, Peter

    2016-01-01

    Choices in persistent data models and data organization have significant performance ramifications for data-intensive scientific computing. In experimental high energy physics, organizing file-based event data for efficient per-attribute retrieval may improve the I/O performance of some physics analyses but hamper the performance of processing that requires full-event access. In-file data organization tuned for serial access by a single process may be less suitable for opportunistic sub-file-based processing on distributed computing resources. Unique I/O characteristics of high-performance computing platforms pose additional challenges. This paper describes work in the ATLAS experiment at the Large Hadron Collider to provide an I/O framework and tools for persistent data organization to support an increasingly heterogenous array of data access and processing models.

  2. ATLAS Event Data Organization and I/O Framework Capabilities in Support of Heterogeneous Data Access and Processing Models

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00219732; The ATLAS collaboration; Cranshaw, Jack; van Gemmeren, Peter; Nowak, Marcin

    2016-01-01

    Choices in persistent data models and data organization have significant performance ramifications for data-intensive scientific computing. In experimental high energy physics, organizing file-based event data for efficient per-attribute retrieval may improve the I/O performance of some physics analyses but hamper the performance of processing that requires full-event access. In-file data organization tuned for serial access by a single process may be less suitable for opportunistic sub-file-based processing on distributed computing resources. Unique I/O characteristics of high-performance computing platforms pose additional challenges. The ATLAS experiment at the Large Hadron Collider employs a flexible I/O framework and a suite of tools and techniques for persistent data organization to support an increasingly heterogeneous array of data access and processing models.

  3. A Multimedia Framework for Second Language Teaching in Self-Access Environments.

    Science.gov (United States)

    Tamburini, Fabio

    1999-01-01

    Presents an account of a self-access language-teaching scheme operated at the University of Bologna (Italy) that was developed to teach English to university students by building a self-access environment available over a computer network. Discusses courseware, test generator, multimedia workstations, student use of laboratories, and future…

  4. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  5. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...

  6. Controlling Thermal Expansion: A Metal–Organic Frameworks Route

    Science.gov (United States)

    2016-01-01

    Controlling thermal expansion is an important, not yet resolved, and challenging problem in materials research. A conceptual design is introduced here, for the first time, for the use of metal–organic frameworks (MOFs) as platforms for controlling thermal expansion devices that can operate in the negative, zero, and positive expansion regimes. A detailed computer simulation study, based on molecular dynamics, is presented to support the targeted application. MOF-5 has been selected as model material, along with three molecules of similar size and known differences in terms of the nature of host–guest interactions. It has been shown that adsorbate molecules can control, in a colligative way, the thermal expansion of the solid, so that changing the adsorbate molecules induces the solid to display positive, zero, or negative thermal expansion. We analyze in depth the distortion mechanisms, beyond the ligand metal junction, to cover the ligand distortions, and the energetic and entropic effect on the thermo-structural behavior. We provide an unprecedented atomistic insight on the effect of adsorbates on the thermal expansion of MOFs as a basic tool toward controlling the thermal expansion. PMID:28190918

  7. Controlling Thermal Expansion: A Metal-Organic Frameworks Route.

    Science.gov (United States)

    Balestra, Salvador R G; Bueno-Perez, Rocio; Hamad, Said; Dubbeldam, David; Ruiz-Salvador, A Rabdel; Calero, Sofia

    2016-11-22

    Controlling thermal expansion is an important, not yet resolved, and challenging problem in materials research. A conceptual design is introduced here, for the first time, for the use of metal-organic frameworks (MOFs) as platforms for controlling thermal expansion devices that can operate in the negative, zero, and positive expansion regimes. A detailed computer simulation study, based on molecular dynamics, is presented to support the targeted application. MOF-5 has been selected as model material, along with three molecules of similar size and known differences in terms of the nature of host-guest interactions. It has been shown that adsorbate molecules can control, in a colligative way, the thermal expansion of the solid, so that changing the adsorbate molecules induces the solid to display positive, zero, or negative thermal expansion. We analyze in depth the distortion mechanisms, beyond the ligand metal junction, to cover the ligand distortions, and the energetic and entropic effect on the thermo-structural behavior. We provide an unprecedented atomistic insight on the effect of adsorbates on the thermal expansion of MOFs as a basic tool toward controlling the thermal expansion.

  8. Design research as a framework to evaluate the usability and accessibility of the digital doorway

    CSIR Research Space (South Africa)

    Adebesin, F

    2011-09-01

    Full Text Available hardly ever involves the use of a sound and recognized research methodology. Design research is increasingly being used as a theoretical and methodological framework for information systems research in general, and HCI research in particular. Design...

  9. A framework for evaluating hydrogen control and management

    International Nuclear Information System (INIS)

    Lee, Seung Dong; Suh, Kune Yul; Jae, Moosung

    2003-01-01

    The present paper presents a new framework for assessing accident management strategies using decision trees. The containment event tree (CET) model considers characteristics associated with the implementation of each strategy. It is constructed and quantified using data obtained from NUREG-1150, other probabilistic risk assessments, and the MAAP4 calculations. The proposed framework for evaluating hydrogen control strategies is based on the concept of a measure using a risk triplet. Ulchin units of nuclear power plants 3 and 4 are used as the reference plant. On the basis of best-estimate assessment, it is shown that it is beneficial to execute hydrogen igniters rather than to do nothing with respect to expected value of hydrogen concentration in the containment during an accident. The proposed approach is shown to be flexible in that it can be applied to various accident management strategies based on the timing of mitigation. The advantage of using the CET for assessing an accident management strategy lies with its capability for modeling both the positive and negative aspects associated with progression of the accident, which may in turn affect the containment failure mode

  10. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  11. Framework for rapid assessment and adoption of new vector control tools.

    Science.gov (United States)

    Vontas, John; Moore, Sarah; Kleinschmidt, Immo; Ranson, Hilary; Lindsay, Steve; Lengeler, Christian; Hamon, Nicholas; McLean, Tom; Hemingway, Janet

    2014-04-01

    Evidence-informed health policy making is reliant on systematic access to, and appraisal of, the best available research evidence. This review suggests a strategy to improve the speed at which evidence is gathered on new vector control tools (VCTs) using a framework based on measurements of the vectorial capacity of an insect population to transmit disease. We explore links between indicators of VCT efficacy measurable in small-scale experiments that are relevant to entomological and epidemiological parameters measurable only in large-scale proof-of-concept randomised control trials (RCTs). We hypothesise that once RCTs establish links between entomological and epidemiological indicators then rapid evaluation of new products within the same product category may be conducted through smaller scale experiments without repetition of lengthy and expensive RCTs. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. A Learning Framework for Control-Oriented Modeling of Buildings

    Energy Technology Data Exchange (ETDEWEB)

    Rubio-Herrero, Javier; Chandan, Vikas; Siegel, Charles M.; Vishnu, Abhinav; Vrabie, Draguna L.

    2018-01-18

    Buildings consume a significant amount of energy worldwide. Several building optimization and control use cases require models of energy consumption which are control oriented, have high predictive capability, imposes minimal data pre-processing requirements, and have the ability to be adapted continuously to account for changing conditions as new data becomes available. Data driven modeling techniques, that have been investigated so far, while promising in the context of buildings, have been unable to simultaneously satisfy all the requirements mentioned above. In this context, deep learning techniques such as Recurrent Neural Networks (RNNs) hold promise, empowered by advanced computational capabilities and big data opportunities. In this paper, we propose a deep learning based methodology for the development of control oriented models for building energy management and test in on data from a real building. Results show that the proposed methodology outperforms other data driven modeling techniques significantly. We perform a detailed analysis of the proposed methodology along dimensions such as topology, sensitivity, and downsampling. Lastly, we conclude by envisioning a building analytics suite empowered by the proposed deep framework, that can drive several use cases related to building energy management.

  13. Integrating adjustable autonomy in an intelligent control framework

    Science.gov (United States)

    DeKoven, Elyon A. M.; Wood, Scott D.

    2005-10-01

    Currently, multiple humans are needed to operate a single uninhabited aerial vehicle (UAV). In the near future, combat techniques will involve single operators controlling multiple uninhabited ground and air vehicles. This situation creates both technological hurdles as well as interaction design challenges that must be addressed to support future fighters. In particular, the system will need to negotiate with the operator about proper task delegation, keeping the operator appropriately apprised of autonomous actions. This in turn implies that the system must know what the user is doing, what needs to be done in the present situation, and the comparative strengths for of the human and the system in each task. Towards building such systems, we are working on an Intelligent Control Framework (ICF) that provides a layer of intelligence to support future warfighters in complex task environments. The present paper presents the Adjustable Autonomy Module (AAM) in ICF. The AAM encapsulates some capabilities for user plan recognition, situation reasoning, and authority delegation control. The AAM has the knowledge necessary to support operator-system dialogue about autonomy changes, and it also provides the system with the ability to act on this knowledge. Combined with careful interaction design, planning and plan-execution capabilities, the AAM enables future design and development of effective human-robot teams.

  14. Access point analysis in smoking and nonsmoking adolescents: Findings from the European Smoking Prevention Framework Approach study

    NARCIS (Netherlands)

    Vries, H. de; Riet, J.P. van 't; Panday, S.; Reubsaet, A.

    2007-01-01

    This study analyzed possibilities to access European adolescents for tobacco control activities in out-of-school settings as part of comprehensive tobacco control programs. Data on leisure time behaviors of secondary school students were gathered during three waves from six European Union countries

  15. BRICK v0.2, a simple, accessible, and transparent model framework for climate and regional sea-level projections

    Science.gov (United States)

    Wong, Tony E.; Bakker, Alexander M. R.; Ruckert, Kelsey; Applegate, Patrick; Slangen, Aimée B. A.; Keller, Klaus

    2017-07-01

    Simple models can play pivotal roles in the quantification and framing of uncertainties surrounding climate change and sea-level rise. They are computationally efficient, transparent, and easy to reproduce. These qualities also make simple models useful for the characterization of risk. Simple model codes are increasingly distributed as open source, as well as actively shared and guided. Alas, computer codes used in the geosciences can often be hard to access, run, modify (e.g., with regards to assumptions and model components), and review. Here, we describe the simple model framework BRICK (Building blocks for Relevant Ice and Climate Knowledge) v0.2 and its underlying design principles. The paper adds detail to an earlier published model setup and discusses the inclusion of a land water storage component. The framework largely builds on existing models and allows for projections of global mean temperature as well as regional sea levels and coastal flood risk. BRICK is written in R and Fortran. BRICK gives special attention to the model values of transparency, accessibility, and flexibility in order to mitigate the above-mentioned issues while maintaining a high degree of computational efficiency. We demonstrate the flexibility of this framework through simple model intercomparison experiments. Furthermore, we demonstrate that BRICK is suitable for risk assessment applications by using a didactic example in local flood risk management.

  16. Challenges with access to healthcare from the perspective of patients living with HIV: a scoping review & framework synthesis.

    Science.gov (United States)

    Asghari, Shabnam; Hurd, Jillian; Marshall, Zack; Maybank, Allison; Hesselbarth, Lydia; Hurley, Oliver; Farrell, Alison; Kendall, Claire E; Rourke, Sean B; Becker, Marissa; Johnston, Sharon; Lundrigan, Phil; Rosenes, Ron; Bibeau, Christine; Liddy, Clare

    2018-02-04

    Accessing healthcare can be difficult but the barriers multiply for people living with HIV (PLHIV). To improve access and the health of PLHIV, we must consider their perspectives and use them to inform standard practice. A better understanding of the current literature related to healthcare access from the perspective of PLHIV, can help to identify evidence gaps and highlight research priorities and opportunities. To identify relevant peer-reviewed publications, search strategies were employed. Electronic and grey literature databases were explored. Articles were screened based on their title and abstract and those that met the screening criteria, were reviewed in full. Data analysis was conducted using a collaborative approach that included knowledge user consultation. Initial concepts were extracted, summarized and through framework synthesis, developed into emerging and final themes. From 20,678 articles, 326 articles met the initial screening criteria and 64 were reviewed in full. The final themes identified, in order of most to least frequent were: Acceptability, Availability, Accessibility, Affordability, Other Barriers, Communication, Satisfaction, Accommodation, Preferences and Equity in Access. The most frequently discussed concepts related to negative interactions with staff, followed by long wait times, limited household resources or inability to pay fees, and fear of one's serostatus being disclosed. Knowledge users were in agreement with the categorization of initial concepts and final themes; however, some gaps in the literature were identified. Specific changes are critical to improving access to healthcare for PLHIV. These include improving availability by ensuring staff and healthcare professionals have proper training, cultivating acceptability and reducing stigma through improving HIV awareness, increasing accessibility through increased HIV information for PLHIV and improved dissemination of this information to increase patient knowledge and

  17. A Knowledge-Constrained Access Control Model for Protecting Patient Privacy in Hospital Information Systems.

    Science.gov (United States)

    Zhang, Runtong; Chen, Donghua; Shang, Xiaopu; Zhu, Xiaomin; Liu, Kecheng

    2017-04-24

    Current access control mechanisms of the hospital information system can hardly identify the real access intention of system users. A relaxed access control increases the risk of compromise of patient privacy. To reduce unnecessary access of patient information by hospital staff, this paper proposes a Knowledge-Constrained Role-Based Access Control (KC-RBAC) model in which a variety of medical domain knowledge is considered in access control. Based on the proposed Purpose Tree and knowledge-involved algorithms, the model can dynamically define the boundary of access to the patient information according to the context, which helps protect patient privacy by controlling access. Compared with the Role-Based Access Control model, KC-RBAC can effectively protect patient information according to the results of the experiments.

  18. Hybrid Zeolitic Imidazolate Frameworks: Controlling Framework Porosity and Functionality by Mixed-Linker Synthesis

    KAUST Repository

    Thompson, Joshua A.

    2012-05-22

    Zeolitic imidazolate frameworks (ZIFs) are a subclass of nanoporous metal-organic frameworks (MOFs) that exhibit zeolite-like structural topologies and have interesting molecular recognition properties, such as molecular sieving and gate-opening effects associated with their pore apertures. The synthesis and characterization of hybrid ZIFs with mixed linkers in the framework are described in this work, producing materials with properties distinctly different from the parent frameworks (ZIF-8, ZIF-90, and ZIF-7). NMR spectroscopy is used to assess the relative amounts of the different linkers included in the frameworks, whereas nitrogen physisorption shows the evolution of the effective pore size distribution in materials resulting from the framework hybridization. X-ray diffraction shows these hybrid materials to be crystalline. In the case of ZIF-8-90 hybrids, the cubic space group of the parent frameworks is continuously maintained, whereas in the case of the ZIF-7-8 hybrids there is a transition from a cubic to a rhombohedral space group. Nitrogen physisorption data reveal that the hybrid materials exhibit substantial changes in gate-opening phenomena, either occurring at continuously tunable partial pressures of nitrogen (ZIF-8-90 hybrids) or loss of gate-opening effects to yield more rigid frameworks (ZIF-7-8 hybrids). With this synthetic approach, significant alterations in MOF properties may be realized to suit a desired separation or catalytic process. © 2012 American Chemical Society.

  19. Access control violation prevention by low-cost infrared detection

    Science.gov (United States)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  20. Policy framework on energy access and key development indicators: ECOWAS interventions and the case of Ghana

    International Nuclear Information System (INIS)

    Aglina, Moses Kwame; Agbejule, Adebayo; Nyamuame, Godwin Yao

    2016-01-01

    Energy has become the main driver for development as industries grow, agricultural sectors become more modernized, economies boom and countries become wealthy. There are still vast majority of people living under the poverty line especially in the ECOWAS region. The purpose of this study is to explore how improvements in energy access can be a key driver in economic development and progress in the ECOWAS region. Data for the study was obtained from the database of the World Bank. A regression analysis was carried out to establish the relationships between energy access and development indicators. The paper suggests the need for policy makers in the ECOWAS region to focus on targets, such as household access, consumption of electricity, and ease of use instead on supply targets that focus merely on physical coverage. A case on how Ghana is improving energy access is presented. - Highlights: • Energy policies in the ECOWAS region must focus on demand side targets. • Energy policies should target rural and peri-urban areas of the ECOWAS region. • Improved energy access requires a new supply chain energy model.

  1. A framework to prevent and control tobacco among adolescents and children: introducing the IMPACT model.

    Science.gov (United States)

    Arora, Monika; Mathur, Manu Raj; Singh, Neha

    2013-03-01

    The objective of this paper is to provide a comprehensive evidence based model aimed at addressing multi-level risk factors influencing tobacco use among children and adolescents with multi-level policy and programmatic approaches in India. Evidences around effectiveness of policy and program interventions from developed and developing countries were reviewed using Pubmed, Scopus, Google Scholar and Ovid databases. This evidence was then categorized under three broad approaches: Policy level approaches (increased taxation on tobacco products, smoke-free laws in public places and work places, effective health warnings, prohibiting tobacco advertising, promotions and sponsorships, and restricting access to minors); Community level approaches (school health programs, mass media campaigns, community based interventions, promoting tobacco free norms) and Individual level approaches (promoting cessation in various settings). This review of literature around determinants and interventions was organized into developing the IMPACT framework. The paper further presents a comparative analysis of tobacco control interventions in India vis a vis the proposed approaches. Mixed results were found for prevention and control efforts targeting youth. However, this article suggests a number of intervention strategies that have shown to be effective. Implementing these interventions in a coordinated way will provide potential synergies across interventions. Pediatricians have prominent role in advocating and implementing the IMPACT framework in countries aiming to prevent and control tobacco use among adolescents and children.

  2. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  3. Radical covalent organic frameworks: a general strategy to immobilize open-accessible polyradicals for high-performance capacitive energy storage.

    Science.gov (United States)

    Xu, Fei; Xu, Hong; Chen, Xiong; Wu, Dingcai; Wu, Yang; Liu, Hao; Gu, Cheng; Fu, Ruowen; Jiang, Donglin

    2015-06-01

    Ordered π-columns and open nanochannels found in covalent organic frameworks (COFs) could render them able to store electric energy. However, the synthetic difficulty in achieving redox-active skeletons has thus far restricted their potential for energy storage. A general strategy is presented for converting a conventional COF into an outstanding platform for energy storage through post-synthetic functionalization with organic radicals. The radical frameworks with openly accessible polyradicals immobilized on the pore walls undergo rapid and reversible redox reactions, leading to capacitive energy storage with high capacitance, high-rate kinetics, and robust cycle stability. The results suggest that channel-wall functional engineering with redox-active species will be a facile and versatile strategy to explore COFs for energy storage. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  5. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the fifteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  6. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held July 15, 2011, from...

  7. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  8. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  9. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...: Airport Security Access Control Systems. DATES: The meeting will be held September 15, 2011, from 10 a.m...

  10. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-fourth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  12. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...: Airport Security Access Control Systems. DATES: The meeting will be held October 20, 2011, from 10 a.m. to...

  13. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  14. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-third meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  15. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  16. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  17. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  18. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twentieth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  19. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  20. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the sixteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  1. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  2. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  3. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  4. An Object-Oriented Approach to Security Policies and their Access Controls for Database Management

    Science.gov (United States)

    1991-09-01

    access control requiremnts is a messy task. It may result in a system less reliable and secure than building a new system from scratch. Further, we have...means to specify access control requirments for the need-to-know policy. B. Actions as Access Priviledges and Queries in an Object-Class Hierarchy The...database. Access priviledges include read. update. append, delete. etc. An access query is a logical expression of predicates defining the parn of a data

  5. Employing human rights frameworks to realize access to an HIV cure.

    Science.gov (United States)

    Meier, Benjamin Mason; Gelpi, Adriane; Kavanagh, Matthew M; Forman, Lisa; Amon, Joseph J

    2015-01-01

    The scale of the HIV pandemic - and the stigma, discrimination and violence that surrounded its sudden emergence - catalyzed a public health response that expanded human rights in principle and practice. In the absence of effective treatment, human rights activists initially sought to protect individuals at high risk of HIV infection. With advances in antiretroviral therapy, activists expanded their efforts under international law, advocating under the human right to health for individual access to treatment. As a clinical cure comes within reach, human rights obligations will continue to play a key role in political and programmatic decision-making. Building upon the evolving development and implementation of the human right to health in the global response to HIV, we outline a human rights research agenda to prepare for HIV cure access, investigating the role of human rights law in framing 1) resource allocation, 2) international obligations, 3) intellectual property and 4) freedom from coercion. The right to health is widely recognized as central to governmental, intergovernmental and non-governmental responses to the pandemic and critical both to addressing vulnerability to infection and to ensuring universal access to HIV prevention, treatment, care and support. While the advent of an HIV cure will raise new obligations for policymakers in implementing the right to health, the resolution of past debates surrounding HIV prevention and treatment may inform claims for universal access.

