WorldWideScience

Sample records for access denial systems

  1. 41 CFR 51-9.303-4 - Denials of access.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Denials of access. 51-9...-Individual Access to Records § 51-9.303-4 Denials of access. (a) The Executive Director may deny any individual access to his record only on the grounds that the Committee has published rules in the...

  2. 4 CFR 83.14 - Denial of access requests.

    Science.gov (United States)

    2010-01-01

    ... review of a denial of access within 10 working days after receipt of the request. If it is not possible to reach a decision within an additional 10 working days, the requester shall be informed of the approximate date (within 30 working days) when such a decision may be expected. (d) In reaching a...

  3. 24 CFR 16.6 - Initial denial of access.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Initial denial of access. 16.6 Section 16.6 Housing and Urban Development Office of the Secretary, Department of Housing and Urban... consideration, including the identity and address of the appropriate Privacy Appeals Officer. If no...

  4. Operational Reconnaissance for the Anti-Access /Area Denial environment

    Science.gov (United States)

    2015-04-01

    computational power equivalent to two supercomputers.20 This impressive analytical capacity gives the pilot a coherent, real -time understanding of...performing Operational Reconnaissance in Anti-Access/Area Denial (A2/AD) environments. Contested battlespace is radically different from the permissive...AD environment. After gaining access to this airspace, fighters can use a variety of sensors to provide commanders with a real -time understanding of

  5. 22 CFR 214.51 - Administrative review of denial for public access to records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Administrative review of denial for public access to records. 214.51 Section 214.51 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADVISORY COMMITTEE MANAGEMENT Administrative Remedies § 214.51 Administrative review of denial for public access to...

  6. Automated Image Intelligence Adaptive Sensor Management System for High Altitude Long Endurance UAVs in a Dynamic and Anti-Access Area Denial Environment

    Science.gov (United States)

    Kim, Gi Young

    The problem we investigate deals with an Image Intelligence (IMINT) sensor allocation schedule for High Altitude Long Endurance UAVs in a dynamic and Anti-Access Area Denial (A2AD) environment. The objective is to maximize the Situational Awareness (SA) of decision makers. The value of SA can be improved in two different ways. First, if a sensor allocated to an Areas of Interest (AOI) detects target activity, then the SA value will be increased. Second, the SA value increases if an AOI is monitored for a certain period of time, regardless of target detections. These values are functions of the sensor allocation time, sensor type and mode. Relatively few studies in the archival literature have been devoted to an analytic, detailed explanation of the target detection process, and AOI monitoring value dynamics. These two values are the fundamental criteria used to choose the most judicious sensor allocation schedule. This research presents mathematical expressions for target detection processes, and shows the monitoring value dynamics. Furthermore, the dynamics of target detection is the result of combined processes between belligerent behavior (target activity) and friendly behavior (sensor allocation). We investigate these combined processes and derive mathematical expressions for simplified cases. These closed form mathematical models can be used for Measures of Effectiveness (MOEs), i.e., target activity detection to evaluate sensor allocation schedules. We also verify these models with discrete event simulations which can also be used to describe more complex systems. We introduce several methodologies to achieve a judicious sensor allocation schedule focusing on the AOI monitoring value. The first methodology is a discrete time integer programming model which provides an optimal solution but is impractical for real world scenarios due to its computation time. Thus, it is necessary to trade off the quality of solution with computation time. The Myopic Greedy

  7. Understanding the Anti-Access and Area Denial Threat: An Army Perspective

    Science.gov (United States)

    2015-05-21

    use. Defeat is not defined in JP 1-02, the Joint Dictionary of Military and Associated Terms. 13Matthew E. Davin, Anti-Access/Area Denial: Time to...Robert and Michael D. Cohen. Harnessing Complexity: Organizational Implications of a Scientific Frontier. New York, NY: Basic Books. 2000...Massachusetts Institute of Technology Security Studies Program. 2010. Council on Foreign Relations. “Richard N. Haass: Biography .” Accessed November

  8. Networked control of nonlinear systems under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, C.; Tesi, P.

    2016-01-01

    We investigate the analysis and design of a control strategy for nonlinear systems under Denial-of-Service attacks. Based on an ISS-Lyapunov function analysis, we provide a characterization of the maximal percentage of time that feedback information can be lost without resulting in instability of th

  9. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    2014-01-01

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  10. Denial Logic

    CERN Document Server

    Lengyel, Florian

    2012-01-01

    We define Denial Logic DL, a system of justification logic that models an agent whose justified beliefs are false, who cannot avow his own propositional attitudes and who can believe contradictions but not tautologies of classical propositional logic. Using Artemov's natural semantics for justification logic JL, in which justifications are interpreted as sets of formulas, we provide an inductive construction of models of DL, and prove soundness and completeness results for DL. Some logical notions developed for JL, such as constant specifications and the internalization property, are inconsistent with DL. This leads us to define negative constant specifications for DL, which can be used to model agents with justified false beliefs. Denial logic can therefore be relevant to philosophical skepticism. We use DL with what we call coherent negative constant specifications to model a Putnamian brain in a vat with the justified false belief that it is not a brain in a vat, and derive a model of JL in which "I am a b...

  11. Detection of Denial of Service Attacks against Domain Name System Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Mohd Fadlee A. Rasid

    2009-11-01

    Full Text Available In this paper we introduce an intrusion detection system for Denial of Service (DoS attacks against Domain Name System (DNS. Our system architecture consists of two most important parts: a statistical preprocessor and a neural network classifier. The preprocessor extracts required statistical features in a short-time frame from traffic received by the target name server. We compared three different neural networks for detecting and classifying different types of DoS attacks. The proposed system is evaluated in a simulated network and showed that the best performed neural network is a feed-forward backpropagation with an accuracy of 99%.

  12. Airpower Projection in the Anti-Access/Area Denial Environment: Dispersed Operations

    Science.gov (United States)

    2015-02-01

    Force briefly employed small teams for the Ground Launched Cruise Missiles ( GLCM ) in Europe in the 1980s. These teams were comprised of the operations... GLCM – From Concept to Mission Complete,” 3. 38 Misiak to the author, email. 39Bowie, The Anti-Access Threat and Theater Air Bases, 53-56. 40 Schanz...202015/February %2020%202015/Places,-Bases,-and-Faces-in-the-Asia-Pacific.aspx (Accessed 21 February 2015). Simpson, Charlie. “ GLCM – From Concept

  13. Land Based Anti-Ship Missiles: A Complementary Capability for Maintaining Access in an Anti-Access/Area Denial Environment

    Science.gov (United States)

    2014-12-01

    Complete, ebscohost (accessed august 15, 2014). Chandrashekar, S., N. Genesh, C.R. Raghunath, Rajaram Nagappa, N. Ramani, and Lalitha Sundaresan...Corporation, 2013. Hailan, Ye. "Safe Seas." Beijing Review 52, no. 13 (April 2009): 10-11. Accessed on July 29, 2014 from EBSCOhost Hastings, Max and...History and Life with Full Text, EBSCOhost . Accessed July 10, 2014, http://people.reed.edu/~ahm/Courses/Reed-POL-359-2011- S3_WTW/Syllabus/EReadings/03.2

  14. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  15. ACCESS Pointing Control System

    Science.gov (United States)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  16. Towards Accessible Search Systems

    NARCIS (Netherlands)

    Serdyukov, Pavel; Hiemstra, Djoerd; Ruthven, Ian

    2010-01-01

    The SIGIR workshop Towards Accessible Search Systems was the first workshop in the field to raise the discussion on how to make search engines accessible for different types of users. We report on the results of the workshop that was held on 23 July 2010 in conjunction with the 33rd Annual ACM SIGIR

  17. 76 FR 51120 - Denial of Motor Vehicle Defect Petition

    Science.gov (United States)

    2011-08-17

    ... National Highway Traffic Safety Administration Denial of Motor Vehicle Defect Petition AGENCY: National Highway Traffic Safety Administration (NHTSA), Department of Transportation. ACTION: Denial of motor... System (FARS) tracks all fatal crashes involving motor vehicles in the United States. An analysis...

  18. Imprisoned and imperiled: access to HIV and TB prevention and treatment, and denial of human rights, in Zambian prisons

    Directory of Open Access Journals (Sweden)

    Todrys Katherine W

    2011-02-01

    Full Text Available Abstract Background Although HIV and tuberculosis (TB prevalence are high in prisons throughout sub-Saharan Africa, little research has been conducted on factors related to prevention, testing and treatment services. Methods To better understand the relationship between prison conditions, the criminal justice system, and HIV and TB in Zambian prisons, we conducted a mixed-method study, including: facility assessments and in-depth interviews with 246 prisoners and 30 prison officers at six Zambian prisons; a review of Zambian legislation and policy governing prisons and the criminal justice system; and 46 key informant interviews with government and non-governmental organization officials and representatives of international agencies and donors. Results The facility assessments, in-depth interviews and key informant interviews found serious barriers to HIV and TB prevention and treatment, and extended pre-trial detention that contributed to overcrowded conditions. Disparities both between prisons and among different categories of prisoners within prisons were noted, with juveniles, women, pre-trial detainees and immigration detainees significantly less likely to access health services. Conclusions Current conditions and the lack of available medical care in Zambia's prisons violate human rights protections and threaten prisoners' health. In order to protect the health of prisoners, prison-based health services, linkages to community-based health care, general prison conditions and failures of the criminal justice system that exacerbate overcrowding must be immediately improved. International donors should work with the Zambian government to support prison and justice system reform and ensure that their provision of funding in such areas as health services respect human rights standards, including non-discrimination. Human rights protections against torture and cruel, inhuman or degrading treatment, and criminal justice system rights, are

  19. 12 CFR 310.9 - Appeal of adverse initial agency determination on access or amendment.