  6. Employing human rights frameworks to realize access to an HIV cure

    Science.gov (United States)

    Meier, Benjamin Mason; Gelpi, Adriane; Kavanagh, Matthew M; Forman, Lisa; Amon, Joseph J

    2015-01-01

    Introduction The scale of the HIV pandemic – and the stigma, discrimination and violence that surrounded its sudden emergence – catalyzed a public health response that expanded human rights in principle and practice. In the absence of effective treatment, human rights activists initially sought to protect individuals at high risk of HIV infection. With advances in antiretroviral therapy, activists expanded their efforts under international law, advocating under the human right to health for individual access to treatment. Discussion As a clinical cure comes within reach, human rights obligations will continue to play a key role in political and programmatic decision-making. Building upon the evolving development and implementation of the human right to health in the global response to HIV, we outline a human rights research agenda to prepare for HIV cure access, investigating the role of human rights law in framing 1) resource allocation, 2) international obligations, 3) intellectual property and 4) freedom from coercion. Conclusions The right to health is widely recognized as central to governmental, intergovernmental and non-governmental responses to the pandemic and critical both to addressing vulnerability to infection and to ensuring universal access to HIV prevention, treatment, care and support. While the advent of an HIV cure will raise new obligations for policymakers in implementing the right to health, the resolution of past debates surrounding HIV prevention and treatment may inform claims for universal access. PMID:26568056

  7. Framework for TV white space spectrum access in Southern African Development Community (SADC)

    CSIR Research Space (South Africa)

    Masonta, MT

    2013-09-01

    Full Text Available The global migration of television (TV) from analogue to digital broadcast will see a large amount of TV spectrum available (called TV white space - TVWS) for other services such as mobile and broadband wireless access (BWA). Leading spectrum...

  8. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  9. The BridgeDb framework: standardized access to gene, protein and metabolite identifier mapping services

    Directory of Open Access Journals (Sweden)

    Hanspers Kristina

    2010-01-01

    Full Text Available Abstract Background Many complementary solutions are available for the identifier mapping problem. This creates an opportunity for bioinformatics tool developers. Tools can be made to flexibly support multiple mapping services or mapping services could be combined to get broader coverage. This approach requires an interface layer between tools and mapping services. Results Here we present BridgeDb, a software framework for gene, protein and metabolite identifier mapping. This framework provides a standardized interface layer through which bioinformatics tools can be connected to different identifier mapping services. This approach makes it easier for tool developers to support identifier mapping. Mapping services can be combined or merged to support multi-omics experiments or to integrate custom microarray annotations. BridgeDb provides its own ready-to-go mapping services, both in webservice and local database forms. However, the framework is intended for customization and adaptation to any identifier mapping service. BridgeDb has already been integrated into several bioinformatics applications. Conclusion By uncoupling bioinformatics tools from mapping services, BridgeDb improves capability and flexibility of those tools. All described software is open source and available at http://www.bridgedb.org.

  10. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access... Information Act (5 U.S.C. 552, as amended). (b) Public access to documents declassified in accordance with...

  11. Strengthening tactical planning and operational frameworks for vector control: the roadmap for malaria elimination in Namibia.

    Science.gov (United States)

    Chanda, Emmanuel; Ameneshewa, Birkinesh; Angula, Hans A; Iitula, Iitula; Uusiku, Pentrina; Trune, Desta; Islam, Quazi M; Govere, John M

    2015-08-05

    Namibia has made tremendous gains in malaria control and the epidemiological trend of the disease has changed significantly over the past years. In 2010, the country reoriented from the objective of reducing disease morbidity and mortality to the goal of achieving malaria elimination by 2020. This manuscript outlines the processes undertaken in strengthening tactical planning and operational frameworks for vector control to facilitate expeditious malaria elimination in Namibia. The information sources for this study included all available data and accessible archived documentary records on malaria vector control in Namibia. A methodical assessment of published and unpublished documents was conducted via a literature search of online electronic databases, Google Scholar, PubMed and WHO, using a combination of search terms. To attain the goal of elimination in Namibia, systems are being strengthened to identify and clear all infections, and significantly reduce human-mosquito contact. Particularly, consolidating vector control for reducing transmission at the identified malaria foci will be critical for accelerated malaria elimination. Thus, guarding against potential challenges and the need for evidence-based and sustainable vector control instigated the strengthening of strategic frameworks by: adopting the integrated vector management (IVM) strategy; initiating implementation of the global plan for insecticide resistance management (GPIRM); intensifying malaria vector surveillance; improving data collection and reporting systems on DDT; updating the indoor residual spraying (IRS) data collection and reporting tool; and, improving geographical reconnaissance using geographical information system-based satellite imagery. Universal coverage with IRS and long-lasting insecticidal nets, supplemented by larval source management in the context of IVM and guided by vector surveillance coupled with rational operationalization of the GPIRM, will enable expeditious

  12. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  13. HACS: A Hybrid Framework for Continuous Flexible and Controlled Architecting

    Directory of Open Access Journals (Sweden)

    Bentlemsan Khadidja

    2017-12-01

    Full Text Available Systems like e-voting, e-banking or e-health must offer flexibility to continuously meet technical and legal changing requirements and must at the same time guarantee robustness to respect their security and sensitivity. Component Based Software Engineering (CBSE and Service Oriented Software Engineering (SOSE with their modular design represent the most suitable paradigms for those systems. They have strong complementary advantages, despite their similarities, their heterogeneity still hinders systems to benefit from both of them. In this paper, we propose a hybrid framework HACS (Hybrid Approach between Component and Service. HACS proposes to define sensitive systems as a hybrid architecture where the critical parts are controlled according to CBSE coupled to the flexibility and dynamism of SOSE. To address heterogeneity and make possible the substitution between hybrid components, HACS uses a common syntax with semantic annotations based on SAWSDL related to two ontologies; HACS ontology and domain ontology. We illustrate HACS all along the paper through an e-voting case study.

  14. A generic finite state machine framework for the ACNET control system

    International Nuclear Information System (INIS)

    Carmichael, L.; Warner, A.

    2009-01-01

    A significant level of automation and flexibility has been added to the ACNET control system through the development of a Java-based Finite State Machine (FSM) infrastructure. These FSMs are integrated into ACNET and allow users to easily build, test and execute scripts that have full access to ACNET's functionality. In this paper, a description will be given of the FSM design and its ties to the Java-based Data Acquisition Engine (DAE) framework. Each FSM is part of a client-server model with FSM display clients using Remote Method Invocation (RMI) to communicate with DAE servers heavily coupled to ACNET. A web-based monitoring system that allows users to utilize browsers to observe persistent FSMs will also be discussed. Finally, some key implementations such as the crash recovery FSM developed for the Electron Cooling machine protection system will be presented.

  15. A generic finite state machine framework for the ACNET control system

    Energy Technology Data Exchange (ETDEWEB)

    Carmichael, L.; Warner, A.; /Fermilab

    2009-10-01

    A significant level of automation and flexibility has been added to the ACNET control system through the development of a Java-based Finite State Machine (FSM) infrastructure. These FSMs are integrated into ACNET and allow users to easily build, test and execute scripts that have full access to ACNET's functionality. In this paper, a description will be given of the FSM design and its ties to the Java-based Data Acquisition Engine (DAE) framework. Each FSM is part of a client-server model with FSM display clients using Remote Method Invocation (RMI) to communicate with DAE servers heavily coupled to ACNET. A web-based monitoring system that allows users to utilize browsers to observe persistent FSMs will also be discussed. Finally, some key implementations such as the crash recovery FSM developed for the Electron Cooling machine protection system will be presented.

  16. Developing and Testing a Best Practice Framework for Energy Access Interventions

    DEFF Research Database (Denmark)

    Chen, Xiaoxiao; Narkeviciute, Rasa; Haselip, James Arthur

    2015-01-01

    , absolute, measures of best practice and highly contextual realities where baselines are often lacking. However, the methodology does offer a comparative means to highlight the relative strengths and weaknesses of any given project, enabling both ex-post assessments and project learning. The study features...... an analysis of cases selected from the Energy Access Knowledge Base, published by the Global Network on Energy for Sustainable Development (GNESD). Copyright © 2015 John Wiley & Sons, Ltd and ERP Environment...

  17. Stereo under Sequential Optimal Sampling: A Statistical Analysis Framework for Search Space Reduction (Open Access)

    Science.gov (United States)

    2014-09-24

    Stereo under Sequential Optimal Sampling: A Statistical Analysis Framework for Search Space Reduction Yilin Wang, Ke Wang, Enrique Dunn, Jan-Michael...100 Patch size 1 10 100 Re du nd an cy 0.1 10 20 30 40 50 60 70 80 90 100 Patch size 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 Sa m pl in gR at io 0 0.02

  18. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  19. Sustainable Development of Renewable Energy Mini-grids for Energy Access: A Framework for Policy Design

    Energy Technology Data Exchange (ETDEWEB)

    Deshmukh, Ranjit [Univ. of California, Berkeley, CA (United States); Carvallo, Juan Pablo [Univ. of California, Berkeley, CA (United States); Gambhir, Ashwin [Univ. of California, Berkeley, CA (United States)

    2013-03-01

    We emphasize the importance of concurrently considering all components of a mini-grid policy, designing each component through the lenses of different stakeholders, and fostering mini-grids as an integral part of a country’s electricity access efforts. Policymakers have multiple options, and it is the combination of these in the institutional and financial capacity of the government context that will decide the success of the program. There are no silver bullet solutions, but a thorough understanding of the existing technical and institutional capacities, as well as the stakeholders’ interests and sociocultural context will enable the design of an effective policy instrument.

  20. Resonant Frequency Control For the PIP-II Injector Test RFQ: Control Framework and Initial Results

    Energy Technology Data Exchange (ETDEWEB)

    Edelen, A. L. [Colorado State U.; Biedron, S. G.; Milton, S. V.; Bowring, D.; Chase, B. E.; Edelen, J. P.; Nicklaus, D.; Steimel, J.

    2016-12-16

    For the PIP-II Injector Test (PI-Test) at Fermilab, a four-vane radio frequency quadrupole (RFQ) is designed to accelerate a 30-keV, 1-mA to 10-mA, H- beam to 2.1 MeV under both pulsed and continuous wave (CW) RF operation. The available headroom of the RF amplifiers limits the maximum allowable detuning to 3 kHz, and the detuning is controlled entirely via thermal regulation. Fine control over the detuning, minimal manual intervention, and fast trip recovery is desired. In addition, having active control over both the walls and vanes provides a wider tuning range. For this, we intend to use model predictive control (MPC). To facilitate these objectives, we developed a dedicated control framework that handles higher-level system decisions as well as executes control calculations. It is written in Python in a modular fashion for easy adjustments, readability, and portability. Here we describe the framework and present the first control results for the PI-Test RFQ under pulsed and CW operation.

  1. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  2. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  3. Concurrency control and recovery on lightweight directory access protocol

    Science.gov (United States)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  4. Analysing accessibility effects in a continuous treatment framework: the case of Copenhagen metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    This paper tests the the impact of a public transport infrastructure on commuting distances by analysing the behaviour of workers who were living in the neighbourhood of the new facility when the location of stations was decided. The infrastructure analyzed was the first phase of the Copenhagen...... Metro where 6 metro stations were selected for analysis: Lergravsparken, Amagerbro, Islands Brygge, DR Byen, Bella Center, Sundby. The analysis focused on residents living within 1000 meters of the coming metro stations in 1996 – when the plans where approved, and 8 years before the opening. The paper...... apply adose-response approach under the assumption of weak unconfoundedness to first assessing the possible presence of residential selectivity and to estimate job accessibility effects of the metro. The paper analyzes residential immobility and wage employment, finding that proximity to a metro station...

  5. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  6. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  7. The new control system of J-TEXT divertor power supply system using J-TEXT real-time framework

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Ming; Zheng, Guozhen; Chen, Zhi [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); College of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China); Zheng, Wei, E-mail: zhengwei@hust.edu.cn [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); College of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China); Yuan, Tao; Li, Yang [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); College of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China)

    2016-11-15

    Highlights: • The most highlight of this paper is the J-TEXT Real-Time Framework (JRTF). JRTF is a flexible real-time software framework which allows users to develop real-time applications rapidly without compromise on the performance. It makes a clear separation between control functions and hard/software administration, developers just need to focus on the control logic and algorithms. • The JRTF based control system can achieve a precise control loop cycle of 1 ms and a jitter under 0.01 ms on Linux operation system. The real-time performance meets the requirement of the real-time control tasks in J-TEXT. • Several days of operation with no faults were already achieved with the system running and in real-time 8 h per day. The stability of the new system is qualified for discharging experiment. - Abstract: The J-TEXT divertor power supply system is designed as a parallel connection, 12-pulse rectifier which is powered by a 100 MVA pulse generator unit. To achieve robust current feedback control, high performance real-time control system is required. The new control system adopts a more powerful software framework named J-TEXT real-time framework (JRTF). JRTF is a flexible real-time software framework designed for the implementation of real-time control systems. A JRTF application contains various Application Blocks (AB) which execute specific functions such as feedback computing and protection. JRTF is compatible with ITER standard PFC (Plant Fast Controller) hardware and ITER CODAC (Control, Data Access and Communication) Core software, so it can be monitored and configured by any EPICS based control system. The hardware of the new control system is upgraded to standard ITER fast controller which are much faster and more reliable than former controllers. This control system is the first application of JRTF, and the result shows that the new control system is running properly and stably. It provides an instance for real-time control schemes in J-TEXT, and

  8. THE THEORETICAL CONCEPTUAL FRAMEWORK WITH REFERENCE TO THE ROLE OF INSTITUTIONS IN THE PROCESS OF ACCESSION TO THE EU

    Directory of Open Access Journals (Sweden)

    Eugenia FEURAS

    2016-09-01

    Full Text Available One of the primary competitive factors of a country is the state of institutions. EU membership requires substantial changes in the content and structure of the institutional framework of the acceding countries, which could generate progress or regress in their development if the existing institutions and the transferred ones are incompatible. In this article the author has undertaken the task to examine, theoretically and conceptually, the process of institutional change in terms of three concepts: Europeanization, institutional transfer and path dependence. There have been analysed the forms, tools, methods and costs of institutional transfer and possible institutional failures. This research has come to the conclusion that in the situation of the Republic of Moldova, the partial modification of institutions is mainly determined by the desire of the veto players to survive and not by the consistent abidance of the accession process to the EU.

  9. Using Python Scripting and Web Frameworks to Access Spatial and Temporal Data via KML

    Science.gov (United States)

    Erickson, T. A.; Koziol, B. W.

    2010-12-01

    Ever increasing volumes of spatial and temporal data about our world are being made available for download by various organizations. However, the data formats used are generally well-suited for storing large volumes of data but are not directly usable without specialized software. Also in recent years, there has been a wide adoption of easy-to-use virtual globe browsers (such as Google Earth) for viewing spatial and temporal datasets, but these applications cannot directly work with many large datasets due to the formats and/or the size of the datasets. This work presents several examples of Python-based data systems for accessing, filtering, and transforming large and complex spatial and temporal datasets into KML, an Open Geospatial Consortium (OGC) standard used for visualization and annotation of two-dimensional and three-dimensional data. Precipitable water forecasted by the NCEP Global Forecast System (GFS) model. Soil moisture content for December 2024 predicted by an IPCC model (GFDL R30).

  10. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  11. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 22, No 1 (2015) >. Log in or Register to get access to full text downloads.

  12. Videoconferencing across cultures : A conceptual framework for floor control issues

    NARCIS (Netherlands)

    Dustdar,; Schahram,; Hofstede, G.J.

    1999-01-01

    This paper discusses critical issues in cross-cultural communication and collaboration using desktop videoconferencing tools. Our first objective is to propose a conceptual framework for predicting which issues will be important for communication in cross-cultural desktop videoconferencing. Using

  13. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  14. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  15. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  16. A Unified Framework of the Performance Evaluation of Optical Time-Wavelength Code-Division Multiple-Access Systems

    Science.gov (United States)

    Inaty, Elie

    In this paper, we provide an analysis to the performance of optical time-wavelength code-division multiple-access (OTW-CDMA) network when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one coincidence sequences with non-repeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of OTW-CDMA system may be critically affected when working above the nominal limit; an event that may happen when the network operates at high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed MAC protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T; while the R3T is better at very high transmission rates. However, in general it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  17. Unified Desktop for Monitoring & Control Applications - The Open Navigator Framework Applied for Control Centre and EGSE Applications

    Science.gov (United States)

    Brauer, U.

    2007-08-01

    The Open Navigator Framework (ONF) was developed to provide a unified and scalable platform for user interface integration. The main objective for the framework was to raise usability of monitoring and control consoles and to provide a reuse of software components in different application areas. ONF is currently applied for the Columbus onboard crew interface, the commanding application for the Columbus Control Centre, the Columbus user facilities specialized user interfaces, the Mission Execution Crew Assistant (MECA) study and EADS Astrium internal R&D projects. ONF provides a well documented and proven middleware for GUI components (Java plugin interface, simplified concept similar to Eclipse). The overall application configuration is performed within a graphical user interface for layout and component selection. The end-user does not have to work in the underlying XML configuration files. ONF was optimized to provide harmonized user interfaces for monitoring and command consoles. It provides many convenience functions designed together with flight controllers and onboard crew: user defined workspaces, incl. support for multi screens efficient communication mechanism between the components integrated web browsing and documentation search &viewing consistent and integrated menus and shortcuts common logging and application configuration (properties) supervision interface for remote plugin GUI access (web based) A large number of operationally proven ONF components have been developed: Command Stack & History: Release of commands and follow up the command acknowledges System Message Panel: Browse, filter and search system messages/events Unified Synoptic System: Generic synoptic display system Situational Awareness : Show overall subsystem status based on monitoring of key parameters System Model Browser: Browse mission database defintions (measurements, commands, events) Flight Procedure Executor: Execute checklist and logical flow interactive procedures Web

  18. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  19. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance...... farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...

  20. Legislative and Institutional Framework for the Food Safety Control of Live Animals in China

    NARCIS (Netherlands)

    Zhang XiaoYong, Xiaoyong; Roest, van der J.

    2003-01-01

    In 2002, both China and the EU suffered from a trade dispute over animal products. The aim of the report is to document this framework, in order to make a constructive contribution towards bridging the gap of understanding and accessibility of the countries' procedures in particular and of their

  1. Building a Privacy, Ethics, and Data Access Framework for Real World Computerised Medical Record System Data: A Delphi Study. Contribution of the Primary Health Care Informatics Working Group.