    Science.gov (United States)

    2010-01-01

    ... determination on access or amendment. (a) A system manager's denial of an individual's request for access to or... (or designee) within 30 business days following receipt of notification of the denial. Such an appeal should be addressed to the FOIA/PA Group, Legal Division, FDIC, 550 17th Street NW., Washington, DC 20429...

  20. Environmental Denial

    Directory of Open Access Journals (Sweden)

    Tomaž Grušovnik

    2013-03-01

    Full Text Available Even though today reliable information about the negative impact of humans on the environment is only two clicks away, a considerable number of people still deny it. Why? Research shows that what we might call 'environmental denial' is a consequence of specific social and psychological factors: if we were to admit the negative impact of our lifestyles on the environment, we would have to change our way of life founded on consumerism. However, consumerism is not simply a way of exchanging goods; it is also something around which we organize the meaning of our lives, as consumer research clearly shows. Therefore we deny the information on the negattive impact of human activity on the environment because admitting it would lead to a conflict between cognition (attitudes, beliefs and actions (behaviour around which we organize the meaning of our lives. Such an exposition points to wider sociopolitical effects. Firstly, it raises questions about education that have to take into account the non-rational nature of human beings, and secondly it raises questions about the directions and possible outcomes of social action.

  1. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  2. Denial: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  3. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  4. 伪造接入点技术的智能手机拒绝服务攻防策略%Strategy of Denial of Service Attack and Defense to Smart Phones of Faked Access Point

    Institute of Scientific and Technical Information of China (English)

    杨雄; 朱宇光

    2013-01-01

    With the popularization of smart phone,the denial of service attack regard to this platform has been an important research direc-tion in wireless security field. With the disadvantage on security mechanism of Android mobile phones,respectively introduce the strategy on denial of service attack and defense for the platform from two different perspectives. The denial of service with faked WiFi access point is introduced and dual channel authentication model against such attacks are proposed. The executed experiments indicate that it is effec-tive for setting up a faked WiFi access point can simply prompt attack of smartphone with denial of service,the dual channel authentica-tion model can prove the validation for WiFi access point.%随着智能手机的普及化,面向该平台的拒绝服务攻击已经成为了无线安全研究领域的一个重要研究方向。针对目前智能Android手机网络安全防护措施研究的不足,从攻击与防御两个不同角度阐述了针对该平台的拒绝服务攻击方案和防御策略。引入了伪造无线WiFi接入点技术的拒绝服务攻击方案,并且提出了应对该攻击方案的双通道验证防御模型。实验结果表明,虚假的WiFi接入点技术可轻易地对智能手机发起有效的拒绝服务攻击,同时双通道验证模型可高效验证无线接入点的网络连通性。

  5. Remotely Accessible Management System (RAMS).

    Science.gov (United States)

    Wood, Rex

    Oakland Schools, an Intermediate School District for Administration, operates a Remotely Accessible Management System (RAMS). RAMS is composed of over 100 computer programs, each of which performs procedures on the files of the 28 local school districts comprising the constituency of Oakland Schools. This regional service agency covers 900 square…

  6. Limited Denial of Participation

    Data.gov (United States)

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  7. Science denial and contradictions

    Science.gov (United States)

    Eldridge, Tom; Mackey, Jonathan

    2016-11-01

    In reply to Robert P Crease's column "Fighting science denial" (Critical Point, September) in which he compared the concealment of evidence about climate change to shouting "Stay put!" in a burning store.

  8. Radio access selection in multi-radio access systems

    NARCIS (Netherlands)

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  9. Implementation of Flexible Access System

    Science.gov (United States)

    Wu, Chen-Hsiang; Peng, Jan-Wen; Shao, Shou-Kuo; Chen, Tzooming E.; Chen, Shih Chang; Lee, Meng-Shu; Yen, K.-Y.; Chen, Tsung-Mao; Wang, Ching Sheu; Tu, Yuan-Kuang

    1998-06-01

    In this paper we present the architecture, operation, and the implementation of a prototype system, flexible access system (FAS), developed by CHT T.L. for FITL applications. FAS adopts fiber to the curb (FTTC) topology and provides POTS, ISDN BRA, and T1 services. The system consists of three main parts, namely, fiber central office terminal (FCOT) at switch side, fiber nodes (FN) at customer side, and a monitor station. FCOT and FNs are connected through an STM-1 fiber distribution ring. The hardware structure and the operation principle for each module are described. FAS contains the mux-demux module, POTS, ISDN, and T1 central office/customer service modules, operation modules, and power module. In the design, each central office service module in FCOT simulates as a CPE to terminate signals from switch, and will separate the data and signaling and map them into DS1 format. Mux/demux module will add/drop these DS1, put the operation information in data communication channel (DCC), and convert them to STM-1 optical link. Each customer service module in FN simulates switch line cart to regenerate the signal for customers. The prototype system implementation confirms the benefits of introducing SDH add/drop technologies to FITL system to provide basic telecommunication services. The design experience reveals that the clock synchronization method and noise reduction technique can significantly influence the performance in such a system. The test results that demonstrate and verify the designed functionality and the service quality of the prototype system will be presented.