    Science.gov (United States)

    Liyanage, H; Liaw, S-T; Di Iorio, C T; Kuziemsky, C; Schreiber, R; Terry, A L; de Lusignan, S

    2016-11-10

    Privacy, ethics, and data access issues pose significant challenges to the timely delivery of health research. Whilst the fundamental drivers to ensure that data access is ethical and satisfies privacy requirements are similar, they are often dealt with in varying ways by different approval processes. To achieve a consensus across an international panel of health care and informatics professionals on an integrated set of privacy and ethics principles that could accelerate health data access in data-driven health research projects. A three-round consensus development process was used. In round one, we developed a baseline framework for privacy, ethics, and data access based on a review of existing literature in the health, informatics, and policy domains. This was further developed using a two-round Delphi consensus building process involving 20 experts who were members of the International Medical Informatics Association (IMIA) and European Federation of Medical Informatics (EFMI) Primary Health Care Informatics Working Groups. To achieve consensus we required an extended Delphi process. The first round involved feedback on and development of the baseline framework. This consisted of four components: (1) ethical principles, (2) ethical guidance questions, (3) privacy and data access principles, and (4) privacy and data access guidance questions. Round two developed consensus in key areas of the revised framework, allowing the building of a newly, more detailed and descriptive framework. In the final round panel experts expressed their opinions, either as agreements or disagreements, on the ethics and privacy statements of the framework finding some of the previous round disagreements to be surprising in view of established ethical principles. This study develops a framework for an integrated approach to ethics and privacy. Privacy breech risk should not be considered in isolation but instead balanced by potential ethical benefit.

  2. Holistic Web-based Virtual Micro Controller Framework for Research and Education

    Directory of Open Access Journals (Sweden)

    Sven Seiler

    2012-11-01

    Full Text Available Education in the field of embedded system programming became an even more important aspect in the qualification of young engineers during the last decade. This development is accompanied by a rapidly increasing complexity of the software environments used with such devices. Therefore a qualified and solid teaching methodology is necessary, accompanied by industry driven technological innovation with an emphasis on programming. As part of three European projects regarding lifelong-learning a comprehensive blended learning concept for teaching embedded systems and robotics was developed by paper authors. It comprises basic exercises in micro controller programming up to high-level student robotic challenges. These implemented measures are supported by a distance learning environment. The programming of embedded systems and microcontroller technology has to be seen as the precursor for more complex robotic systems in this context, but with a high importance for later successfully working with the technology for further professional utilization with these technologies. Current paper introduces the most novel part; the online accessible Virtual Micro Controller Platform (VMCU and its underlying simulation framework platform. This approach conquers the major existing problems in engineering education: outdated hardware and limited lab times. This paper answers the question about advantages of using virtual hardware in an educational environment.

  3. Status of the Use of Large-Scale Corba-Distributed Software Framework for NIF Controls

    Energy Technology Data Exchange (ETDEWEB)

    Carey, R W; Bettenhausen, R C; Estes, C M; Fisher, J M; Krammen, J E; Lagin, L J; Ludwigsen, A P; Mathisen, D G; Matone, J T; Patterson, R W; Reynolds, C A; Sanchez, R J; Stout, E A; Tappero, J D; Van Arsdall, P J

    2005-09-09

    The Integrated Computer Control System (ICCS) for the National Ignition Facility (NIF) is based on a scalable software framework that will be distributed over some 750 Computers throughout the NIF. The framework provides templates and services at multiple levels of abstraction for the construction of software applications that communicate via CORBA (Common Object Request Broker Architecture). Object-oriented software design patterns are implemented as templates to be extended by application software. Developers extend the framework base classes to model the numerous physical control points. About 140 thousand software objects, each individually addressable through CORBA, will be active at full scale. Most of the objects have persistent state that is initialized at system start-up and stored in a database. Centralized server programs that implement events, alerts, reservations, message logging, data archive, name services, and process management provide additional framework services. A higher-level model-based, distributed shot automation framework also provides a flexible and scalable scripted framework for automatic sequencing of work-flow for control and monitoring of NIF shots. The ICCS software framework has allowed for efficient construction of a software system that supports a large number of distributed control points representing a complex control application. Status of the use of this framework during first experimental shot campaigns and initial commissioning and build-out of the laser facility is described.

  4. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  5. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  6. Theoretical review and framework : The roles of controllers

    NARCIS (Netherlands)

    Rouwelaar, ten J.A. (Hans)

    2007-01-01

    In the last decades, the position of the business unit controller has grown in importance. This study gives a review of the research behind the two roles, which business unit-controllers can fulfill in business life: the support role and the control role. The support role is associated with

  7. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  8. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  9. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  10. A Multiobjective Optimization Framework for Stochastic Control of Complex Systems

    Energy Technology Data Exchange (ETDEWEB)

    Malikopoulos, Andreas [ORNL; Maroulas, Vasileios [ORNL; Xiong, Professor Jie [The University of Tennessee

    2015-01-01

    This paper addresses the problem of minimizing the long-run expected average cost of a complex system consisting of subsystems that interact with each other and the environment. We treat the stochastic control problem as a multiobjective optimization problem of the one-stage expected costs of the subsystems, and we show that the control policy yielding the Pareto optimal solution is an optimal control policy that minimizes the average cost criterion for the entire system. For practical situations with constraints consistent to those we study here, our results imply that the Pareto control policy may be of value in deriving online an optimal control policy in complex systems.

  11. Population and Resource Control Measures: A Conceptual Framework for Understanding and Implementation

    Science.gov (United States)

    2009-12-01

    COVERED Master’s Thesis 4. TITLE AND SUBTITLE Population and Resource Control Measures: A Conceptual Framework for Understanding and Implementation...successful use of population and resource control measures. If utilized correctly, PRCMs are powerful operational tools that can be used to break...NUMBER OF PAGES 71 14. SUBJECT TERMS Population and resource control measures, Population control , Counterinsurgency, COIN, Population

  12. On the variational framework employing optimal control for biochemical thermodynamics

    International Nuclear Information System (INIS)

    Moroz, Adam; Wimpenny, David Ian

    2011-01-01

    Graphical abstract: The study presented in the paper shows that the nonlinear kinetic processes (like logistic kinetics) at the level of the biomolecular and biophysical phenomena can be effectively described in terms of the maximum energy dissipation principle and its variational formulation. The variational approach and the logistic dissipative kinetic. (A) The trajectories of extent variable ξ*. d* - calculated Lagrange function (L) corresponding to extent variable trajectory d. (B) The plot of the logarithm of numerically calculated dissipative (thermodynamic) momentum p*. Research highlights: → The variational outline for maximum energy dissipation principle for non-linear biochemical processes is discussed. → The Lagrangians are built as a goal functions, having an energetical sense. → The Hamiltonians, canonical equations and optimal solutions have been obtained. → The maximum energy dissipation principle is interpreted as thermodynamic form of the least action principle. - Abstract: The maximum energy dissipation principle can be successfully applied to describe a range of basic nonlinear models. The application of the general variational framework has been illustrated for basic linear schemes. The study presented in the paper shows how the kinetic processes at this level of the biomolecular and biophysical phenomena can be effectively described in terms of the maximum energy dissipation principle and its variational formulation. On the basis of this approach, a range of Lagrangians was proposed for basic nonlinear dissipative kinetic models. The results of this study show that the framework is in agreement with nonlinear equilibrium thermodynamics.

  13. Concise and Accessible Representations for Multidimensional Datasets: Introducing a Framework Based on the nD-EVM and Kohonen Networks

    Directory of Open Access Journals (Sweden)

    Ricardo Pérez-Aguila

    2015-01-01

    Full Text Available A new framework intended for representing and segmenting multidimensional datasets resulting in low spatial complexity requirements and with appropriate access to their contained information is described. Two steps are going to be taken in account. The first step is to specify (n-1D hypervoxelizations, n≥2, as Orthogonal Polytopes whose nth dimension corresponds to color intensity. Then, the nD representation is concisely expressed via the Extreme Vertices Model in the n-Dimensional Space (nD-EVM. Some examples are presented, which, under our methodology, have storing requirements minor than those demanded by their original hypervoxelizations. In the second step, 1-Dimensional Kohonen Networks (1D-KNs are applied in order to segment datasets taking in account their geometrical and topological properties providing a non-supervised way to compact even more the proposed n-Dimensional representations. The application of our framework shares compression ratios, for our set of study cases, in the range 5.6496 to 32.4311. Summarizing, the contribution combines the power of the nD-EVM and 1D-KNs by producing very concise datasets’ representations. We argue that the new representations also provide appropriate segmentations by introducing some error functions such that our 1D-KNs classifications are compared against classifications based only in color intensities. Along the work, main properties and algorithms behind the nD-EVM are introduced for the purpose of interrogating the final representations in such a way that it efficiently obtains useful geometrical and topological information.

  14. Framework of Multi-objective Wind Farm Controller Applicable to Real Wind Farms

    DEFF Research Database (Denmark)

    Kazda, Jonas; Gögmen, Tuhfe; Giebel, Gregor

    2016-01-01

    Optimal wind farm control can mitigate adverse wake effects that can potentially cause up to 40% power loss and 80% increased fatigue loads in wind farms. The aim of this work is to outline a methodological framework of an optimal wind farm controller, which provides improved solutions to critical...... areas of optimal wind farm control research. The basis of this framework is a review of optimal wind farm control methodologies, which is presented first. It is observed that there is, at present, mainly a need for more advanced wind farm operation models. Thereafter the framework of a multi...... in the wind farm. The controller design provides improved solutions for the modelling of wind farm aerodynamics and turbine operation, that is the PossPOW algorithm and a HAWC2-based turbine model, respectively. Moreover, all components of the framework are designed as to enable the applicability...

  15. A systematic framework for design of process monitoring and control (PAT) systems for crystallization processes

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli Bin; Sin, Gürkan; Gernaey, Krist

    2013-01-01

    A generic computer-aided framework for systematic design of a process monitoring and control system for crystallization processes has been developed to study various aspects of crystallization operations.The systematic design framework contains a generic crystallizer modelling toolbox, a tool for...

  16. Control Framework for Dexterous Manipulation Using Dynamic Visual Servoing and Tactile Sensors’ Feedback

    Directory of Open Access Journals (Sweden)

    Carlos A. Jara

    2014-01-01

    Full Text Available Tactile sensors play an important role in robotics manipulation to perform dexterous and complex tasks. This paper presents a novel control framework to perform dexterous manipulation with multi-fingered robotic hands using feedback data from tactile and visual sensors. This control framework permits the definition of new visual controllers which allow the path tracking of the object motion taking into account both the dynamics model of the robot hand and the grasping force of the fingertips under a hybrid control scheme. In addition, the proposed general method employs optimal control to obtain the desired behaviour in the joint space of the fingers based on an indicated cost function which determines how the control effort is distributed over the joints of the robotic hand. Finally, authors show experimental verifications on a real robotic manipulation system for some of the controllers derived from the control framework.

  17. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  18. A framework for the intelligent control of nuclear rockets

    International Nuclear Information System (INIS)

    Parlos, A.G.; Metzger, J.D.

    1993-01-01

    An intelligent control system architecture is proposed for nuclear rockets, and its various components are briefly described. The objective of the intelligent controller is the satisfaction of performance, robustness, fault-tolerance and reliability design specifications. The proposed hierarchical architecture consists of three levels: hardware, signal processing, and knowledge processing. The functionality of the intelligent controller is implemented utilizing advanced information processing technologies such as artificial neutral networks and fuzzy expert systems. The feasibility of a number of the controller architecture components have been independently validated using computer simulations. Preliminary results are presented demonstrating some of the signal processing capabilities of the intelligent nuclear rocket controller. Further work, currently in progress, is attempting to implement a number of the knowledge processing capabilities of the controller and their interface with the lower levels of the proposed architecture

  19. Fully probabilistic control design in an adaptive critic framework

    Czech Academy of Sciences Publication Activity Database

    Herzallah, R.; Kárný, Miroslav

    2011-01-01

    Roč. 24, č. 10 (2011), s. 1128-1135 ISSN 0893-6080 R&D Projects: GA ČR GA102/08/0567 Institutional research plan: CEZ:AV0Z10750506 Keywords : Stochastic control design * Fully probabilistic design * Adaptive control * Adaptive critic Subject RIV: BC - Control Systems Theory Impact factor: 2.182, year: 2011 http://library.utia.cas.cz/separaty/2011/AS/karny-0364820.pdf

  20. Assessing Intimate Partner Violence in a Control Balance Theory Framework.

    Science.gov (United States)

    Castro, Erin D; Nobles, Matt R; Zavala, Egbert

    2017-01-01

    The purpose of this study was to examine the role that control occupies in the motivation for, and development of, intimate partner violence (IPV). The research literature often theorizes about the importance of control in gender-based crimes; however, few studies have empirically tested these assumptions. Given the breath of theoretical approaches in examining IPV and the need for individualized explanations, the current study used concepts from Tittle's control balance theory. This integrated theory accounts for many of the known risk factors, such as self-control and routine activities, while accounting for individual perceptions of control. A college student sample ( N = 401) was used, in accordance with the literature that has found this subpopulation to be at high risk for IPV. An online survey was distributed to potential participants to capture self-reported incidents of victimization and perpetration of IPV within the past year. Statistical analysis using segmented nonlinear regression models was estimated to assess sex difference effects. The results showed no difference in control continuums between the sexes but did find significant associations between control deficits and female victimization and perpetration, as well as significant association between control deficits and male perpetration of IPV. These findings have implications beyond the theoretical confirmation that control is key factor to this type of violence. In addition to greater education regarding dating expectations, control deficits may be particularly important for socially marginalized groups, such as those from the lesbian, gay, bisexual, and transgender (LGBT) community. Efforts can then be made to identify issues with control in IPV counseling, victim services, treatments for offenders, and other gender-based crimes, such as rape, sexual assault, and stalking.

  1. Aquatic weed control within an integrated water management framework

    NARCIS (Netherlands)

    Querner, E.P.

    1993-01-01

    Aquatic weed control, carried out by the water boards in the Netherlands, is required to maintain sufficient discharge capacity of the surface water system. Weed control affects the conditions of both surface water and groundwater. The physically based model MOGROW was developed to simulate

  2. Design of MPPT Controller Monitoring Software Based on QT Framework

    Science.gov (United States)

    Meng, X. Z.; Lu, P. G.

    2017-10-01

    The MPPT controller was a hardware device for tracking the maximum power point of solar photovoltaic array. Multiple controllers could be working as networking mode by specific communicating protocol. In this article, based on C++ GUI programming with Qt frame, we designed one sort of desktop application for monitoring and analyzing operational parameter of MPPT controller. The type of communicating protocol for building network was Modbus protocol which using Remote Terminal Unit mode and The desktop application of host computer was connected with all the controllers in the network through RS485 communication or ZigBee wireless communication. Using this application, user could monitor the parameter of controller wherever they were by internet.

  3. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  4. A Universal Communication Framework and Navigation Control Software for Mobile Prototyping Platforms

    Directory of Open Access Journals (Sweden)

    Andreas Mitschele-Thiel

    2010-09-01

    Full Text Available In our contribution we would like to describe two new aspects of our low-cost mobile prototyping platform concept: a new hardware communication framework as well as new software features for navigation and control of our mobile platform. The paper is an extension of the ideas proposed in REV2009 [1] and is based on the therein used hardware platform and the monitoring and management software. This platform is based on the Quadrocopter concept – autonomous flying helicopter-style robots – and includes additional off-the-shelf parts. This leads to a universal mobile prototyping platform for communication tasks providing both mobile phone and WiFi access. However, the platform can provide these functions far more quickly than a technician on the ground might be able to. We will show that with our concept we can easily adapt the platform to the individual needs of the user, which leads to a very flexible and semi-autonomous system.

  5. Contingency Munitions Logistics Planning and Control: A Framework for Analysis

    National Research Council Canada - National Science Library

    Coop, Andrew

    1998-01-01

    .... Although force application against Iraqi forces was deemed an overwhelming success, a lack of planning capability and real-time visibility over deploying cargo led to poor distribution control...

  6. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  7. A Multi-Functional Fully Distributed Control Framework for AC Microgrids

    DEFF Research Database (Denmark)

    Shafiee, Qobad; Nasirian, Vahidreza; Quintero, Juan Carlos Vasquez

    2018-01-01

    This paper proposes a fully distributed control methodology for secondary control of AC microgrids. The control framework includes three modules: voltage regulator, reactive power regulator, and active power/frequency regulator. The voltage regulator module maintains the average voltage of the mi...

  8. A Distributed Control Framework for Integrated Photovoltaic-Battery-Based Islanded Microgrids

    DEFF Research Database (Denmark)

    Golsorkhi, Mohammad; Shafiee, Qobad; Lu, Dylan Dah-Chuan

    2017-01-01

    This paper proposes a new cooperative control framework for coordination of energy storage units (ESUs), photovoltaic (PV) panels and controllable load units in singlephase low voltage microgrids (MGs). The control objectives are defined and acted upon using a two level structure; primary and sec...

  9. Do extant management control frameworks fit the alliance setting? A descriptive analysis

    NARCIS (Netherlands)

    Anderson, S.W.; Christ, M.; Dekker, H.C.; Sedatole, K.L.

    2015-01-01

    We examine the portfolio of management controls used to mitigate alliance risk at three separate firms in order to analyze the suitability of management control frameworks proposed by Simons (1995), Merchant and Van der Stede (2007), and Jensen and Meckling (1992) as descriptors of controls used in

  10. Coupling DCS and MARTe: two real-time control frameworks in collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Rapson, Christopher J., E-mail: chris.rapson@ipp.mpg.de [Max Planck Institute for Plasma Physics, Boltzmannstrasse 2, 85748 Garching (Germany); Carvalho, Pedro [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Lüddecke, Klaus; Neto, André C. [Unlimited Computer Systems GmbH, Seeshaupterstr. 15, 82393 Iffeldorf (Germany); Santos, Bruno [Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Treutterer, Wolfgang [Max Planck Institute for Plasma Physics, Boltzmannstrasse 2, 85748 Garching (Germany); Winter, Axel [ITER Organization, Route de Vinon-sur-Verdon, 13115 St.-Paul-Lès-Durance (France); Zehetbauer, Thomas [Max Planck Institute for Plasma Physics, Boltzmannstrasse 2, 85748 Garching (Germany)

    2014-12-15

    Highlights: • Similarities and differences between DCS and MARTe. • Identifies the state-of-the-art in terms of software frameworks for fusion control. • Interfaces developed for realtime and non-realtime communication between DCS and MARTe. • An algorithm replicated in DCS and MARTe produces identical results and good performance. • The start of collaboration to develop a new framework for ITER PCS. - Abstract: Fusion experiments place high demands on real-time control systems. Within the fusion community two modern framework-based software architectures have emerged as powerful tools for developing algorithms for real-time control of complex systems while maintaining the flexibility required when operating a physics experiment. The two frameworks are known as DCS (Discharge Control System), from ASDEX Upgrade and MARTe (Multithreaded Application Real-Time executor), originally from JET. Based on the success of DCS and MARTe, ITER has chosen to develop a framework architecture for its Plasma Control System which will adopt major design concepts from both the existing frameworks. This paper describes a coupling of the two existing frameworks, which was undertaken to explore the degree of similarity and compliance between the concepts, and to extend their capabilities. DCS and MARTe operate in parallel with synchronised state machines and a common message logger. Configuration data is exchanged before the real-time phase. During the real-time phase, structured data is exchanged via shared memory and an existing DCS algorithm is replicated within MARTe. The coupling tests the flexibility and identifies the respective strengths of the two frameworks, providing a well-informed basis on which to move forward and design a new ITER real-time framework.

  11. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    Control of assets in electricity distribution grids is becoming an increasingly interesting solution to address challenges arising in the grid with an increasing penetration of distributed renewable energy generation. This paper looks at a voltage control scenario in low voltage (LV) distribution...

  12. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  13. Surgical model-view-controller simulation software framework for local and collaborative applications.

    Science.gov (United States)

    Maciel, Anderson; Sankaranarayanan, Ganesh; Halic, Tansel; Arikatla, Venkata Sreekanth; Lu, Zhonghua; De, Suvranu

    2011-07-01

    Surgical simulations require haptic interactions and collaboration in a shared virtual environment. A software framework for decoupled surgical simulation based on a multi-controller and multi-viewer model-view-controller (MVC) pattern was developed and tested. A software framework for multimodal virtual environments was designed, supporting both visual interactions and haptic feedback while providing developers with an integration tool for heterogeneous architectures maintaining high performance, simplicity of implementation, and straightforward extension. The framework uses decoupled simulation with updates of over 1,000 Hz for haptics and accommodates networked simulation with delays of over 1,000 ms without performance penalty. The simulation software framework was implemented and was used to support the design of virtual reality-based surgery simulation systems. The framework supports the high level of complexity of such applications and the fast response required for interaction with haptics. The efficacy of the framework was tested by implementation of a minimally invasive surgery simulator. A decoupled simulation approach can be implemented as a framework to handle simultaneous processes of the system at the various frame rates each process requires. The framework was successfully used to develop collaborative virtual environments (VEs) involving geographically distributed users connected through a network, with the results comparable to VEs for local users.