  10. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  11. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  12. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  13. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  14. Resilient Control under Denial-Of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2014-01-01

    We investigate resilient control strategies for linear systems under Denial-of-Service (DoS) attacks. By DoS attacks we mean interruptions of communication on measurement (sensor-to-controller) and control (controller-to-actuator) channels carried out by an intelligent adversary. We characterize the

  15. 47 CFR 1.1403 - Duty to provide access; modifications; notice of removal, increase or modification; petition for...

    Science.gov (United States)

    2010-10-01

    ... and information relate to a denial of access for reasons of lack of capacity, safety, reliability or... a cable television system or any telecommunications carrier with nondiscriminatory access to any... utility may deny a cable television system or any telecommunications carrier access to its poles,...

  16. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  17. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  18. 17 CFR 240.19d-3 - Applications for review of final disciplinary sanctions, denials of membership, participation or...

    Science.gov (United States)

    2010-04-01

    ... limitations of access to services imposed by self-regulatory organizations. 240.19d-3 Section 240.19d-3... sanctions, denials of membership, participation or association, or prohibitions or limitations of access to... disciplinary sanction, denial or conditioning of membership, participation, bar from association,...

  19. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  20. Democracy and the Twin Challenges of Climate Denial

    Science.gov (United States)

    Norgaard, K. M.

    2012-12-01

    Climate change poses major challenges to the operation of "modern" political, economic and social systems, making visible assumptions and raising questions about how scientific information can and should operate in a modern globalized democracy. Alongside the serious threat to democracy posed by the phenomenon of "literal denial" (the e.g. so called skeptic challenges of scientific information for political reasons) is "implicatory denial" or the more pervasive and everyday problem of how and why people who believe climate change is occurring nevertheless manage to ignore it. Instead, disturbing information about climate change is normalized through a variety of everyday social practices from changing the subject, controlling exposure to information or the use of humor. The blatant and more readily identifiable processes of literal denial can work together with the less visible (and to date less studied) process of implicatory denial to hamper public response to climate change.

  1. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  2. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  3. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  4. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Directory of Open Access Journals (Sweden)

    João José Costa Gondim

    2016-11-01

    Full Text Available Concerns about security on Internet of Things (IoT cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests. After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  5. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  6. Rebalancing to the Asia-Pacific Region, and Challenges of Anti-Access/Area Denial & the Air-Sea Battle Strategy

    Science.gov (United States)

    2013-04-05

    have made great strides in developing “kinetic and non-kinetic anti-satellite ( ASAT ) weapons, space launch and space surveillance infrastructure...of Intelligence testified to Congress that the Chinese would have substantial ASAT capabilities by 2015. A year after his testimony, he revised the...had arrived on the scene as a serious space competitor.19 The PLA has also developed ground-based ASAT laser systems. In the near future China can

  7. Nihilism: a benign denial.

    Science.gov (United States)

    Skandalakis, John E; Mirilas, Petros

    2003-06-01

    Nihilism is the belief that all possible knowledge on a given topic has been amassed and codified. Ranging from benign denial to deliberate attempts at excommunication, nihilism is often encountered in the history of medicine. Eustachius, Columbus, and Sylvius strongly criticized Vesalius and defended the authority of Galen. Riolan fervently rejected Harvey's monumental work on the circulation of blood. Gross stated that no honest and sensible surgeon would ever sanction thyroidectomy. Sandstrom's discovery of the parathyroids was met with silence. Transplantation of parathyroids by Mandl was not appreciated when announced. Aristotle's dictum that the heart cannot withstand serious injury led to Paget's statement that cardiac surgery had reached the limits set by nature, which no new techniques could overcome. The first Billroth I operation was welcomed as, "Hopefully, also the last." Pancreatic surgery was opposed because the organ was of no clinical interest and was impossible for surgeons to reach. Pancreatic transplantation was rejected for many years, despite good results. When Blundell used blood transfusion for postpartum hemorrhage, critics averred that his next exploit would be radical removal of the spleen. Bassini stated that it could be risky to publish more about radical treatment of inguinal hernias. Carcinomas of the lower sigmoid and upper rectum were deemed untreatable because of their inaccessibility. Colostomy during pediatric surgery was rejected many times. Although it is difficult for the human mind to move from a familiar point of view, this propensity should not infect science, thereby impeding advancement.

  8. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  9. Global Warming Denial: The Human Brain on Extremes

    Science.gov (United States)

    Marrouch, N.; Johnson, B. T.; Slawinska, J. M.

    2016-12-01

    Future assessments of climate change rely on multi-model intercomparisons, and projections of the extreme events frequency are of particular interest as associated with significant economic costs and social threats. Notably, systematically simulated increases in the number of extreme weather events agree well with observational data over the last decade. At the same time, as the climate grows more volatile, widespread denial of climate change and its anthropocentric causes continues to proliferate (based on nationally representative U.S. polls). Simultaneous increases in both high-impact exposure and its denial is in stark contrast with our knowledge of socio-natural dynamics and its models. Disentangling this paradox requires an understanding of the origins of global warming denial at an individual level, and how subsequently it propagates across social networks of many scales, shaping global policies. However, as the real world and its dynamical models are complex (high-dimensional and coupled), separating the particular feedback of interest remains a challenge. Here, we demonstrate this feedback in a controlled experiment, where increasing unpredictability using helplessness-training paradigms induces changes in global warming denial, and the endorsement of conservative ideology. We explain these results in the context of evolutionary theory framing self-deception and denial as remnants of evolutionary processes that shaped and facilitated the survival of the human species. Further we link these findings to changes in neural and higher-level cognitive processes in response to unpredictable stimuli. We argue that climate change denial is an example of an extreme belief system that carries the potential to threaten the wellbeing of both humans and other species alike. It is therefore crucial to better quantify climate denial using social informatics tools that provide the means to improve its representations in coupled socio-geophysical models to mitigate its

  10. Defending Science Denial in Cyberspace

    Science.gov (United States)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  11. Denial of abortion in legal settings.

    Science.gov (United States)

    Gerdts, Caitlin; DePiñeres, Teresa; Hajri, Selma; Harries, Jane; Hossain, Altaf; Puri, Mahesh; Vohra, Divya; Foster, Diana Greene

    2015-07-01

    Factors such as poverty, stigma, lack of knowledge about the legal status of abortion, and geographical distance from a provider may prevent women from accessing safe abortion services, even where abortion is legal. Data on the consequences of abortion denial outside of the US, however, are scarce. In this article we present data from studies among women seeking legal abortion services in four countries (Colombia, Nepal, South Africa and Tunisia) to assess sociodemographic characteristics of legal abortion seekers, as well as the frequency and reasons that women are denied abortion care. The proportion of women denied abortion services and the reasons for which they were denied varied widely by country. In Colombia, 2% of women surveyed did not receive the abortions they were seeking; in South Africa, 45% of women did not receive abortions on the day they were seeking abortion services. In both Tunisia and Nepal, 26% of women were denied their wanted abortions. The denial of legal abortion services may have serious consequences for women's health and wellbeing. Additional evidence on the risk factors for presenting later in pregnancy, predictors of seeking unsafe illegal abortion, and the health consequences of illegal abortion and childbirth after an unwanted pregnancy is needed. Such data would assist the development of programmes and policies aimed at increasing access to and utilisation of safe abortion services where abortion is legal, and harm reduction models for women who are unable to access legal abortion services. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. Science information systems: Archive, access, and retrieval

    Science.gov (United States)

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  13. Decentralized energy systems for clean electricity access

    Science.gov (United States)

    Alstone, Peter; Gershenson, Dimitry; Kammen, Daniel M.

    2015-04-01

    Innovative approaches are needed to address the needs of the 1.3 billion people lacking electricity, while simultaneously transitioning to a decarbonized energy system. With particular focus on the energy needs of the underserved, we present an analytic and conceptual framework that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. A historical analysis shows that the present day is a unique moment in the history of electrification where decentralized energy networks are rapidly spreading, based on super-efficient end-use appliances and low-cost photovoltaics. We document how this evolution is supported by critical and widely available information technologies, particularly mobile phones and virtual financial services. These disruptive technology systems can rapidly increase access to basic electricity services and directly inform the emerging Sustainable Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, inclusive energy systems.

  14. Denial of women's rights to contraception in southeastern Nigeria.

    Science.gov (United States)

    Chigbu, Chibuike O; Onyebuchi, Azubuike K; Onwudiwe, Elijah N; Iwuji, Stella E

    2013-05-01

    To evaluate the opinions and experiences of married women in southeastern Nigeria regarding their rights to contraception, in addition to the impact of the denial of women's contraceptive rights on unplanned pregnancy rate. A cross-sectional survey of women who registered for prenatal care at 2 federal tertiary healthcare facilities in southeastern Nigeria was conducted. Randomly selected samples of participants were interviewed via a structured, pretested questionnaire. In total, 1204 women participated in the survey. Overall, 526 (43.7%) were unaware of their rights to contraception. Denial of contraceptive rights was reported by 522 (43.4%) women. In total, 174/317 (54.9%) women with unplanned pregnancies blamed denial of access to contraception for their pregnancies. Among the women who had used contraception previously, 61.9% reported that the decision to do so was taken by their spouse. Formal education seemed to increase women's level of awareness of their rights to contraception (P=0.001) but it did not influence the exercising of such rights. A considerable proportion of women in southeastern Nigeria are being denied their rights to contraception, mainly owing to a culture of male dominance. There may be significant health implications for women with unplanned pregnancies arising from such denials. Copyright © 2013 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  15. Digital Autonomous Terminal Access Communication (DATAC) system