  14. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access......, collision avoidance, provision of Quality of Service (QoS) and security. Focusing on the particular requirements of an energy harvesting application, the dissertation continues with the presentation of a MAC protocol, named ODMAC, which extends the receiver-initiated paradigm with several energy......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  15. The Smart Card concept applied to access control

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  16. A conceptual modeling framework for discrete event simulation using hierarchical control structures.

    Science.gov (United States)

    Furian, N; O'Sullivan, M; Walker, C; Vössner, S; Neubacher, D

    2015-08-01

    Conceptual Modeling (CM) is a fundamental step in a simulation project. Nevertheless, it is only recently that structured approaches towards the definition and formulation of conceptual models have gained importance in the Discrete Event Simulation (DES) community. As a consequence, frameworks and guidelines for applying CM to DES have emerged and discussion of CM for DES is increasing. However, both the organization of model-components and the identification of behavior and system control from standard CM approaches have shortcomings that limit CM's applicability to DES. Therefore, we discuss the different aspects of previous CM frameworks and identify their limitations. Further, we present the Hierarchical Control Conceptual Modeling framework that pays more attention to the identification of a models' system behavior, control policies and dispatching routines and their structured representation within a conceptual model. The framework guides the user step-by-step through the modeling process and is illustrated by a worked example.

  17. Implementation of the Framework Convention on Tobacco Control in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will allow the Southeast Asia Tobacco Control Alliance (SEATCA) to coordinate a research program in support of the successful implementation (in the ... Research Group (TCRG), University of Beirut (AUB), is a multidisciplinary team of professionals from the health sciences, medicine, chemistry and engineering ...

  18. The Assemble and Animate Control Framework for Modular Reconfigurable Robots

    DEFF Research Database (Denmark)

    Christensen, David Johan; Schultz, Ulrik Pagh; Moghadam, Mikael

    2011-01-01

    , a library of common control and adaptation strategies, and a module abstraction layer which allows ASE to be cross-compiled for a number of different modular robotic platforms and easily ported to new platforms. In this paper we describe the design of ASE and present example applications utilizing ASE...

  19. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  20. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  1. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  2. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  3. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  4. Increasing software testability with standard access and control interfaces

    Science.gov (United States)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  5. Thermodynamic framework for discrete optimal control in multiphase flow systems

    Science.gov (United States)

    Sieniutycz, Stanislaw

    1999-08-01

    Bellman's method of dynamic programming is used to synthesize diverse optimization approaches to active (work producing) and inactive (entropy generating) multiphase flow systems. Thermal machines, optimally controlled unit operations, nonlinear heat conduction, spontaneous relaxation processes, and self-propagating wave fronts are all shown to satisfy a discrete Hamilton-Jacobi-Bellman equation and a corresponding discrete optimization algorithm of Pontryagin's type, with the maximum principle for a Hamiltonian. The extremal structures are always canonical. A common unifying criterion is set for all considered systems, which is the criterion of a minimum generated entropy. It is shown that constraints can modify the entropy functionals in a different way for each group of the processes considered; thus the resulting structures of these functionals may differ significantly. Practical conclusions are formulated regarding the energy savings and energy policy in optimally controlled systems.

  6. A framework for selecting suitable control technologies for nuclear power plant systems

    International Nuclear Information System (INIS)

    Kisner, R.A.

    1992-01-01

    New concepts continue to emerge for controlling systems, subsystems, and components and for monitoring parameters, characteristics, and vital signs in nuclear power plants. The steady stream of new control theories and the evolving state of control software exacerbates the difficulty of selecting the most appropriate control technology for nuclear power plant systems. As plant control room operators increase their reliance on computerized systems, the integration of monitoring, diagnostic, and control functions into a uniform and understandable environment becomes imperative. A systematic framework for comparing and evaluating the overall usefulness of control techniques is needed. This paper describes nine factors that may be used to evaluate alternative control concepts. These factors relate to a control system's potential effectiveness within the context of the overall environment, including both human and machine components. Although not an in-depth study, this paper serves to outline an evaluation framework based on several measures of utility. 32 refs

  7. A General Framework for Flow Control in Wireless Networks

    Science.gov (United States)

    2006-12-22

    algorithms proposed by Low and Lapsley [36], Paganini et. al. [41], Yaiche et. al. [54] belong to this class. The stability properties of various dual...updated dynamically by routers and users, respectively. The algorithms proposed by Low and Lapsley [36], Kunniyur and Srikant [28], Paganini et. al [41...Aug. 2003. [36] S. H. Low and D. E. Lapsley , “Optimization flow control, I: Basic algorithm and con- vergence,” vol. 7, no. 6, pp. 861–875, Dec

  8. Regulatory Framework for Controlling the Research Reactor Decommissioning Project

    International Nuclear Information System (INIS)

    Melani, Ai; Chang, Soon Heung

    2009-01-01

    Decommissioning is one of important stages in construction and operation of research reactors. Currently, there are three research reactors operating in Indonesia. These reactors are operated by the National Nuclear Energy Agency (BATAN). The age of the three research reactors varies from 22 to 45 years since the reactors reached their first criticality. Regulatory control of the three reactors is conducted by the Nuclear Energy Regulatory Agency (BAPETEN). Controlling the reactors is carried out based on the Act No. 10/1997 on Nuclear Energy, Government Regulations and BAPETEN Chairman Decrees concerning the nuclear safety, security and safeguards. Nevertheless, BAPETEN still lack of the regulation, especially for controlling the decommissioning project. Therefore, in the near future BAPETEN has to prepare the regulations for decommissioning, particularly to anticipate the decommissioning of the oldest research reactors, which probably will be done in the next ten years. In this papers author give a list of regulations should be prepared by BAPETEN for the decommissioning stage of research reactor in Indonesia based on the international regulatory practice

  9. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-07-27

    ... types of access controls applied to video games: Macrovision's SafeDisc software and Sony's SecuRom... works such as video games and slide presentations). B. Computer programs that enable wireless telephone... claim of breach of contract, and not a claim under Section 1201(a)(1). D. Video games accessible on...

  10. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    Science.gov (United States)

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  11. Access Control in the ATLAS TDAQ Online Cluster

    CERN Document Server

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  12. Distributed Medium Access Control with SDMA Support for WLANs

    Science.gov (United States)

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  13. Development of DC-TOF control software framework

    International Nuclear Information System (INIS)

    Kim, Hong Joo; Kim, Hyun Ok

    2010-06-01

    Disk-Chopper Time-of-Flight spectrometer (DC-TOF) is a new cold neutron instrument under construction at the Korea Atomic Energy Research Institute (KAERI). It will be equipped with a total of 352 2m PSDs(Position Sensitive Detectors), which are grouped into 11 panels. We developed the main DAQ/Control software works well between multi-DSPs of electronics and user. It is convenient to operate DC-TOF system and monitor it's data quality using GUI(Graphical User Interface). Also it satisfies design throughout with test result of 100K events/s

  14. A framework for database optimization and workload control

    Directory of Open Access Journals (Sweden)

    ANDRADE, T. C.

    2010-06-01

    Full Text Available In the planning phase of the project, the project manager is responsible for the activities of a greater responsibility is to make estimates and collect measurements of software as a way to control the development process, in addition of assist in making organizational decisions. In the context of Micro and Small Enterprises (MSEs, various restrictions typical of companies of this size make the process of estimating and measuring yet more complex. Thus, this paper proposes a simplified measurement process based on best practices of measurement and previously documented as patterns process using the PSM to assist MPEs in all steps relating to this important process.

  15. AcconPred: Predicting Solvent Accessibility and Contact Number Simultaneously by a Multitask Learning Framework under the Conditional Neural Fields Model

    Directory of Open Access Journals (Sweden)

    Jianzhu Ma

    2015-01-01

    Full Text Available Motivation. The solvent accessibility of protein residues is one of the driving forces of protein folding, while the contact number of protein residues limits the possibilities of protein conformations. The de novo prediction of these properties from protein sequence is important for the study of protein structure and function. Although these two properties are certainly related with each other, it is challenging to exploit this dependency for the prediction. Method. We present a method AcconPred for predicting solvent accessibility and contact number simultaneously, which is based on a shared weight multitask learning framework under the CNF (conditional neural fields model. The multitask learning framework on a collection of related tasks provides more accurate prediction than the framework trained only on a single task. The CNF method not only models the complex relationship between the input features and the predicted labels, but also exploits the interdependency among adjacent labels. Results. Trained on 5729 monomeric soluble globular protein datasets, AcconPred could reach 0.68 three-state accuracy for solvent accessibility and 0.75 correlation for contact number. Tested on the 105 CASP11 domain datasets for solvent accessibility, AcconPred could reach 0.64 accuracy, which outperforms existing methods.

  16. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Science.gov (United States)

    2012-05-07

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-661] Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders AGENCY: U.S. International Trade Commission. ACTION...

  17. A Linux-Based Approach to Low-Cost Support of Access Control Policies

    National Research Council Canada - National Science Library

    Clark, Paul

    1999-01-01

    .... Systems that enforce Mandatory Access Control (MAC) policies are known to reduce some known security weaknesses, but such systems have seen limited use within the United States Government, and they are rarely applied in the private sector...

  18. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright... nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological... the final rule governing exemption to prohibition on circumvention of copyright protection systems for...

  19. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  20. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  1. Instrumentino: An open-source modular Python framework for controlling Arduino based experimental instruments

    Science.gov (United States)

    Koenka, Israel Joel; Sáiz, Jorge; Hauser, Peter C.

    2014-10-01

    Instrumentino is an open-source modular graphical user interface framework for controlling Arduino based experimental instruments. It expands the control capability of Arduino by allowing instruments builders to easily create a custom user interface program running on an attached personal computer. It enables the definition of operation sequences and their automated running without user intervention. Acquired experimental data and a usage log are automatically saved on the computer for further processing. The use of the programming language Python also allows easy extension. Complex devices, which are difficult to control using an Arduino, may be integrated as well by incorporating third party application programming interfaces into the Instrumentino framework.

  2. Utilizing a Social Determinant of Health Framework as Determinants of Perceived Behavioral Control.

    Science.gov (United States)

    Maness, Sarah B; Branscum, Paul

    Health disparities reflect inequalities in health outcomes among different populations. As a planning tool for researchers and practitioners to address health disparities, multiple frameworks utilizing social determinants of health have been proposed. Perceived behavioral control, a construct within the Integrative Behavioral Model, reflects how much control one feels over a health behavior and how easy or difficult the behavior is to enact under internal and external barriers. The purpose of this commentary is to suggest how a unified social determinant of health framework can be utilized as a predictor and determinant of the construct perceived behavioral control.

  3. Intra Smart Grid Management Frameworks for Control and Energy Saving in Buildings

    OpenAIRE

    Guerrieri, Antonio; Serra, Jordi; Pubill, David; Verikoukis, Christos; Fortino, Giancarlo

    2015-01-01

    In the context of Smart Grids and Internet of Things (IoT) Systems, distributed monitoring and actuation through Wireless Sensor and Actuator Networks (WSANs) is fundamental to control the energy usage in buildings. Moreover, the realization of algorithms for the optimization of the energy consumption is of paramount importance. This paper presents a loosely coupled integration between a flexible management framework for WSANs, namely the IGMF (Intra-Grid Management Framework), and a Dynamic ...

  4. Modular Autonomous Systems Technology Framework: A Distributed Solution for System Monitoring and Control

    Science.gov (United States)

    Badger, Julia M.; Claunch, Charles; Mathis, Frank

    2017-01-01

    The Modular Autonomous Systems Technology (MAST) framework is a tool for building distributed, hierarchical autonomous systems. Originally intended for the autonomous monitoring and control of spacecraft, this framework concept provides support for variable autonomy, assume-guarantee contracts, and efficient communication between subsystems and a centralized systems manager. MAST was developed at NASA's Johnson Space Center (JSC) and has been applied to an integrated spacecraft example scenario.

  5. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  6. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC......), are not sufficient to address the new challenges introduced by these location-based applications. Several recent research efforts have enhanced RBAC with spatio-temporal features. Nevertheless, the state-of-the-art does not deal with mobility of both subjects and objects and does not support the utilization...

  7. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  8. Civil society and the negotiation of the Framework Convention on Tobacco Control

    Science.gov (United States)

    MAMUDU, H. M.

    2008-01-01

    Tobacco control civil society organisations mobilised to influence countries during the negotiation of the World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC) between 1999 and 2003. Tobacco control civil society organisations and coalitions around the world embraced the idea of an international tobacco control treaty and came together as the Framework Convention Alliance (FCA), becoming an important non-state actor within the international system of tobacco control. Archival documents and interviews demonstrate that the FCA successfully used strategies including publication of a newsletter, shaming, symbolism and media advocacy to influence policy positions of countries during the FCTC negotiation. The FCA became influential in the negotiation process by mobilising tobacco control civil society organisations and resources with the help of the Internet and framing the tobacco control discussion around global public health. PMID:19333806

  9. A system framework of inter-enterprise machining quality control based on fractal theory

    Science.gov (United States)

    Zhao, Liping; Qin, Yongtao; Yao, Yiyong; Yan, Peng

    2014-03-01

    In order to meet the quality control requirement of dynamic and complicated product machining processes among enterprises, a system framework of inter-enterprise machining quality control based on fractal was proposed. In this system framework, the fractal-specific characteristic of inter-enterprise machining quality control function was analysed, and the model of inter-enterprise machining quality control was constructed by the nature of fractal structures. Furthermore, the goal-driven strategy of inter-enterprise quality control and the dynamic organisation strategy of inter-enterprise quality improvement were constructed by the characteristic analysis on this model. In addition, the architecture of inter-enterprise machining quality control based on fractal was established by means of Web service. Finally, a case study for application was presented. The result showed that the proposed method was available, and could provide guidance for quality control and support for product reliability in inter-enterprise machining processes.

  10. Framework and Method for Controlling a Robotic System Using a Distributed Computer Network

    Science.gov (United States)

    Sanders, Adam M. (Inventor); Barajas, Leandro G. (Inventor); Permenter, Frank Noble (Inventor); Strawser, Philip A. (Inventor)

    2015-01-01

    A robotic system for performing an autonomous task includes a humanoid robot having a plurality of compliant robotic joints, actuators, and other integrated system devices that are controllable in response to control data from various control points, and having sensors for measuring feedback data at the control points. The system includes a multi-level distributed control framework (DCF) for controlling the integrated system components over multiple high-speed communication networks. The DCF has a plurality of first controllers each embedded in a respective one of the integrated system components, e.g., the robotic joints, a second controller coordinating the components via the first controllers, and a third controller for transmitting a signal commanding performance of the autonomous task to the second controller. The DCF virtually centralizes all of the control data and the feedback data in a single location to facilitate control of the robot across the multiple communication networks.

  11. Access control system in Hamaoka Nuclear Power Station

    International Nuclear Information System (INIS)

    Kaneda, Hisashi; Shimura, Shigetaka; Suzuki, Katsuhiko; Kitazawa, Toshiichi

    1983-01-01

    The new computerized system has introduced to improve function of radiation protection for those who enter the radiation control area, by dealing with measurement of radiation dose, check of personal qualification, resistration of working condition and statistical treatment of these data. This system uses combined TLD, ''TL BADGE'', as a radiation detection sensor, instead of conventional pocket dosimeter and film badge. TL BADGE reading instrument are installed at the entrance to the control area and at working areas. The data of radiation dose, personal qualification etc. read by the reading instrument are transmitted directly to the computer system, which compiles and transacts these data. This system is consisted of three minicomputers, double memory files, CRTs for effective data search and display and floppy disks as a medium for registration, etc. Thus the computer system improves its reliability and the maintenanceability of data, being capable of automatical transaction of a great amount of data quickly. This report describes: Concept of using computer system, System outline, Measurement of radiation dose and Operational functions. (author)

  12. Hierarchical control framework for integrated coordination between distributed energy resources and demand response

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Di; Lian, Jianming; Sun, Yannan; Yang, Tao; Hansen, Jacob

    2017-09-01

    Demand response is representing a significant but largely untapped resource that can greatly enhance the flexibility and reliability of power systems. In this paper, a hierarchical control framework is proposed to facilitate the integrated coordination between distributed energy resources and demand response. The proposed framework consists of coordination and device layers. In the coordination layer, various resource aggregations are optimally coordinated in a distributed manner to achieve the system-level objectives. In the device layer, individual resources are controlled in real time to follow the optimal power generation or consumption dispatched from the coordination layer. For the purpose of practical applications, a method is presented to determine the utility functions of controllable loads by taking into account the real-time load dynamics and the preferences of individual customers. The effectiveness of the proposed framework is validated by detailed simulation studies.

  13. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  14. Addressing access barriers to health services: an analytical framework for selecting appropriate interventions in low-income Asian countries

    OpenAIRE

    Jacobs, Bart; Ir, Por; Bigdeli, Maryam; Annear, Peter Leslie; Van Damme, Wim

    2017-01-01

    While World Health Organization member countries embraced the concept of universal coverage as early as 2005, few low-income countries have yet achieved the objective. This is mainly due to numerous barriers that hamper access to needed health services. In this paper we provide an overview of the various dimensions of barriers to access to health care in low-income countries (geographical access, availability, affordability and acceptability) and outline existing interventions designed to ove...

  15. A Model-Driven Co-Design Framework for Fusing Control and Scheduling Viewpoints

    Science.gov (United States)

    Navet, Nicolas; Havet, Lionel

    2018-01-01

    Model-Driven Engineering (MDE) is widely applied in the industry to develop new software functions and integrate them into the existing run-time environment of a Cyber-Physical System (CPS). The design of a software component involves designers from various viewpoints such as control theory, software engineering, safety, etc. In practice, while a designer from one discipline focuses on the core aspects of his field (for instance, a control engineer concentrates on designing a stable controller), he neglects or considers less importantly the other engineering aspects (for instance, real-time software engineering or energy efficiency). This may cause some of the functional and non-functional requirements not to be met satisfactorily. In this work, we present a co-design framework based on timing tolerance contract to address such design gaps between control and real-time software engineering. The framework consists of three steps: controller design, verified by jitter margin analysis along with co-simulation, software design verified by a novel schedulability analysis, and the run-time verification by monitoring the execution of the models on target. This framework builds on CPAL (Cyber-Physical Action Language), an MDE design environment based on model-interpretation, which enforces a timing-realistic behavior in simulation through timing and scheduling annotations. The application of our framework is exemplified in the design of an automotive cruise control system. PMID:29461489

  16. Transactive control: a framework for operating power systems characterized by high penetration of distributed energy resources

    DEFF Research Database (Denmark)

    Hu, Junjie; Yang, Guangya; Kok, Koen

    2016-01-01

    The increasing number of distributed energy resources connected to power systems raises operational challenges for the network operator, such as introducing grid congestion and voltage deviations in the distribution network level, as well as increasing balancing needs at the whole system level......, followed by a literature review and demonstration projects that apply to transactive control. Cases are then presented to illustrate the transactive control framework. At the end, discussions and research directions are presented, for applying transactive control to operating power systems, characterized...

  17. Generalized Gramian Framework for Model/Controller Order Reduction of Switched Systems

    DEFF Research Database (Denmark)

    Shaker, Hamid Reza; Wisniewski, Rafal

    2011-01-01

    In this article, a general method for model/controller order reduction of switched linear dynamical systems is presented. The proposed technique is based on the generalised gramian framework for model reduction. It is shown that different classical reduction methods can be developed into a genera......In this article, a general method for model/controller order reduction of switched linear dynamical systems is presented. The proposed technique is based on the generalised gramian framework for model reduction. It is shown that different classical reduction methods can be developed...