    Science.gov (United States)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  16. Resilient control under Denial-of-Service: Robust design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not dest

  17. Resilient Control under Denial-of-Service:Robust Design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not dest

  18. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  19. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  20. Denial Denied: Freedom of Speech

    Directory of Open Access Journals (Sweden)

    Glen Newey

    2009-12-01

    Full Text Available Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a proposition, or to a mode of expression. Underlying free speech is the principle of freedom of association, according to which speech is both a precondition of future association (e.g. as a medium for negotiation and a mode of association in its own right. I conclude by applying this account briefly to two contentious issues: hate speech and pornography.

  1. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  2. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Adrien Bonguet

    2017-08-01

    Full Text Available Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services. Denial-of-Service (DoS and Distributed Denial-of-Service (DDoS attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain.

  3. A Digitally Addressable Random-Access Image Selector and Random-Access Audio System.

    Science.gov (United States)

    Bitzer, Donald L.; And Others

    The requirements of PLATO IV, a computer based education system at the University of Illinois, have led to the development of an improved, digitally addressable, random access image selector and a digitally addressable, random access audio device. Both devices utilize pneumatically controlled mechanical binary adders to position the mecahnical…

  4. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  5. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  6. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  7. Science denial as a form of pseudoscience.

    Science.gov (United States)

    Hansson, Sven Ove

    2017-06-01

    Science denialism poses a serious threat to human health and the long-term sustainability of human civilization. Although it has recently been rather extensively discussed, this discussion has rarely been connected to the extensive literature on pseudoscience and the science-pseudoscience demarcation. This contribution argues that science denialism should be seen as one of the two major forms of pseudoscience, alongside of pseudotheory promotion. A detailed comparison is made between three prominent forms of science denialism, namely relativity theory denialism, evolution denialism, and climate science denialism. Several characteristics are identified that distinguish science denialism from other forms of pseudoscience, in particular its persistent fabrication of fake controversies, the extraordinary male dominance among its activists, and its strong connection with various forms of right-wing politics. It is argued that the scientific response to science denialism has to be conceived with these characteristics in mind. In particular, it is important to expose the fabricated fake controversies for what they are and to reveal how science denialists consistently use deviant criteria of assent to distort the scientific process. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Paradox of Denials in All My Sons

    Institute of Scientific and Technical Information of China (English)

    雷慧慧

    2014-01-01

    Arthur Miller, who was one of the greatest American playwrights of the 20th century. In All My Sons, different sorts of denials lead to the family’s collapse and Keller’s death. Paradoxically, the very denial that is designed to protect him from prose-cution and incarceration is followed by a chain of events that lead to Keller’s own self-imprisonment and self-imposed execu-tion. Denial also exists in the history of some countries, such as Germany, Japan and America and so on. My paper aims to ex-plore the paradox of denial both in our history and in literature works. My paper will demonstrate that denial has some negative effects both on the outer-world and the inner-world through thorough analysis on the characters in All My Sons.

  9. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  10. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  11. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  12. Ultrasound-fluoroscopy guided access to the intrarenal excretory system.

    Science.gov (United States)

    Montanari, E; Serrago, M; Esposito, N; Rocco, B; Kartalas-Goumas, I; Del Nero, A; Zanetti, G; Trinchieri, A; Pisani, E

    1999-01-01

    The access to the collecting system can be performed under fluoroscopy computerized tomography, ultrasonographic, mixed ultrasonographic and fluoroscopic guidance. In this paper the creation of a percutaneous transparenchymal ultrasound-fluoroscopy guided access to the intrarenal collecting system completely performed by urologist for different purposes is presented. In five years 297 patients underwent 330 percutaneous kidney accesses to perform derivative nephrostomies (217 pts), percutaneous nephrolithotomies (37 pts), antegrade ureteral manoeuvres (34 pts), antegrade endopyelotomies (7 pts), transitional cell carcinoma of the upper tract resection (2 pts). 11 patients out of these had a percutaneous kidney access in a transplanted kidney. The percutaneous access was successful in 98% of the attemps. A posterior calyx of the lower group (74%), of the medium group (25%) or of the upper group (1%) was accessed. In 73 accesses the mean target calyx diameter was 12.8 mm (range 5-45 mm), the mean operative time 5.4 minutes and the mean fluoroscopy time 5.1 seconds. In 84.5% of the patients the access was performed under local anesthesia when a dilation of the tract was not required. Gross haematuria was observed in 3.9% of the accesses and an arterial lesion treated by embolization in 0.9% of the accesses. Blood transfusion was required in 0.3% of the patients. The ultrasound-fluoroscopy guided access is at least as precise as the fluoroscopy guided one moreover it makes the procedure less invasive and it makes more precise the surgical planning.