  18. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  19. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  20. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...... their careers towards traditionally male dominated occupations associated with higher wages. Early access to the pill is also associated with significantly higher actual income for men....

  1. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    plans of both men and women, and by separating the effect by level of academic ability, race and family income. The results show that unrestricted access to the pill caused high ability women to move towards occupations with higher wages, higher occupational prestige scores and higher male ratios......The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...

  2. A framework for advanced methods of control of human-induced vibrations

    Science.gov (United States)

    Reynolds, Paul

    2012-04-01

    The vibration serviceability of civil engineering structures under human dynamic excitation is becoming ever more critical with the design and redevelopment of structures with reduced mass, stiffness and damping. A large number of problems have been reported in floors, footbridges, sports stadia, staircases and other structures. Unfortunately, the range of options available to fix such problems are very limited and are primarily limited to structural modification or the implementation of passive vibration control measures, such as tuned mass dampers. This paper presents the initial development of a new framework for advanced methods of control of humaninduced vibrations in civil engineering structures. This framework includes both existing passive methods of vibration control and more advanced active, semi-active and hybrid control techniques, which may be further developed as practical solutions for these problems. Through the use of this framework, rational decisions as to the most appropriate technologies for particular human vibration problems may be made and pursued further. This framework is also intended to be used in the design of new civil engineering structures, where advanced control technologies may be used both to increase the achievable slenderness and to reduce the amount of construction materials used and hence their embodied energy. This will be an ever more important consideration with the current drive for structures with reduced environmental impact.

  3. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  4. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  5. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  6. f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

    OpenAIRE

    Roedig, Utz; Barroso, Andre; Sreenan, Cormac J.

    2006-01-01

    Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some application areas it is necessary to have a deterministic MAC protocol which can give guarantees on message delay and channel throughput. Schedule based MAC protocols, based on time synchronization among nodes, are currently used to implement deterministic MAC protocols. Time synchronization is difficult and costly, ...

  7. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  8. Evaluating Comprehensive State Tobacco Prevention and Control Programs Using an Outcome Indicator Framework.

    Science.gov (United States)

    Fulmer, Erika; Rogers, Todd; Glasgow, LaShawn; Brown, Susan; Kuiper, Nicole

    2018-03-01

    The outcome indicator framework helps tobacco prevention and control programs (TCPs) plan and implement theory-driven evaluations of their efforts to reduce and prevent tobacco use. Tobacco use is the single-most preventable cause of morbidity and mortality in the United States. The implementation of public health best practices by comprehensive state TCPs has been shown to prevent the initiation of tobacco use, reduce tobacco use prevalence, and decrease tobacco-related health care expenditures. Achieving and sustaining program goals require TCPs to evaluate the effectiveness and impact of their programs. To guide evaluation efforts by TCPs, the Centers for Disease Control and Prevention's Office on Smoking and Health developed an outcome indicator framework that includes a high-level logic model and evidence-based outcome indicators for each tobacco prevention and control goal area. In this article, we describe how TCPs and other community organizations can use the outcome indicator framework in their evaluation efforts. We also discuss how the framework is used at the national level to unify tobacco prevention and control efforts across varying state contexts, identify promising practices, and expand the public health evidence base.

  9. Modelling Supported Driving as an Optimal Control Cycle : Framework and Model Characteristics

    NARCIS (Netherlands)

    Wang, M.; Treiber, M.; Daamen, W.; Hoogendoorn, S.P.; Van Arem, B.

    2013-01-01

    Driver assistance systems support drivers in operating vehicles in a safe, comfortable and efficient way, and thus may induce changes in traffic flow characteristics. This paper puts forward a receding horizon control framework to model driver assistance and cooperative systems. The accelerations of

  10. US NDC Modernization Iteration E1 Prototyping Report: Processing Control Framework

    Energy Technology Data Exchange (ETDEWEB)

    Prescott, Ryan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Benjamin R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-12-01

    During the first iteration of the US NDC Modernization Elaboration phase (E1), the SNL US NDC modernization project team developed an initial survey of applicable COTS solutions, and established exploratory prototyping related to the processing control framework in support of system architecture definition. This report summarizes these activities and discusses planned follow-on work.

  11. What predicts intention-behavior discordance? A review of the action control framework

    NARCIS (Netherlands)

    Rhodes, R.E.; de Bruijn, G.J.

    2013-01-01

    The physical activity intention-behavior gap is a focus of considerable research. The purpose of this article is to overview contemporary evidence for predictors of this intention-behavior discordance using the action control framework developed in our laboratories. We propose the hypothesis that

  12. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  13. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  14. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...

  15. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    Directory of Open Access Journals (Sweden)

    Mikel Uriarte Itzazelaia

    2018-02-01

    Full Text Available Upcoming smart scenarios enabled by the Internet of Things (IoT envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  16. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  17. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  18. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  19. A Functional Analysis Framework for Modeling, Estimation and Control in Science and Engineering

    CERN Document Server

    Banks, HT

    2012-01-01

    A Modern Framework Based on Time-Tested Material A Functional Analysis Framework for Modeling, Estimation and Control in Science and Engineering presents functional analysis as a tool for understanding and treating distributed parameter systems. Drawing on his extensive research and teaching from the past 20 years, the author explains how functional analysis can be the basis of modern partial differential equation (PDE) and delay differential equation (DDE) techniques. Recent Examples of Functional Analysis in Biology, Electromagnetics, Materials, and Mechanics Through numerous application exa

  20. JSON Schema for Attribute-based Access Control for Network Resource Security

    CSIR Research Space (South Africa)

    Linklater, G

    2017-09-01

    Full Text Available the features provided to XACML by XML Schema. Index Terms—JSON Schema; Access Control; Authorization; Security; Attribute-based Access Control; ABAC; Internet of Things; IoT; Server-to-Server; Machine-to-Machine; S2S; M2M; Network Security I. INTRODUCTION... with the requirements of ABAC. • Section V discusses the viability of JSON Schema as a replacement for XML Schema in the creation of a new JSON-based ABAC standard. This section also discusses possible future work that arose out of the conclusions drawn in this document...

  1. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  2. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  3. Regulatory and scientific frameworks for zoonosis control in Japan--contributing to International Health Regulations (2005).

    Science.gov (United States)

    Takahashi-Omoe, H; Omoe, K

    2009-12-01

    Zoonoses have earned recognition as the source of serious problems for both public and animal health throughout the world. Emerging infectious diseases have been occurring at an unprecedented rate since the 1970s and a large proportion of these diseases are considered zoonotic. To aid in controlling zoonoses, countermeasures have been strengthened against these diseases and are maintained at both national and international levels. Atypical example of this international effort can be found in the revised International Health Regulations (2005), known as the IHR (2005), which were instituted by the World Health Organization and have been implemented since 2007. In Japan, the appropriate Ministries have established frameworks for controlling zoonoses that employ both administrative and scientific approaches to fulfill the demands of the IHR (2005). In this paper, the authors present the Japanese framework for controlling zoonoses, as a useful example for global public and animal health management in coming years.

  4. Hierarchical Brokering with Feedback Control Framework in Mobile Device-Centric Clouds

    Directory of Open Access Journals (Sweden)

    Chao-Lieh Chen

    2016-01-01

    Full Text Available We propose a hierarchical brokering architecture (HiBA and Mobile Multicloud Networking (MMCN feedback control framework for mobile device-centric cloud (MDC2 computing. Exploiting the MMCN framework and RESTful web-based interconnection, each tier broker probes resource state of its federation for control and management. Real-time and seamless services were developed. Case studies including intrafederation energy-aware balancing based on fuzzy feedback control and higher tier load balancing are further demonstrated to show how HiBA with MMCN relieves the embedding of algorithms when developing services. Theoretical performance model and real-world experiments both show that an MDC2 based on HiBA features better quality in terms of resource availability and network latency if it federates devices with enough resources distributed in lower tier hierarchy. The proposed HiBA realizes a development platform for MDC2 computing which is a feasible solution to User-Centric Networks (UCNs.

  5. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  6. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  7. A Lean Framework for Production Control in Complex and Constrained Construction Projects (PC4P)

    DEFF Research Database (Denmark)

    Lindhard, Søren Munch; Wandahl, Søren

    2014-01-01

    and constrained construction project. Even though several tools have attempted to add structure and to create order, to the complex, dynamic, and uncertain context in which constructions is conducted, none has yet fully succeeded in providing a robust production control system. With outset in the lean tool Last...... Planner System of Production Control, a robust construction production control framework has been developed.......Production conditions in construction are different than in themanufacturing industry. First of all, construction is rooted in place and conducted as on-site manufacturing. Secondly, every construction project is unique and a one-of-a-kind production, managed by a temporary organization consisting...

  8. A modular robust control framework for control of movement elicited by multi-electrode intraspinal microstimulation

    Science.gov (United States)

    Roshani, Amir; Erfanian, Abbas

    2016-08-01

    Objective. An important issue in restoring motor function through intraspinal microstimulation (ISMS) is the motor control. To provide a physiologically plausible motor control using ISMS, it should be able to control the individual motor unit which is the lowest functional unit of motor control. By focal stimulation only a small group of motor neurons (MNs) within a motor pool can be activated. Different groups of MNs within a motor pool can potentially be activated without involving adjacent motor pools by local stimulation of different parts of a motor pool via microelectrode array implanted into a motor pool. However, since the system has multiple inputs with single output during multi-electrode ISMS, it poses a challenge to movement control. In this paper, we proposed a modular robust control strategy for movement control, whereas multi-electrode array is implanted into each motor activation pool of a muscle. Approach. The controller was based on the combination of proportional-integral-derivative and adaptive fuzzy sliding mode control. The global stability of the controller was guaranteed. Main results. The results of the experiments on rat models showed that the multi-electrode control can provide a more robust control and accurate tracking performance than a single-electrode control. The control output can be pulse amplitude (pulse amplitude modulation, PAM) or pulse width (pulse width modulation, PWM) of the stimulation signal. The results demonstrated that the controller with PAM provided faster convergence rate and better tracking performance than the controller with PWM. Significance. This work represents a promising control approach to the restoring motor functions using ISMS. The proposed controller requires no prior knowledge about the dynamics of the system to be controlled and no offline learning phase. The proposed control design is modular in the sense that each motor pool has an independent controller and each controller is able to control ISMS

  9. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  10. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    Science.gov (United States)

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  11. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    Science.gov (United States)

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  12. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  13. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    Energy Technology Data Exchange (ETDEWEB)

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  14. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    This paper explores gender relations in access to and control over resources in Awra Amba Community of Amhara Region, Ethiopia. The study employed primary and secondary data sources. The primary data were gathered through semistructured interviews with selected community members and key informants, focus ...

  15. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases

    DEFF Research Database (Denmark)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina

    2011-01-01

    for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken...

  16. Access To and Control of Resources Among The Maasai Women of ...

    African Journals Online (AJOL)

    The study to assess access to and control of resources among the Maasai women was conducted at Monduli and Makuyuni towns in Monduli District in Arusha Region. Data were collected from a sample of 75 respondents using questionnaire, in-depth interviews and focus group discussions. The majority of the ...

  17. Policy Based Access Control in Dynamic Grid-based Collaborative Environment

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; Tokmakoff, A.; van Buuren, R.

    2006-01-01

    This paper describes the design and development of a flexible, customer-driven, security infrastructure for Gridbased Collaborative Environments. The paper proposes further development of the access control model built around a service or resource provisioning agreement (e.g., an experiment or

  18. Access and control of agro-biotechnology : Bt cotton, ecological change and risk in China

    NARCIS (Netherlands)

    Ho, Peter; Zhao, Jennifer H.; Xue, Dayuan

    2009-01-01

    This article argues that if the introduction of genetically modified crops (GM crops) in developing countries is to be successful, we can and should not evade questions of access and control of technology. It implies probing into the experiences, perceptions and understanding of GM crops by the

  19. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to

  20. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    Science.gov (United States)

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  1. Using Face Recognition in the Automatic Door Access Control in a Secured Room

    Directory of Open Access Journals (Sweden)

    Gheorghe Gilca

    2017-06-01

    Full Text Available The aim of this paper is to help users improve the door security of sensitive locations by using face detection and recognition. This paper is comprised mainly of three subsystems: face detection, face recognition and automatic door access control. The door will open automatically for the known person due to the command of the microcontroller.

  2. RCT: Module 2.10, Access Control and Work Area Setup, Course 8776

    Energy Technology Data Exchange (ETDEWEB)

    Hillmer, Kurt T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-11

    This course presents information on radiological work permits (RWPs), various types of postings used in radiological areas, radiological area setups, access controls, and releases of material from radiological areas. All of these are fundamental duties of RCTs. This course will prepare the student with the skills necessary for radiological control technician (RCT) qualification by passing quizzes, tests, and the RCT Comprehensive Phase 1, Unit 2 Examination (TEST 27566) and providing in-thefield skills.

  3. A framework for evaluating the accessibility of raw materials from end-of-life products and the Earth's crust

    OpenAIRE

    Mueller, Sandra R.; Wager, Patrick A.; Turner, David A.; Shaw, Peter J.; Williams, Ian D.

    2017-01-01

    An increasing number of geochemically scarce metallic raw materials are entering into our lives via new technologies. A reversal of this trend is not foreseeable, leading to concerns regarding the security of their supply. However, the evaluation of raw material supply is currently hampered by inconsistent use of fundamental terminologies and incomplete assessment criteria. In this paper, we aim to establish a consistent framework for evaluating raw material supply from both anthropogenic and...

  4. Cloud computing-based energy optimization control framework for plug-in hybrid electric bus

    International Nuclear Information System (INIS)

    Yang, Chao; Li, Liang; You, Sixiong; Yan, Bingjie; Du, Xian

    2017-01-01

    Considering the complicated characteristics of traffic flow in city bus route and the nonlinear vehicle dynamics, optimal energy management integrated with clustering and recognition of driving conditions in plug-in hybrid electric bus is still a challenging problem. Motivated by this issue, this paper presents an innovative energy optimization control framework based on the cloud computing for plug-in hybrid electric bus. This framework, which includes offline part and online part, can realize the driving conditions clustering in offline part, and the energy management in online part. In offline part, utilizing the operating data transferred from a bus to the remote monitoring center, K-means algorithm is adopted to cluster the driving conditions, and then Markov probability transfer matrixes are generated to predict the possible operating demand of the bus driver. Next in online part, the current driving condition is real-time identified by a well-trained support vector machine, and Markov chains-based driving behaviors are accordingly selected. With the stochastic inputs, stochastic receding horizon control method is adopted to obtain the optimized energy management of hybrid powertrain. Simulations and hardware-in-loop test are carried out with the real-world city bus route, and the results show that the presented strategy could greatly improve the vehicle fuel economy, and as the traffic flow data feedback increases, the fuel consumption of every plug-in hybrid electric bus running in a specific bus route tends to be a stable minimum. - Highlights: • Cloud computing-based energy optimization control framework is proposed. • Driving cycles are clustered into 6 types by K-means algorithm. • Support vector machine is employed to realize the online recognition of driving condition. • Stochastic receding horizon control-based energy management strategy is designed for plug-in hybrid electric bus. • The proposed framework is verified by simulation and hard

  5. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  6. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    Science.gov (United States)

    Bögel, K; Joshi, D D

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign.

  7. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  8. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  9. A novel control framework for nonlinear time-delayed dual-master/single-slave teleoperation.

    Science.gov (United States)

    Ghorbanian, A; Rezaei, S M; Khoogar, A R; Zareinejad, M; Baghestan, K

    2013-03-01

    A novel trilateral control architecture for the Dual-master/Single-slave teleoperation is proposed in this paper. This framework has been used in surgical training and rehabilitation applications. In this structure, the slave motion has been controlled by weighted summation of signals transmitted by the operator referring to task control authority through the dominance factors. The nonlinear dynamics for telemanipulators are considered which were considered as disregarded issues in previous studies of this field. Bounded variable time-delay has been considered which affects the transmitted signals in the communication channels. Two types of controllers have been offered and an appropriate stability analysis for each controller has been demonstrated. The first controller includes Proportional with dissipative gains (P+d). The second one contains Proportional and Derivative with dissipative gains (PD+d). In both cases, the stability of the trilateral control framework is preserved by choosing appropriate controller's gains. It is shown that these controllers attempt to coordinate the positions of telemanipulators in the free motion condition. The stability of the Dual-master/Single-slave teleoperation has been proved by an appropriate Lyapunov like function and the stability conditions have been studied. In addition the proposed PD+d control architecture is modified for trilateral teleoperation with internet communication between telemanipulators that caused such communication complications as packet loss, data duplication and swapping. A number of experiments have been conducted with various levels of dominance factor to validate the effectiveness of the new control architecture. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.

  10. Comparing, optimizing, and benchmarking quantum-control algorithms in a unifying programming framework

    International Nuclear Information System (INIS)

    Machnes, S.; Sander, U.; Glaser, S. J.; Schulte-Herbrueggen, T.; Fouquieres, P. de; Gruslys, A.; Schirmer, S.

    2011-01-01

    For paving the way to novel applications in quantum simulation, computation, and technology, increasingly large quantum systems have to be steered with high precision. It is a typical task amenable to numerical optimal control to turn the time course of pulses, i.e., piecewise constant control amplitudes, iteratively into an optimized shape. Here, we present a comparative study of optimal-control algorithms for a wide range of finite-dimensional applications. We focus on the most commonly used algorithms: GRAPE methods which update all controls concurrently, and Krotov-type methods which do so sequentially. Guidelines for their use are given and open research questions are pointed out. Moreover, we introduce a unifying algorithmic framework, DYNAMO (dynamic optimization platform), designed to provide the quantum-technology community with a convenient matlab-based tool set for optimal control. In addition, it gives researchers in optimal-control techniques a framework for benchmarking and comparing newly proposed algorithms with the state of the art. It allows a mix-and-match approach with various types of gradients, update and step-size methods as well as subspace choices. Open-source code including examples is made available at http://qlib.info.

  11. Design and implementation of fingerprint access control system based on ZigBee wireless network

    Directory of Open Access Journals (Sweden)

    Zhang Jin

    2017-01-01

    Full Text Available this paper mainly introduces a kind of fingerprint access control system based on ZigBee wireless network design and implementation method, specify when passengers should fingerprints collected and stored in the system at the information desk PC, and then assign rooms;Guests entered the room according to the fingerprint module, the system will be fingerprint information through ZigBee coordinator node module and network to transmit the fingerprint characteristic value to management system and the fingerprint information stored, if consistent with the electromagnetic lock open, allowed to enter the room, does not conform to the issued a warning sound.Additional access control system can control the corresponding fingerprint information storage room and remove, such as is required for a security incident broke in situation is special open mode can be set up.System software design consists of two aspects of the bottom and upper machine.

  12. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over......This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...

  13. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    Billions of devices are connected to the Internet nowadays, and the number will continue to grow in the future thanks to the advances in the electronics and telecommunication technology developments. Its application in broad aspects of human’s life brings a lot of benefits by improving productivity...... and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of Io...... of a system can be accessed by other parties by means of a set of access policies. For an IoT system such as Radio Frequency Identification (RFID) that collects huge amounts of RFID events data and may store it in the cloud storage for tracking purpose, access control to such data becomes a critical point...

  14. On the Connection between the Hamilton-Jacobi-Bellman and the Fokker-Planck Control Frameworks

    KAUST Repository

    Annunziato, Mario

    2014-09-01

    In the framework of stochastic processes, the connection between the dynamic programming scheme given by the Hamilton-Jacobi-Bellman equation and a recently proposed control approach based on the Fokker-Planck equation is discussed. Under appropriate assumptions it is shown that the two strategies are equivalent in the case of expected cost functionals, while the FokkerPlanck formalism allows considering a larger class of objectives. To illustrate the connection between the two control strategies, the cases of an Itō stochastic process and of a piecewise-deterministic process are considered.

  15. Pore Environment Control and Enhanced Performance of Enzymes Infiltrated in Covalent Organic Frameworks.

    Science.gov (United States)

    Sun, Qi; Fu, Chung-Wei; Aguila, Briana; Perman, Jason; Wang, Sai; Huang, Hsi-Ya; Xiao, Feng-Shou; Ma, Shengqian

    2018-01-24

    In the drive toward green and sustainable methodologies for chemicals manufacturing, biocatalysts are predicted to have much to offer in the years to come. That being said, their practical applications are often hampered by a lack of long-term operational stability, limited operating range, and a low recyclability for the enzymes utilized. Herein, we show how covalent organic frameworks (COFs) possess all the necessary requirements needed to serve as ideal host materials for enzymes. The resultant biocomposites of this study have shown the ability boost the stability and robustness of the enzyme in question, namely lipase PS, while also displaying activities far outperforming the free enzyme and biocomposites made from other types of porous materials, such as mesoporous silica and metal-organic frameworks, exemplified in the kinetic resolution of the alcohol assays performed. The ability to easily tune the pore environment of a COF using monomers bearing specific functional groups can improve its compatibility with a given enzyme. As a result, the orientation of the enzyme active site can be modulated through designed interactions between both components, thus improving the enzymatic activity of the biocomposites. Moreover, in comparison with their amorphous analogues, the well-defined COF pore channels not only make the accommodated enzymes more accessible to the reagents but also serve as stronger shields to safeguard the enzymes from deactivation, as evidenced by superior activities and tolerance to harsh environments. The amenability of COFs, along with our increasing understanding of the design rules for stabilizing enzymes in an accessible fashion, gives great promise for providing "off the shelf" biocatalysts for synthetic transformations.

  16. Intelligent Control Framework for the Feeding System in the Biomass Power Plant

    Directory of Open Access Journals (Sweden)

    Sun Jin

    2015-01-01

    Full Text Available This paper proposes an intelligent control framework for biomass drying process with flue gases based on FLC (fuzzy logic controller and CAN (Controller Area Network bus. In the operation of a biomass drying process, in order to get the biomass with the set-point low moisture content dried by waste high temperature flue gases, it is necessary to intelligent control for the biomass flow rate. Use of an experiment with varied materials at different initial moisture contents enables acquisition of the biomass flow rates as initial setting values. Set the error between actual straw moisture content and set-point, and rate of change of error as two inputs. the biomass flow rate can be acquired by the fuzzy logic computing as the output. Since the length of dryer is more than twenty meters, the integration by the CAN bus can ensure real-time reliable data acquisition and processing. The control framework for biomass drying process can be applied to a variety of biomass, such as, cotton stalk, corn stalk, rice straw, wheat straw, sugar cane. It has strong potential for practical applications because of its advantages on intelligent providing the set-point low moisture content of biomass feedstock for power generation equipment.

  17. Framework for establishing records control in hospitals as an ISO 9001 requirement.

    Science.gov (United States)

    Al-Qatawneh, Lina

    2017-02-13

    Purpose The purpose of this paper is to present the process followed to control records in a Jordanian private community hospital as an ISO 9001:2008 standard requirement. Design/methodology/approach Under the hospital quality council's supervision, the quality management and development office staff were responsible for designing, planning and implementing the quality management system (QMS) using the ISO 9001:2008 standard. A policy for records control was established. An action plan for establishing the records control was developed and implemented. On completion, a coding system for records was specified to be used by hospital staff. Finally, an internal audit was performed to verify conformity to the ISO 9001:2008 standard requirements. Findings Successful certification by a neutral body ascertained that the hospital's QMS conformed to the ISO 9001:2008 requirements. A framework was developed that describes the records controlling process, which can be used by staff in any healthcare organization wanting to achieve ISO 9001:2008 accreditation. Originality/value Given the increased interest among healthcare organizations to achieve the ISO 9001 certification, the proposed framework for establishing records control is developed and is expected to be a valuable management tool to improve and sustain healthcare quality.

  18. Measurement and Sustainability of the Qualifications Frameworks in the European Higher Education Area through an Employment Survey on Access to the Labour Market

    Directory of Open Access Journals (Sweden)

    Gracia Serrano

    2015-10-01

    Full Text Available There is a clear need to measure the correct implementation of the European Framework through the employability of the alumni. The evaluation of the deployment of the Qualifications Frameworks in the European Higher Education Area (QF-EHEA/QF should shed significant light on the action that must be taken by legislators and higher education managers to foster employability and guarantee the sustainability of the EHEA. We propose a methodology based on a Survey on Access to the Labour Market (SALM to assess the correlation between the education provided to the students and the practical utility of the knowledge acquired in the workplace. A questionnaire has been produced to measure the competencies and descriptors that had been theoretically defined within the QF-EHEA. Fifteen questions were disguised so that the six QF-EHEA descriptors were quantified through the difference between education and utility. The quantification methodology for the framework has been tested successfully on the former students of a higher education center in Spain. In this center, the alumni perceived that the utility of their acquired competencies and their employability level was greater than their education content, while both levels were reasonably high. The results hold for both Bachelor’s and Master’s degrees.

  19. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  20. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  1. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  2. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  3. A Tensor-Product-Kernel Framework for Multiscale Neural Activity Decoding and Control

    Science.gov (United States)

    Li, Lin; Brockmeier, Austin J.; Choi, John S.; Francis, Joseph T.; Sanchez, Justin C.; Príncipe, José C.

    2014-01-01

    Brain machine interfaces (BMIs) have attracted intense attention as a promising technology for directly interfacing computers or prostheses with the brain's motor and sensory areas, thereby bypassing the body. The availability of multiscale neural recordings including spike trains and local field potentials (LFPs) brings potential opportunities to enhance computational modeling by enriching the characterization of the neural system state. However, heterogeneity on data type (spike timing versus continuous amplitude signals) and spatiotemporal scale complicates the model integration of multiscale neural activity. In this paper, we propose a tensor-product-kernel-based framework to integrate the multiscale activity and exploit the complementary information available in multiscale neural activity. This provides a common mathematical framework for incorporating signals from different domains. The approach is applied to the problem of neural decoding and control. For neural decoding, the framework is able to identify the nonlinear functional relationship between the multiscale neural responses and the stimuli using general purpose kernel adaptive filtering. In a sensory stimulation experiment, the tensor-product-kernel decoder outperforms decoders that use only a single neural data type. In addition, an adaptive inverse controller for delivering electrical microstimulation patterns that utilizes the tensor-product kernel achieves promising results in emulating the responses to natural stimulation. PMID:24829569

  4. When is a randomised controlled trial health equity relevant? Development and validation of a conceptual framework.

    Science.gov (United States)

    Jull, J; Whitehead, M; Petticrew, M; Kristjansson, E; Gough, D; Petkovic, J; Volmink, J; Weijer, C; Taljaard, M; Edwards, S; Mbuagbaw, L; Cookson, R; McGowan, J; Lyddiatt, A; Boyer, Y; Cuervo, L G; Armstrong, R; White, H; Yoganathan, M; Pantoja, T; Shea, B; Pottie, K; Norheim, O; Baird, S; Robberstad, B; Sommerfelt, H; Asada, Y; Wells, G; Tugwell, P; Welch, V

    2017-09-25

    Randomised controlled trials can provide evidence relevant to assessing the equity impact of an intervention, but such information is often poorly reported. We describe a conceptual framework to identify health equity-relevant randomised trials with the aim of improving the design and reporting of such trials. An interdisciplinary and international research team engaged in an iterative consensus building process to develop and refine the conceptual framework via face-to-face meetings, teleconferences and email correspondence, including findings from a validation exercise whereby two independent reviewers used the emerging framework to classify a sample of randomised trials. A randomised trial can usefully be classified as 'health equity relevant' if it assesses the effects of an intervention on the health or its determinants of either individuals or a population who experience ill health due to disadvantage defined across one or more social determinants of health. Health equity-relevant randomised trials can either exclusively focus on a single population or collect data potentially useful for assessing differential effects of the intervention across multiple populations experiencing different levels or types of social disadvantage. Trials that are not classified as 'health equity relevant' may nevertheless provide information that is indirectly relevant to assessing equity impact, including information about individual level variation unrelated to social disadvantage and potentially useful in secondary modelling studies. The conceptual framework may be used to design and report randomised trials. The framework could also be used for other study designs to contribute to the evidence base for improved health equity. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  5. An object oriented framework of EPICS for MicroTCA based control system

    International Nuclear Information System (INIS)

    Geng, Z.

    2012-01-01

    EPICS (Experimental Physics and Industrial Control System) is a distributed control system platform which has been widely used for large scientific devices control like particle accelerators and fusion plant. EPICS has introduced object oriented (C ++ ) interfaces to most of the core services. But the major part of EPICS, the run-time database, only provides C interfaces, which is hard to involve the EPICS record concerned data and routines in the object oriented architecture of the software. This paper presents an object oriented framework which contains some abstract classes to encapsulate the EPICS record concerned data and routines in C ++ classes so that full OOA (Objected Oriented Analysis) and OOD (Object Oriented Design) methodologies can be used for EPICS IOC design. We also present a dynamic device management scheme for the hot swap capability of the MicroTCA based control system. (authors)

  6. A GPS-Based Control Framework for Accurate Current Sharing and Power Quality Improvement in Microgrids

    DEFF Research Database (Denmark)

    Golsorkhi, Mohammad; Savaghebi, Mehdi; Lu, Dylan

    2017-01-01

    This paper proposes a novel hierarchical control strategy for improvement of load sharing and power quality in ac microgrids. This control framework is composed of a droop based controller at the primary level, and a combination of distributed power sharing and voltage conditioning schemes...... consensus protocol to ensure proportional sharing of average power. The voltage conditioning scheme produces compensation signals at fundamental and dominant harmonics to improve the voltage quality at a sensitive load bus. Experimental results are presented to validate the efficacy of the proposed method....... dynamic response. The droop coefficient, which acts as a virtual resistance is adaptively changed as a function of the peak current. This strategy not only simplifies the control design but also improves the current sharing accuracy at high loading conditions. The distributed power sharing scheme uses...

  7. The benefits from complying with the framework convention on tobacco control: a SimSmoke analysis of 15 European nations.

    Science.gov (United States)

    Levy, David T; Huang, An-Tsun; Currie, Laura M; Clancy, Luke

    2014-12-01

    This article compares the predicted impact of tobacco tax increases alone and as part of a comprehensive tobacco control strategy on smoking prevalence and smoking-attributable deaths (SADs) across 15 European countries. Country-specific population, smoking prevalence and policy data with modified parameter values have been applied to the previously validated SimSmoke model for 10 high-income and 5 middle-income European nations. The impact of past and potential future policies is modelled. Models generally validated well across the 15 countries, and showed the impact of past policies. Without stronger future policies, 44 million lives would be lost due to smoking across the 15 study countries between 2011 and 2040, but effective policies could avert 7.7 million of those premature deaths. Results suggest that past policies have been effective in reducing smoking rates, but there is also a strong potential for future policies consistent with the Framework Convention on Tobacco Control. When specific taxes are increased to 70% of retail price, strong smoke-free air laws, youth access laws and marketing restrictions are enforced, stronger health warnings are implemented, and cessation treatment and media campaigns are supported, smoking prevalence and SADs will fall substantially in European countries. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2013; all rights reserved.

  8. Risk Control of Offshore Installations. A Framework for the Establishment of Risk Indicators

    Energy Technology Data Exchange (ETDEWEB)

    Oeien, Knut

    2001-07-01

    Currently quantitative risk assessments are carried out to analyze the risk level of offshore installations and to evaluate whether or not the risk level is acceptable. By way of the quantitative risk analysis the risk status of a given installation is obtained. However, the risk status is obtained so infrequently that it is inadequate for risk control. It can be compared to economic control having the economic status presented about each fifth year, which is obviously inadequate. It is important to know the risk status because this may provide an early warning about the need for remedial actions. Without frequent information about the risk status, control of risk cannot be claimed. The main objective of this thesis has been the development of a framework for the establishment of risk indicators. These risk indicators provide a status of the risk level through measuring of changes in technical, operational and organizational factors important to risk, and is thus a means to control risk during operation of offshore petroleum installations. The framework consists of a technical methodology using the quantitative risk assessment as a basis, an organizational model, and an organizational quantification methodology. Technical risk indicators are established from the technical methodology covering the risk factors explicitly included in the quantitative risk assessment. Organizational risk indicators measure changes in the organizational risk factors included in the organizational model, but not included in the quantitative risk assessment. The organizational model is an extension to the risk model in the quantitative risk assessment. The organizational quantification methodology calculates the effect of the changes measured by the organizational risk indicators. The organizational model may also be applied as a qualitative tool for root cause analysis of incidents (process leaks). Other results are an intermediate-level expert judgment procedure applicable for

  9. Hybrid Multi-Agent Control in Microgrids: Framework, Models and Implementations Based on IEC 61850

    Directory of Open Access Journals (Sweden)

    Xiaobo Dou

    2014-12-01

    Full Text Available Operation control is a vital and complex issue for microgrids. The objective of this paper is to explore the practical means of applying decentralized control by using a multi agent system in actual microgrids and devices. This paper presents a hierarchical control framework (HCF consisting of local reaction control (LRC level, local decision control (LDC level, horizontal cooperation control (HCC level and vertical cooperation control (VCC level to meet different control requirements of a microgrid. Then, a hybrid multi-agent control model (HAM is proposed to implement HCF, and the properties, functionalities and operating rules of HAM are described. Furthermore, the paper elaborates on the implementation of HAM based on the IEC 61850 Standard, and proposes some new implementation methods, such as extended information models of IEC 61850 with agent communication language and bidirectional interaction mechanism of generic object oriented substation event (GOOSE communication. A hardware design and software system are proposed and the results of simulation and laboratory tests verify the effectiveness of the proposed strategies, models and implementations.

  10. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    energy sources, such as wind turbines, solar energy or wave energy. This introduces important new security challenges that are not adequately addressed by existing approaches to security in the electrical power distribution infrastructure. In this paper we examine some of the security challenges that may...... arise in the emerging energy distribution infrastructure. In particular, we examine the security problems that arise in the area of wind power communication infrastructures based on the IEC 61400-25 and IEC 62351 standards. These standards define ways of representing elements of the wind power...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...

  11. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  12. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  13. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  14. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  15. A Modular Framework for Modeling Hardware Elements in Distributed Engine Control Systems

    Science.gov (United States)

    Zinnecker, Alicia Mae; Culley, Dennis E.; Aretskin-Hariton, Eliot D.

    2014-01-01

    Progress toward the implementation of distributed engine control in an aerospace application may be accelerated through the development of a hardware-in-the-loop (HIL) system for testing new control architectures and hardware outside of a physical test cell environment. One component required in an HIL simulation system is a high-fidelity model of the control platform: sensors, actuators, and the control law. The control system developed for the Commercial Modular Aero-Propulsion System Simulation 40k (40,000 pound force thrust) (C-MAPSS40k) provides a verifiable baseline for development of a model for simulating a distributed control architecture. This distributed controller model will contain enhanced hardware models, capturing the dynamics of the transducer and the effects of data processing, and a model of the controller network. A multilevel framework is presented that establishes three sets of interfaces in the control platform: communication with the engine (through sensors and actuators), communication between hardware and controller (over a network), and the physical connections within individual pieces of hardware. This introduces modularity at each level of the model, encouraging collaboration in the development and testing of various control schemes or hardware designs. At the hardware level, this modularity is leveraged through the creation of a Simulink (R) library containing blocks for constructing smart transducer models complying with the IEEE 1451 specification. These hardware models were incorporated in a distributed version of the baseline C-MAPSS40k controller and simulations were run to compare the performance of the two models. The overall tracking ability differed only due to quantization effects in the feedback measurements in the distributed controller. Additionally, it was also found that the added complexity of the smart transducer models did not prevent real-time operation of the distributed controller model, a requirement of an HIL

  16. A Modular Framework for Modeling Hardware Elements in Distributed Engine Control Systems

    Science.gov (United States)

    Zinnecker, Alicia M.; Culley, Dennis E.; Aretskin-Hariton, Eliot D.

    2015-01-01

    Progress toward the implementation of distributed engine control in an aerospace application may be accelerated through the development of a hardware-in-the-loop (HIL) system for testing new control architectures and hardware outside of a physical test cell environment. One component required in an HIL simulation system is a high-fidelity model of the control platform: sensors, actuators, and the control law. The control system developed for the Commercial Modular Aero-Propulsion System Simulation 40k (C-MAPSS40k) provides a verifiable baseline for development of a model for simulating a distributed control architecture. This distributed controller model will contain enhanced hardware models, capturing the dynamics of the transducer and the effects of data processing, and a model of the controller network. A multilevel framework is presented that establishes three sets of interfaces in the control platform: communication with the engine (through sensors and actuators), communication between hardware and controller (over a network), and the physical connections within individual pieces of hardware. This introduces modularity at each level of the model, encouraging collaboration in the development and testing of various control schemes or hardware designs. At the hardware level, this modularity is leveraged through the creation of a SimulinkR library containing blocks for constructing smart transducer models complying with the IEEE 1451 specification. These hardware models were incorporated in a distributed version of the baseline C-MAPSS40k controller and simulations were run to compare the performance of the two models. The overall tracking ability differed only due to quantization effects in the feedback measurements in the distributed controller. Additionally, it was also found that the added complexity of the smart transducer models did not prevent real-time operation of the distributed controller model, a requirement of an HIL system.

  17. STAR Online Meta-Data Collection Framework: Integration with the Pre-existing Controls Infrastructure

    Science.gov (United States)

    Arkhipkin, D.; Lauret, J.

    2017-10-01

    One of the STAR experiment’s modular Messaging Interface and Reliable Architecture framework (MIRA) integration goals is to provide seamless and automatic connections with the existing control systems. After an initial proof of concept and operation of the MIRA system as a parallel data collection system for online use and real-time monitoring, the STAR Software and Computing group is now working on the integration of Experimental Physics and Industrial Control System (EPICS) with MIRA’s interfaces. This integration goals are to allow functional interoperability and, later on, to replace the existing/legacy Detector Control System components at the service level. In this report, we describe the evolutionary integration process and, as an example, will discuss the EPICS Alarm Handler conversion. We review the complete upgrade procedure starting with the integration of EPICS-originated alarm signals propagation into MIRA, followed by the replacement of the existing operator interface based on Motif Editor and Display Manager (MEDM) with modern portable web-based Alarm Handler interface. To achieve this aim, we have built an EPICS-to-MQTT [8] bridging service, and recreated the functionality of the original Alarm Handler using low-latency web messaging technologies. The integration of EPICS alarm handling into our messaging framework allowed STAR to improve the DCS alarm awareness of existing STAR DAQ and RTS services, which use MIRA as a primary source of experiment control information.

  18. Deciphering the genetic regulatory code using an inverse error control coding framework.

    Energy Technology Data Exchange (ETDEWEB)

    Rintoul, Mark Daniel; May, Elebeoba Eni; Brown, William Michael; Johnston, Anna Marie; Watson, Jean-Paul

    2005-03-01

    We have found that developing a computational framework for reconstructing error control codes for engineered data and ultimately for deciphering genetic regulatory coding sequences is a challenging and uncharted area that will require advances in computational technology for exact solutions. Although exact solutions are desired, computational approaches that yield plausible solutions would be considered sufficient as a proof of concept to the feasibility of reverse engineering error control codes and the possibility of developing a quantitative model for understanding and engineering genetic regulation. Such evidence would help move the idea of reconstructing error control codes for engineered and biological systems from the high risk high payoff realm into the highly probable high payoff domain. Additionally this work will impact biological sensor development and the ability to model and ultimately develop defense mechanisms against bioagents that can be engineered to cause catastrophic damage. Understanding how biological organisms are able to communicate their genetic message efficiently in the presence of noise can improve our current communication protocols, a continuing research interest. Towards this end, project goals include: (1) Develop parameter estimation methods for n for block codes and for n, k, and m for convolutional codes. Use methods to determine error control (EC) code parameters for gene regulatory sequence. (2) Develop an evolutionary computing computational framework for near-optimal solutions to the algebraic code reconstruction problem. Method will be tested on engineered and biological sequences.