  13. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  14. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Science.gov (United States)

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  15. Denial of shipments - myth or reality

    Energy Technology Data Exchange (ETDEWEB)

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  16. Rumor spreading models with random denials

    Science.gov (United States)

    Giorno, Virginia; Spina, Serena

    2016-11-01

    The concept of denial is introduced on rumor spreading processes. The denials occur with a certain rate and they reset to start the initial situation. A population of N individuals is subdivided into ignorants, spreaders and stiflers; at the initial time there is only one spreader and the rest of the population is ignorant. The denials are introduced in the classic DK model and in its generalization, in which a spreader can transmit the rumor at most to k ignorants. The steady state densities are analyzed for these models. Finally, a numerical analysis is performed to study the rule of the involved parameters and to compare the proposed models.

  17. ACCESS: Design and Sub-System Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; McCandliss, Stephan R.; Rasucher, Bernard J.; Kimble, Randy A.; Kruk, Jeffrey W.; Pelton, Russell; Mott, D. Brent; Wen, Hiting; Foltz, Roger; Quijada, Manuel A.; Gum, Jeffery S.; Gardner, Jonathan P.; Kahle, Duncan M.; Benford, Dominic J.; Woodgate, Bruce E.; Wright, Edward L.; Feldman, Paul D.; Hart, Murdock; Moos, H. Warren; Reiss, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, W. V.; Sahnow, David J.

    2012-01-01

    Establishing improved spectrophotometric standards is important for a broad range of missions and is relevant to many astrophysical problems. ACCESS, "Absolute Color Calibration Experiment for Standard Stars", is a series of rocket-borne sub-orbital missions and ground-based experiments designed to enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 -1.7 micrometer bandpass.

  18. Health system weaknesses constrain access to PMTCT and maternal HIV services in South Africa: a qualitative enquiry

    Directory of Open Access Journals (Sweden)

    Chersich Matthew F

    2011-03-01

    Full Text Available Abstract Background HIV remains responsible for an estimated 40% of mortality in South African pregnant women and their children. To address these avoidable deaths, eligibility criteria for antiretroviral therapy (ART in pregnant women were revised in 2010 to enhance ART coverage. With greater availability of HIV services in public health settings and increasing government attention to poor maternal-child health outcomes, this study used the patient's journey through the continuum of maternal and child care as a framework to track and document women's experiences of accessing ART and prevention of mother-to-child HIV transmission (PMTCT programmes in the Eastern Cape (three peri-urban facilities and Gauteng provinces (one academic hospital. Results In-depth interviews identified considerable weaknesses within operational HIV service delivery. These manifested as missed opportunities for HIV testing in antenatal care due to shortages of test kits; insufficient staff assigned to HIV services; late payment of lay counsellors, with consequent absenteeism; and delayed transcription of CD4 cell count results into patient files (required for ART initiation. By contrast, individual factors undermining access encompassed psychosocial concerns, such as fear of a positive test result or a partner's reaction; and stigma. Data and information systems for monitoring in the three peri-urban facilities were markedly inadequate. Conclusions A single system- or individual-level delay reduced the likelihood of women accessing ART or PMTCT interventions. These delays, when concurrent, often signalled wholesale denial of prevention and treatment. There is great scope for health systems' reforms to address constraints and weaknesses within PMTCT and ART services in South Africa. Recommendations from this study include: ensuring autonomy over resources at lower levels; linking performance management to facility-wide human resources interventions; developing

  19. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  20. Scheduling Heterogeneous Wireless Systems for Efficient Spectrum Access

    Directory of Open Access Journals (Sweden)

    Liao Shenghui

    2010-01-01

    Full Text Available The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (radio frequency bands in the current state of wireless spectrum allocations. Spectrum access scheduling addresses challenges arising from spectrum sharing by interleaving the channel access among multiple wireless systems in a TDMA fashion. Different from cognitive radio approaches which are opportunistic and noncollaborative in general, spectrum access scheduling proactively structures and interleaves the channel access pattern of heterogeneous wireless systems, using collaborative designs by implementing a crucial architectural component—the base stations on software defined radios (SDRs. We discuss our system design choices for spectrum sharing from multiple perspectives and then present the mechanisms for spectrum sharing and coexistence of GPRS+WiMAX and GPRS+WiFi as use cases, respectively. Simulations were carried out to prove that spectrum access scheduling is an alternative, feasible, and promising approach to the spectrum scarcity problem.