  19. A Model-based Framework for Risk Assessment in Human-Computer Controlled Systems

    Science.gov (United States)

    Hatanaka, Iwao

    2000-01-01

    The rapid growth of computer technology and innovation has played a significant role in the rise of computer automation of human tasks in modem production systems across all industries. Although the rationale for automation has been to eliminate "human error" or to relieve humans from manual repetitive tasks, various computer-related hazards and accidents have emerged as a direct result of increased system complexity attributed to computer automation. The risk assessment techniques utilized for electromechanical systems are not suitable for today's software-intensive systems or complex human-computer controlled systems. This thesis will propose a new systemic model-based framework for analyzing risk in safety-critical systems where both computers and humans are controlling safety-critical functions. A new systems accident model will be developed based upon modem systems theory and human cognitive processes to better characterize system accidents, the role of human operators, and the influence of software in its direct control of significant system functions. Better risk assessments will then be achievable through the application of this new framework to complex human-computer controlled systems.

  20. Target Diagnostic Instrument-Based Controls Framework for the National Ignition Facility

    International Nuclear Information System (INIS)

    Shelton, R; O'Brien, D; Nelson, J; Kamperschroer, J

    2007-01-01

    NIF target diagnostics are being developed to observe and measure the extreme physics of targets irradiated by the 192-beam laser. The response time of target materials can be on the order of 100ps--the time it takes light to travel 3 cm--temperatures more than 100 times hotter than the surface of the sun, and pressures that exceed 109 atmospheres. Optical and x-ray diagnostics were developed and fielded to observe and record the results of the first 4-beam experiments at NIF. Hard and soft x-ray spectra were measured, and time-integrated and gated x-ray images of hydrodynamics experiments were recorded. Optical diagnostics recorded backscatter from the target, and VISAR laser velocimetry measurements were taken of laser-shocked target surfaces. Additional diagnostics are being developed and commissioned to observe and diagnose ignition implosions, including various neutron and activation diagnostics. NIF's diagnostics are being developed at LLNL and with collaborators at other sites. To accommodate the growing number of target diagnostics, an Instrument-Based Controls hardware-software framework has been developed to facilitate development and ease integration into the NIF Integrated Computer Control System (ICCS). Individual WindowsXP PC controllers for each digitizer, power supply and camera (i.e., instruments) execute controls software unique to each instrument model. Each hardware-software controller manages a single instrument, in contrast to the complexity of combining all the controls software needed for a diagnostic into a single controller. Because of this simplification, controllers can be more easily tested on the actual hardware, evaluating all normal and off-normal conditions. Each target diagnostic is then supported by a number of instruments, each with its own hardware-software instrument-based controller. Advantages of the instrument-based control architecture and framework include reusability, testability, and improved reliability of the deployed

  1. Target Diagnostic Instrument-Based Controls Framework for the National Ignition Facility

    Energy Technology Data Exchange (ETDEWEB)

    Shelton, R; O' Brien, D; Nelson, J; Kamperschroer, J

    2007-05-07

    NIF target diagnostics are being developed to observe and measure the extreme physics of targets irradiated by the 192-beam laser. The response time of target materials can be on the order of 100ps--the time it takes light to travel 3 cm--temperatures more than 100 times hotter than the surface of the sun, and pressures that exceed 109 atmospheres. Optical and x-ray diagnostics were developed and fielded to observe and record the results of the first 4-beam experiments at NIF. Hard and soft x-ray spectra were measured, and time-integrated and gated x-ray images of hydrodynamics experiments were recorded. Optical diagnostics recorded backscatter from the target, and VISAR laser velocimetry measurements were taken of laser-shocked target surfaces. Additional diagnostics are being developed and commissioned to observe and diagnose ignition implosions, including various neutron and activation diagnostics. NIF's diagnostics are being developed at LLNL and with collaborators at other sites. To accommodate the growing number of target diagnostics, an Instrument-Based Controls hardware-software framework has been developed to facilitate development and ease integration into the NIF Integrated Computer Control System (ICCS). Individual WindowsXP PC controllers for each digitizer, power supply and camera (i.e., instruments) execute controls software unique to each instrument model. Each hardware-software controller manages a single instrument, in contrast to the complexity of combining all the controls software needed for a diagnostic into a single controller. Because of this simplification, controllers can be more easily tested on the actual hardware, evaluating all normal and off-normal conditions. Each target diagnostic is then supported by a number of instruments, each with its own hardware-software instrument-based controller. Advantages of the instrument-based control architecture and framework include reusability, testability, and improved reliability of the

  2. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    OpenAIRE

    Mikel Uriarte Itzazelaia; Jasone Astorga; Eduardo Jacob; Maider Huarte; Pedro Romaña

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control model...

  3. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    OpenAIRE

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessib...

  4. Embedded LLRF controller with channel access on MicroTCA back-plane interconnect

    International Nuclear Information System (INIS)

    Furukawa, K.; Akai, K.; Akiyama, A.; Kobayashi, T.; Michizono, S.; Miura, T.; Nakanishi, K.; Odagiri, J.; Deguchi, H.; Hayashi, K.; Ryoshi, M.

    2012-01-01

    A low-level RF controller has been developed for the accelerator controls for SuperKEKB, Super-conducting RF Test facility (STF) and Compact-ERL (cERL) at KEK. The feedback mechanism will be performed on Virtex-5 FPGA with 16-bit ADCs and DACs. The card was designed in the form-factor of an advanced mezzanine card (AMC) for a MicroTCA shelf. An embedded EPICS IOC on the Power-PC core in FPGA will provide the global controls through channel access (CA) protocol on the back-plane interconnect of the shelf. No other mechanisms are required for the external linkages. CA is exclusively employed in order not only to make the AMC cards to communicate with each other, but also to communicate with central controls and with an embedded IOC on a Linux-based PLC for slow controls. (authors)

  5. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal...

  6. Design of Novel Online Access and Control Interface for Remote Experiment on DC Drives

    Directory of Open Access Journals (Sweden)

    Jagadeesh Chandra A.P

    2009-05-01

    Full Text Available Internet has revolutionized the way in which the information is delivered. Laboratory based courses play an important role in technical education. Automation is changing the nature of these laboratories and the system designer’s focus on Internet accessed experiments owing to the availability of several tools to integrate electronic and mechanical hardware with the World Wide Web. Stand-alone approaches in remote learning have grown tremendously in the recent years. One of the important components in remote experimentation is the integration of Virtual Instruments to perform real hardware tasks in near real-time. The paper describes a web interface to the electrical hardware and integration of LabVIEW Virtual Instruments to the remote access and control of DC Drives. Customized electrical hardware serves as the web interface, supporting various features to remotely control and measure the parameters of the electrical machine. Novel techniques have been used to interface a low power data acquisition system with the DC machine driven by the AC power supply. The system uses the client-server architecture to access the web page of the Virtual Instruments through web browser. The developed system imitates the real control of experiment hardware, but being operated remotely through Internet.

  7. Control of Process Operations and Monitoring of Product Qualities through Generic Model-based Framework in Crystallization Processes

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli Bin

    A generic and systematic model-based framework for the design of a process monitoring and control system to achieve the desired crystal size distribution (CSD) and crystal shape for a wide range of crystallization processes has been developed. This framework combines a generic multi-dimensional m...

  8. Development of the exposure and access control dosimeter system for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Si Young; Lee, B. J.; Kim, B. H.; Kim, J. S.; Lee, K. C.; Kang, B. H.; Kim, C. K.; Ham, C. S.; Kwon, K. C.; Park, W. M.; Kim, C. H.; Kim, J. T.; Koo, C. H.; Park, S. J.; Kim, T. W

    1999-12-01

    In this paper an electronic personal dosimeter(EPD) adopt in a PIN type silicon semiconductor as a radiation detector has been developed, designed and a prototype dosimeter has been manufactured. A series of performance test of this EPD on reference radiation field has been carried out. A dosimeter reader which reads the radiation dose from EPD and make a real time access control in connection with the entrance door to radiation controlled area has been developed, designed and manufactured. S/W program supporting hangul (Korean language) has been developed to operate the EPD and reader system with a personal computer. (author)

  9. Biomedical Big Data: New Models of Control Over Access, Use and Governance.

    Science.gov (United States)

    Vayena, Effy; Blasimme, Alessandro

    2017-12-01

    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.

  10. Adolescent suicide and household access to firearms in Colorado: results of a case-control study.

    Science.gov (United States)

    Shah, S; Hoffman, R E; Wake, L; Marine, W M

    2000-03-01

    To determine whether, compared with age- and sex-matched controls who did not commit suicide, adolescents who committed suicide by firearms were more likely to have had household access to firearms (after adjusting for significant risk factors for adolescent suicide). A case-control study design was used; case subjects were Colorado adolescents who committed suicide between 1991 and 1993; controls were sex- and age-matched adolescents who were randomly selected from the same school the subjects had attended. Interviews were conducted with the parent or guardian of cases and controls. Of the 36 case subjects in this study, 67% committed suicide using a gun obtained from their home. Adolescent suicide victims who committed suicide by firearms were significantly more likely to have a firearm in their home (72%) than age- and sex-matched community controls (50%), after adjusting for significant risk factors. Conduct disorder and previous mental health treatment were also found to be independent risk factors for adolescent firearm suicide. Two types of public health interventions to prevent adolescent firearm suicides are likely to be successful: (a) limiting household access to firearms, and (b) identifying adolescents at high risk of firearm suicide.

  11. Ubiquitous UAVs: a cloud based framework for storing, accessing and processing huge amount of video footage in an efficient way

    Science.gov (United States)

    Efstathiou, Nectarios; Skitsas, Michael; Psaroudakis, Chrysostomos; Koutras, Nikolaos

    2017-09-01

    Nowadays, video surveillance cameras are used for the protection and monitoring of a huge number of facilities worldwide. An important element in such surveillance systems is the use of aerial video streams originating from onboard sensors located on Unmanned Aerial Vehicles (UAVs). Video surveillance using UAVs represent a vast amount of video to be transmitted, stored, analyzed and visualized in a real-time way. As a result, the introduction and development of systems able to handle huge amount of data become a necessity. In this paper, a new approach for the collection, transmission and storage of aerial videos and metadata is introduced. The objective of this work is twofold. First, the integration of the appropriate equipment in order to capture and transmit real-time video including metadata (i.e. position coordinates, target) from the UAV to the ground and, second, the utilization of the ADITESS Versatile Media Content Management System (VMCMS-GE) for storing of the video stream and the appropriate metadata. Beyond the storage, VMCMS-GE provides other efficient management capabilities such as searching and processing of videos, along with video transcoding. For the evaluation and demonstration of the proposed framework we execute a use case where the surveillance of critical infrastructure and the detection of suspicious activities is performed. Collected video Transcodingis subject of this evaluation as well.

  12. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care. Copyright © 2012 Elsevier Inc. All rights reserved.

  13. The Functionalization, Size Control and Properties of Metal-Organic Frameworks

    DEFF Research Database (Denmark)

    Xu, Hui; Iversen, Bo Brummerstedt

    Recent years, Metal-Organic Framework (MOF) materials have drawn great attentions due to their potential applications in gas sorption/separation and luminescent sensing. In this dissertation, the recent progress of MOF materials is reviewed, with specific focus on the functionalization, size...... control and properties of MOF materials. A cationic MOF material was synthesized, and small hydrocarbons C1/C2 sorption/separation properties were studied. A MOF with both open metal sites and Lewis basic pyridyl sites was developed, and C2H2, CO2 and CH4 gas sorption/separation properties were explored...

  14. Advanced concept for damage control : A framework to simulate fire propagation and damage control effects

    NARCIS (Netherlands)

    Gillis, M.P.W.; Keijer, W.; Smit, C.S.

    2003-01-01

    Current damage control procedures are developed on the basis of a long-standing experience. However there are reasons to believe that these procedures do not account for major weapon-induced calamities. Fire fighting after substantial blast and fragmentation damage, due to a weaponhit, is quite

  15. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    Science.gov (United States)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  16. A Unified Multi-Functional Dynamic Spectrum Access Framework: Tutorial, Theory and Multi-GHz Wideband Testbed

    Science.gov (United States)

    Qiu, Robert; Guo, Nan; Li, Husheng; Wu, Zhiqiang; Chakravarthy, Vasu; Song, Yu; Hu, Zhen; Zhang, Peng; Chen, Zhe

    2009-01-01

    Dynamic spectrum access is a must-have ingredient for future sensors that are ideally cognitive. The goal of this paper is a tutorial treatment of wideband cognitive radio and radar—a convergence of (1) algorithms survey, (2) hardware platforms survey, (3) challenges for multi-function (radar/communications) multi-GHz front end, (4) compressed sensing for multi-GHz waveforms—revolutionary A/D, (5) machine learning for cognitive radio/radar, (6) quickest detection, and (7) overlay/underlay cognitive radio waveforms. One focus of this paper is to address the multi-GHz front end, which is the challenge for the next-generation cognitive sensors. The unifying theme of this paper is to spell out the convergence for cognitive radio, radar, and anti-jamming. Moore’s law drives the system functions into digital parts. From a system viewpoint, this paper gives the first comprehensive treatment for the functions and the challenges of this multi-function (wideband) system. This paper brings together the inter-disciplinary knowledge. PMID:22454598

  17. An interaction-based access control model (IBAC) for collaborative services

    Energy Technology Data Exchange (ETDEWEB)

    Altunay, Mine; /Fermilab; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  18. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  19. Frequency-selective design of wireless power transfer systems for controlled access applications

    Science.gov (United States)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  20. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  1. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  2. On the designing of a tamper resistant prescription RFID access control system.

    Science.gov (United States)

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  3. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    Iyengar, R.D.; Verma, P.B.; Prasad, V.V.S.S.; George, Jain R.; Das, Tripti; Deshmukh, D.K.

    2001-01-01

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  4. Defining Feasibility and Pilot Studies in Preparation for Randomised Controlled Trials: Development of a Conceptual Framework.

    Directory of Open Access Journals (Sweden)

    Sandra M Eldridge

    Full Text Available We describe a framework for defining pilot and feasibility studies focusing on studies conducted in preparation for a randomised controlled trial. To develop the framework, we undertook a Delphi survey; ran an open meeting at a trial methodology conference; conducted a review of definitions outside the health research context; consulted experts at an international consensus meeting; and reviewed 27 empirical pilot or feasibility studies. We initially adopted mutually exclusive definitions of pilot and feasibility studies. However, some Delphi survey respondents and the majority of open meeting attendees disagreed with the idea of mutually exclusive definitions. Their viewpoint was supported by definitions outside the health research context, the use of the terms 'pilot' and 'feasibility' in the literature, and participants at the international consensus meeting. In our framework, pilot studies are a subset of feasibility studies, rather than the two being mutually exclusive. A feasibility study asks whether something can be done, should we proceed with it, and if so, how. A pilot study asks the same questions but also has a specific design feature: in a pilot study a future study, or part of a future study, is conducted on a smaller scale. We suggest that to facilitate their identification, these studies should be clearly identified using the terms 'feasibility' or 'pilot' as appropriate. This should include feasibility studies that are largely qualitative; we found these difficult to identify in electronic searches because researchers rarely used the term 'feasibility' in the title or abstract of such studies. Investigators should also report appropriate objectives and methods related to feasibility; and give clear confirmation that their study is in preparation for a future randomised controlled trial designed to assess the effect of an intervention.

  5. Lessons from Africa: developing a global human rights framework for tuberculosis control and prevention.

    Science.gov (United States)

    Slagle, Tracy; Ben Youssef, Mehdi; Calonge, Golda; Ben Amor, Yanis

    2014-12-03

    Tuberculosis is a highly contagious disease, and there has been a rise in recent years of drug-resistant cases no longer responding to standard treatment. In order to address this threat and contain possible transmission of drug-resistant cases, some countries have taken strong action, including the compulsory detention of non-adherent drug-resistant patients. These measures have been strongly criticized by human rights advocates, and they raise the question of how to legally protect both citizens and the community. Following discussions with National Tuberculosis Programs in Africa (the continent with the highest incidence rates of tuberculosis worldwide), we show that of all the countries surveyed, all but one (Swaziland) had either no specific policy addressing tuberculosis, or only general policies regarding public health applicable to tuberculosis. Six countries also reported having policies that address non-adherence to treatment with containment (isolation in health facilities or incarceration), but laws are not adequately enforced. If the international community wants to effectively respond to the threat of tuberculosis transmission, there is a need to go beyond national tuberculosis policies and to implement an international framework for tuberculosis control, inspired by the Framework Convention on Tobacco Control, a key model for future public health treaties that address global burdens of disease. The framework, for which we clarify the conditions and procedures in this piece, would define the rights and responsibilities of the different stakeholders involved: patients, doctors, pharmaceutical firms and public authorities. To facilitate the governance of the national obligations under the Convention, a coordinating body should be set up, under the leadership of the World Health Organization and the Stop TB Partnership. Successfully implementing policies for tuberculosis that simultaneously address patients' rights and communities' wellbeing will have

  6. WHO Framework Convention on Tobacco Control in China: barriers, challenges and recommendations.

    Science.gov (United States)

    Hu, Teh-Wei; Lee, Anita H; Mao, Zhengzhong

    2013-12-01

    The aim of this study was to analyze the barriers in the implementation of the Framework Convention on Tobacco Control (FCTC) in China and present recommendations on ways to address these challenges in tobacco control in China. We review the available literature on progress and explore the barriers and challenges that impede a speedier pace in the adoption of the effective tobacco control measures, and present recommendations based on in-depth knowledge of decision-making process on the implementation of FCTC in China. The pace of progress in China is too slow. China faces intractable political, structural, economic and social barriers in tobacco control, which make the whole-hearted implementation of FCTC measures a painstaking process. The authors recommend a comprehensive approach to speed up the implementation of tobacco control measures. This includes strong political leadership from the top, structural changes to the tobacco industry and government oversight of the tobacco industry, as well as advocacy and support for tobacco control from civil society at the grassroots level.

  7. Human Rights and Drug Control : Access to Controlled Essential Medicines in Resource-Constrained Countries

    NARCIS (Netherlands)

    Gispen, M.E.C.

    2017-01-01

    Millions of people worldwide suffer a range of health and socio-economic related problems because of inadequate availability and use of controlled essential medicines like morphine and codeine for pain treatment. As a result, millions of people, often living in lesser-advanced conditions, suffer in

  8. A Framework for Probabilistic Evaluation of Interval Management Tolerance in the Terminal Radar Control Area

    Science.gov (United States)

    Hercencia-Zapana, Heber; Herencia-Zapana, Heber; Hagen, George E.; Neogi, Natasha

    2012-01-01

    Projections of future traffic in the national airspace show that most of the hub airports and their attendant airspace will need to undergo significant redevelopment and redesign in order to accommodate any significant increase in traffic volume. Even though closely spaced parallel approaches increase throughput into a given airport, controller workload in oversubscribed metroplexes is further taxed by these approaches that require stringent monitoring in a saturated environment. The interval management (IM) concept in the TRACON area is designed to shift some of the operational burden from the control tower to the flight deck, placing the flight crew in charge of implementing the required speed changes to maintain a relative spacing interval. The interval management tolerance is a measure of the allowable deviation from the desired spacing interval for the IM aircraft (and its target aircraft). For this complex task, Formal Methods can help to ensure better design and system implementation. In this paper, we propose a probabilistic framework to quantify the uncertainty and performance associated with the major components of the IM tolerance. The analytical basis for this framework may be used to formalize both correctness and probabilistic system safety claims in a modular fashion at the algorithmic level in a way compatible with several Formal Methods tools.

  9. Demand Response Advanced Controls Framework and Assessment of Enabling Technology Costs

    Energy Technology Data Exchange (ETDEWEB)

    Potter, Jennifer; Cappers, Peter

    2017-08-28

    The Demand Response Advanced Controls Framework and Assessment of Enabling Technology Costs research describe a variety of DR opportunities and the various bulk power system services they can provide. The bulk power system services are mapped to a generalized taxonomy of DR “service types”, which allows us to discuss DR opportunities and bulk power system services in fewer yet broader categories that share similar technological requirements which mainly drive DR enablement costs. The research presents a framework for the costs to automate DR and provides descriptions of the various elements that drive enablement costs. The report introduces the various DR enabling technologies and end-uses, identifies the various services that each can provide to the grid and provides the cost assessment for each enabling technology. In addition to a report, this research includes a Demand Response Advanced Controls Database and User Manual. They are intended to provide users with the data that underlies this research and instructions for how to use that database more effectively and efficiently.

  10. Man-Robot Symbiosis: A Framework For Cooperative Intelligence And Control

    Science.gov (United States)

    Parker, Lynne E.; Pin, Francois G.

    1988-10-01

    The man-robot symbiosis concept has the fundamental objective of bridging the gap between fully human-controlled and fully autonomous systems to achieve true man-robot cooperative control and intelligence. Such a system would allow improved speed, accuracy, and efficiency of task execution, while retaining the man in the loop for innovative reasoning and decision-making. The symbiont would have capabilities for supervised and unsupervised learning, allowing an increase of expertise in a wide task domain. This paper describes a robotic system architecture facilitating the symbiotic integration of teleoperative and automated modes of task execution. The architecture reflects a unique blend of many disciplines of artificial intelligence into a working system, including job or mission planning, dynamic task allocation, man-robot communication, automated monitoring, and machine learning. These disciplines are embodied in five major components of the symbiotic framework: the Job Planner, the Dynamic Task Allocator, the Presenter/Interpreter, the Automated Monitor, and the Learning System.

  11. An Integrated Software Testing Framework for FPGA-Based Controllers in Nuclear Power Plants

    Directory of Open Access Journals (Sweden)

    Jaeyeob Kim

    2016-04-01

    Full Text Available Field-programmable gate arrays (FPGAs have received much attention from the nuclear industry as an alternative platform to programmable logic controllers for digital instrumentation and control. The software aspect of FPGA development consists of several steps of synthesis and refinement, and also requires verification activities, such as simulations that are performed individually at each step. This study proposed an integrated software-testing framework for simulating all artifacts of the FPGA software development simultaneously and evaluating whether all artifacts work correctly using common oracle programs. This method also generates a massive number of meaningful simulation scenarios that reflect reactor shutdown logics. The experiment, which was performed on two FPGA software implementations, showed that it can dramatically save both time and costs.

  12. Parametric experiments on control rod heterogeneity in the framework of the Balzac program

    International Nuclear Information System (INIS)

    Kim, Y.C.; Palmiotti, G.; Salvatores, M.; Soule, R.

    1986-09-01

    The calculation of the so-called heterogeneity effect of control rod reactivity worth, is still to be considered one of the major source of uncertainty in assessing a power reactor control rod worth. The reason for the uncertainty is related both to the fact that at present no specific calculation tool can handle with sufficient precision this effect and that there is limited experimental validation of the approximate available methods. The present note will briefly recall the nature of the problem and its implications, in particular in the framework of the Super Phenix start-up experiments, and will indicate an experimental program on Masurca, aimed to a systematic study of the heterogeneity effect, in the frame of the Balzac program

  13. A Generic Framework for Systematic Design of Process Monitoring and Control System for Crystallization Processes

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli Bin; Meisler, Kresten Troelstrup; Sin, Gürkan

    Crystallization processes have a wide range of application as a solid-liquid separation technique in the chemical, the pharmaceutical and the food industries, due to the fact that high quality crystalline products can be produced. The main specifications of the crystal product are usually given...... in terms of crystal size, size distribution, shape and purity. However, the main difficulty in crystallization processes is to obtain a uniform and reproducible crystal size distribution (CSD). To this end, supersaturation control is often applied to drive the process within the metastable zone in order......, for control and monitoring purposes, an appropriate Process Analytical Technology (PAT) system ensuring that the critical process variables are measured and maintained within the design limits also needs to be integrated. The objectives of this work are to develop a generic systematic design framework...

  14. An integrated software testing framework for FGA-based controllers in nuclear power plants

    International Nuclear Information System (INIS)

    Kim, Jae Yeob; Kim, Eun Sub; Yoo, Jun Beom; Lee, Young Jun; Choi, Jong Gyun

    2016-01-01

    Field-programmable gate arrays (FPGAs) have received much attention from the nuclear industry as an alternative platform to programmable logic controllers for digital instrumentation and control. The software aspect of FPGA development consists of several steps of synthesis and refinement, and also requires verification activities, such as simulations that are performed individually at each step. This study proposed an integrated software-testing framework for simulating all artifacts of the FPGA software development simultaneously and evaluating whether all artifacts work correctly using common oracle programs. This method also generates a massive number of meaningful simulation scenarios that reflect reactor shutdown logics. The experiment, which was performed on two FPGA software implementations, showed that it can dramatically save both time and costs

  15. Bonsai: An event-based framework for processing and controlling data streams

    Directory of Open Access Journals (Sweden)

    Gonçalo eLopes

    2015-04-01

    Full Text Available The design of modern scientific experiments requires the control and monitoring of many different data streams. However, the serial execution of programming instructions in a computer makes it a challenge to develop software that can deal with the asynchronous, parallel nature of scientific data. Here we present Bonsai, a modular, high-performance, open-source visual programming framework for the acquisition and online processing of data streams. We describe Bonsai's core principles and architecture and demonstrate how it allows for the rapid and flexible prototyping of integrated experimental designs in neuroscience. We specifically highlight some applications that require the combination of many different hardware and software components, including video tracking of behavior, electrophysiology and closed-loop control of stimulation.

  16. Bonsai: an event-based framework for processing and controlling data streams.

    Science.gov (United States)

    Lopes, Gonçalo; Bonacchi, Niccolò; Frazão, João; Neto, Joana P; Atallah, Bassam V; Soares, Sofia; Moreira, Luís; Matias, Sara; Itskov, Pavel M; Correia, Patrícia A; Medina, Roberto E; Calcaterra, Lorenza; Dreosti, Elena; Paton, Joseph J; Kampff, Adam R

    2015-01-01

    The design of modern scientific experiments requires the control and monitoring of many different data streams. However, the serial execution of programming instructions in a computer makes it a challenge to develop software that can deal with the asynchronous, parallel nature of scientific data. Here we present Bonsai, a modular, high-performance, open-source visual programming framework for the acquisition and online processing of data streams. We describe Bonsai's core principles and architecture and demonstrate how it allows for the rapid and flexible prototyping of integrated experimental designs in neuroscience. We specifically highlight some applications that require the combination of many different hardware and software components, including video tracking of behavior, electrophysiology and closed-loop control of stimulation.

  17. DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military Installations (REDACTED)

    Science.gov (United States)

    2016-04-01

    DEPARTMENT OF THE ARMY SUBJECT: DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military...public tenants who leased DoD privatized housing before granting those tenants unescorted access to military installations. In addition, DoD officials...issued access badges to general public tenants with expiration dates that exceeded the tenants’ lease terms. As a result, DoD assumed a higher and

  18. A fine-tuned Metal-Organic Framework for Autonomous Indoor Moisture Control .

    KAUST Repository

    Abdul Halim, Racha Ghassan

    2017-06-29

    Conventional adsorbents, namely zeolites and silica gel, are often used to control humidity by adsorbing water; however, adsorbents capable of dual functionality of humidification and dehumidification, offering the desired control of the moisture level at room temperature, has yet to be explored. Here we report Y-shp-MOF-5, a hybrid microporous highly-connected Rare-Earth based metal-organic framework (MOF), with dual functionality for moisture control within the recommended range of relative humidity (45% to 65% RH) set by the American Society of Heating, Refrigerating, and Air-Conditioning Engineers (ASHRAE). Y-shp-MOF-5 exhibits exceptional structural integrity, robustness and unique humidity-control performance as confirmed by the large number (thousand) of conducted water vapor adsorption-desorption cycles. The retained structural integrity and the mechanism of water sorption were corroborated using in situ single crystal X-ray diffraction (SCXRD) studies. The resultant working water uptake of 0.45 g.g-1 is solely regulated by a simple adjustment of the relative humidity, positioning this hydrolytically stable MOF as a prospective adsorbent for humidity control in confined spaces such as space shuttles, aircraft cabins and air-conditioned buildings.

  19. A rule-based verification and control framework in ATLAS Trigger-DAQ

    CERN Document Server

    Kazarov, A; Lehmann-Miotto, G; Sloper, J E; Ryabov, Yu; Computing In High Energy and Nuclear Physics

    2007-01-01

    In order to meet the requirements of ATLAS data taking, the ATLAS Trigger-DAQ system is composed of O(1000) of applications running on more than 2600 computers in a network. With such system size, s/w and h/w failures are quite often. To minimize system downtime, the Trigger-DAQ control system shall include advanced verification and diagnostics facilities. The operator should use tests and expertise of the TDAQ and detectors developers in order to diagnose and recover from errors, if possible automatically. The TDAQ control system is built as a distributed tree of controllers, where behavior of each controller is defined in a rule-based language allowing easy customization. The control system also includes verification framework which allow users to develop and configure tests for any component in the system with different levels of complexity. It can be used as a stand-alone test facility for a small detector installation, as part of the general TDAQ initialization procedure, and for diagnosing the problems ...

  20. A Real-Time Optimization Framework for the Iterative Controller Tuning Problem

    Directory of Open Access Journals (Sweden)

    Gene A. Bunin

    2013-09-01

    Full Text Available We investigate the general iterative controller tuning (ICT problem, where the task is to find a set of controller parameters that optimize some user-defined performance metric when the same control task is to be carried out repeatedly. Following a repeatability assumption on the system, we show that the ICT problem may be formulated as a real-time optimization (RTO problem, thus allowing for the ICT problem to be solved in the RTO framework, which is both very flexible and comes with strong theoretical guarantees. In particular, we propose the use of a recently released RTO solver and outline a simple procedure for how this solver may be configured to solve ICT problems. The effectiveness of the proposed method is illustrated by successfully applying it to four case studies—two experimental and two simulated—that cover the tuning of model-predictive, general fixed-order and PID controllers, as well as a system of controllers working in parallel.

  1. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  2. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  3. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  4. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey.

    Science.gov (United States)

    Zareei, Mahdi; Islam, A K M Muzahidul; Baharun, Sabariah; Vargas-Rosales, Cesar; Azpilicueta, Leyre; Mansoor, Nafees

    2017-09-16

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  5. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  6. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    Science.gov (United States)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  7. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...... such paradigm, the receiver is the one in charge of starting a direct communication with an eligible sender. This allows for new useful properties to be satisfied, novel schemes to be introduced and new challenges to be tackled. In this paper, we present a survey comprising of all the MAC protocols released...

  8. Automatic Access Control Based on Face and Hand Biometrics in A Non-Cooperative Context

    DEFF Research Database (Denmark)

    Jahromi, Mohammad Naser Sabet; Bonderup, Morten Bojesen; Nasrollahi, Kamal

    2018-01-01

    Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas. Yet these systems, in their conventional forms, are restricted to active interaction from the users. In scenarios where users are not cooperating with the system......, these systems are challenged. Failure in cooperation with the biometric systems might be intentional or because the users are incapable of handling the interaction procedure with the biometric system or simply forget to cooperate with it, due to for example, illness like dementia. This work introduces...

  9. Sub-Network Access Control Technology Demonstrator: Software Design of the Network Management System

    Science.gov (United States)

    2002-08-01

    dabut du projet pour le contr6le et la supervision de la performance de ces cartes ne permettaient pas d’en obtenir ais~ment une vue d’ensemble. Ceux...besoins sp~cifiques, la conception d’un outil de gestion de r~seaux informatiques est propos6e et sa mise en oeuvre entreprise dans un prototype. Les...Defence Research and Recherche et ddveloppement Development Canada pour la defense Canada DEFENCE • I7 DEFENSE Sub-Network Access Control

  10. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results...... suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient controlin WDM access networks....

  11. Socio-economic status influences blood pressure control despite equal access to care

    DEFF Research Database (Denmark)

    Paulsen, M S; Andersen, M; Munck, A P

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...... practice. METHODS: We enrolled 184 general practices and 5260 hypertensive patients. The general practitioners reported information about BP and diagnosis of diabetes. Information about education, income, antihypertensive drug treatment and other co-morbidity was retrieved from relevant registers from...

  12. Access road reclamation

    International Nuclear Information System (INIS)

    Manson, T.; Blok, M.

    1997-01-01

    A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs

  13. A Flexible Component based Access Control Architecture for OPeNDAP Services

    Science.gov (United States)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  14. General and simple approach for control cage and cylindrical mesopores, and thermal/hydrothermal stable frameworks.

    Science.gov (United States)

    El-Safty, Sherif A; Mizukami, Fujio; Hanaoka, Takaaki

    2005-05-19

    Highly ordered cage and cylindrical mesoporeous silica monoliths (HOM) with 2- and 3-dimensional (2D and 3D, respectively) structures, mesopore/micropore volumes, and thick-walled frameworks were successfully fabricated by instant direct templating of lyotropic phases of copolymer (EO(m)-PO(n)-EO(m)) surfactants. Large cage-like pores with uniform constriction sizes up to 10 nm and open cylindrical channel-like mesopores can be easily achieved by this simple and efficient synthesis design. Our results show that the cage-like pores could be fabricated at relatively lower copolymer concentrations used in the lyotropic phase domains at copolymer/TMOS ratios of 35 wt %. These ordered cage pore architectures underwent transition to open-cylindrical pores by increasing the copolymer concentration. High EO/PO block copolymers, in general, were crucially affected on the increase of the interior cavity sizes and on the stability of the cage mesopore characters. However, for F108 (EO(141)PO(44)EO(141)) systems, the fabrication of ordered and stable cage pore monoliths was achieved with significantly higher copolymer concentrations up to 90 wt %. Interestingly, the effective copolymer molecular nature was also observed in the ability to design various ordered mesophase geometries in large domain sizes. Our findings here show evidence that the synthetic strategy provides realistic control over a wide range of mesostructured phase geometries and their extended long-range ordering in the final replicas of the silica monolith frameworks. In addition, the HOM silica monoliths exhibited considerable structural stability against higher thermal temperature (up to 1000 degrees C) and longer hydrothermal treatment times under boiling water and steam. The remarkable structural findings of 3D frameworks, transparent monoliths, and micropores combined with large cage- and cylindrical-like mesopores are expected to find promising uses in materials chemistry.

  15. Hierarchical modeling of systems with similar components: A framework for adaptive monitoring and control

    International Nuclear Information System (INIS)

    Memarzadeh, Milad; Pozzi, Matteo; Kolter, J. Zico

    2016-01-01

    System management includes the selection of maintenance actions depending on the available observations: when a system is made up by components known to be similar, data collected on one is also relevant for the management of others. This is typically the case of wind farms, which are made up by similar turbines. Optimal management of wind farms is an important task due to high cost of turbines' operation and maintenance: in this context, we recently proposed a method for planning and learning at system-level, called PLUS, built upon the Partially Observable Markov Decision Process (POMDP) framework, which treats transition and emission probabilities as random variables, and is therefore suitable for including model uncertainty. PLUS models the components as independent or identical. In this paper, we extend that formulation, allowing for a weaker similarity among components. The proposed approach, called Multiple Uncertain POMDP (MU-POMDP), models the components as POMDPs, and assumes the corresponding parameters as dependent random variables. Through this framework, we can calibrate specific degradation and emission models for each component while, at the same time, process observations at system-level. We compare the performance of the proposed MU-POMDP with PLUS, and discuss its potential and computational complexity. - Highlights: • A computational framework is proposed for adaptive monitoring and control. • It adopts a scheme based on Markov Chain Monte Carlo for inference and learning. • Hierarchical Bayesian modeling is used to allow a system-level flow of information. • Results show potential of significant savings in management of wind farms.

  16. A Flexible framework for forward and inverse modeling of stormwater control measures

    Science.gov (United States)

    Aflaki, S.; Massoudieh, A.

    2016-12-01

    Models that allow for design considerations of green infrastructure (GI) practices to control stormwater runoff and associated contaminants have received considerable attention in recent years. While popular, generally, the GI models are relatively simplistic. However, GI model predictions are being relied upon by many municipalities and State/Local agencies to make decisions about grey vs. green infrastructure improvement planning. Adding complexity to GI modeling frameworks may preclude their use in simpler urban planning situations. Therefore, the goal here was to develop a sophisticated, yet flexible tool that could be used by design engineers and researchers to capture and explore the effect of design factors and properties of the media used in the performance of GI systems at a relatively small scale. We deemed it essential to have a flexible GI modeling tool that is capable of simulating GI system components and specific biophysical processes affecting contaminants such as reactions, and particle-associated transport accurately while maintaining a high degree of flexibly to account for the myriad of GI alternatives. The mathematical framework for a stand-alone GI performance assessment tool has been developed and will be demonstrated. The process-based model framework developed here can be used to model a diverse range of GI practices such as green roof, retention pond, bioretention, infiltration trench, permeable pavement and other custom-designed combinatory systems. Four demonstration applications covering a diverse range of systems will be presented. The example applications include a evaluating hydraulic performance of a complex bioretention system, hydraulic analysis of porous pavement system, flow colloid-facilitated transport, reactive transport and groundwater recharge underneath an infiltration pond and finally reactive transport and bed-sediment interactions in a wetland system will be presented.

  17. Increasing access to care for sick newborns: evidence from the Ghana Newhints cluster-randomised controlled trial

    NARCIS (Netherlands)

    Manu, Alexander; Hill, Zelee; ten Asbroek, Augustinus Ha; Soremekun, Seyi; Weobong, Benedict; Gyan, Thomas; Tawiah-Agyemang, Charlotte; Danso, Samuel; Amenga-Etego, Seeba; Owusu-Agyei, Seth; Kirkwood, Betty R.

    2016-01-01

    To evaluate the impact of Newhints community-based surveillance volunteer (CBSV) assessments and referrals on access to care for sick newborns and on existing inequities in access. We evaluated a prospective cohort nested within the Newhints cluster-randomised controlled trial. Community-based

  18. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  19. The Framework Convention on Tobacco Control: opportunities and issues El Convenio Marco para el Control del Tabaco: oportunidades y problemas

    Directory of Open Access Journals (Sweden)

    Kenneth E Warner

    2008-01-01

    Full Text Available The Framework Convention on Tobacco Control (FCTC, a World Health Organization sponsored global tobacco control treaty, constitutes the first major international tool with the potential to significantly reduce the global pandemic of tobacco-produced disease and death. After providing background on the prevalence of cigarette smoking and smoking attributable mortality, both at present and projected for the future, the paper then describes the FCTC and discusses its development, the barriers it has confronted, and the opportunities it offers for improving global health. Successful implementation of the provisions in the treaty could avoid literally tens of millions of premature tobacco-produced deaths over the next few decades.El Convenio Marco para el Control del Tabaco (CMCT, un tratado para el control global del tabaco patrocinado por la Organización Mundial de la Salud, constituye la primera herramienta internacional importante con el potencial de reducir significativamente la pandemia mundial de enfermedades y decesos producidos por el tabaco. Este ensayo proporciona antecedentes sobre la prevalencia de consumo de cigarrillos y sobre mortalidad atribuible a dicho consumo, tanto al presente como con proyección a futuro. Después describe el CMCT, su desarrollo, las barreras que ha confrontado y las oportunidades que ofrece para mejorar la salud global. La implementación exitosa de las disposiciones del tratado podría evitar, literalmente, decenas de millones de muertes prematuras producidas por el tabaco en las próximas décadas.

  20. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was