  1. A secure network access system for mobile IPv6

    Science.gov (United States)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  2. Climate change denial, freedom of speech and global justice

    Directory of Open Access Journals (Sweden)

    Trygve Lavik

    2016-10-01

    Full Text Available In this paper I claim that there are moral reasons for making climate denialism illegal . First I define climate denialism, and then I discuss its impact on society and its reception in the media.  I build my philosophical arguments mainly on John Stuart Mill and Thomas M. Scanlon.  According to Mill’s utilitarian justification of free speech, even untrue opinions are valuable in society’s pursuit of more truth. Consequently one might think that Mill’s philosophy would justify climate denialists’ right to free speech.  A major section of the paper argues against that view. The main arguments are: Climate denialism is not beneficial because its main goal is to produce doubt, and not truth. Climate denialism is not sincerely meant, which is a necessary condition for Mill to accept utterances. Climate denialists bring harm, by blocking necessary action on climate change.  Primarily they harm future generations and people in developing countries. Hence the case can be made in terms of global justice: Would future generations and people in developing countries support my claim? I think so, or so I argue. My argument from global justice is built on Scanlon’s distinction between the interests of participants, the interests of audiences, and the interests of bystanders.  The climate denialists have participant interests ‘in being able to call something to the attention of a wide audience’. Audience interests consist in ‘having access to expressions that we wish to hear or read, and even in being exposed to some degree to expressions we have not chosen’. Future generations and people in poor countries are bystanders to the climate debate. If the debate postpones necessary actions, it is the bystanders who must pay the price. I argue that bystanders’ costs outweigh participants’ and audiences’ interests, and that this is an argument for a statutory ban on climate denialism.Article first published online: 21 DEC 2015 

  3. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  4. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial-of-service...... security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  5. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  6. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  7. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  8. Organizational crisis-denial strategy: the effect of denial on public framing

    NARCIS (Netherlands)

    van der Meer, T.G.L.A.

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames em

  9. Organizational crisis-denial strategy: the effect of denial on public framing

    NARCIS (Netherlands)

    van der Meer, T.G.L.A.

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames em

  10. 8 CFR 214.4 - Denial of certification, denial of recertification or withdrawal of SEVP certification.

    Science.gov (United States)

    2010-01-01

    ... HOMELAND SECURITY IMMIGRATION REGULATIONS NONIMMIGRANT CLASSES § 214.4 Denial of certification, denial of...(a)(15)(F)(i) and/or 101(a)(15)(M)(i) of the Immigration and Nationality Act, will be withdrawn on... consider the impact that such date will have upon SEVP, the school, and the school's nonimmigrant...

  11. Illness denial questionnaire for patients and caregivers

    Directory of Open Access Journals (Sweden)

    Rossi Ferrario S

    2017-03-01

    Full Text Available Silvia Rossi Ferrario,1 Ines Giorgi,2 Paola Baiardi,3 Laura Giuntoli,4 Gianluigi Balestroni,1 Paola Cerutti,1 Marina Manera,2 Paola Gabanelli,2 Valentina Solara,5 Roberta Fornara,6 Michela Luisetti,1 Pierangela Omarini,1 Giovanna Omarini,1 Giulio Vidotto4 1Psychology Unit, Istituti Clinici Scientifici Maugeri SpA SB, Veruno, NO, Italy; 2Psychology Unit, 3Scientific Direction, Istituti Clinici Scientifici Maugeri SpA SB, Pavia, Italy; 4Department of General Psychology, University of Padova, Padova, Italy; 5Department of Neurology, ALS Centre, “Maggiore della Carita`” University Hospital, Novara, Italy; 6Psychology Unit, SS Trinità Hospital, Borgomanero, NO, Italy Purpose: Interest in assessing denial is still present, despite the criticisms concerning its definition and measurement. We tried to develop a questionnaire (Illness Denial Questionnaire, IDQ assessing patients’ and caregivers’ denial in relation to their illness/disturbance. Patients and methods: After a preliminary study, a final version of 24 dichotomous items (true/false was selected. We hypothesized a theoretical model with three dimensions: denial of negative emotions, resistance to change, and conscious avoidance, the first two composing the actual Denial and the last representing an independent component of the illness denial behavior. The IDQ was administered to 400 subjects (219 patients and 181 caregivers together with the Anxiety–Depression Questionnaire – Reduced form (AD-R, in order to assess concurrent validity. Confirmatory factor analysis (CFA, internal consistency indices (Cronbach’s α and McDonald’s ω, and test–retest analysis were performed. Results: CFA and internal consistency indices (Cronbach’s α: 0.87–0.96 indicated a clear and meaningful three-factor structure of IDQ, for both patients and caregivers. Further analyses showed good concurrent validity, with Denial and its subscale negatively associated with anxiety and depression and

  12. Access to fertility services by transgender persons: an Ethics Committee opinion.

    Science.gov (United States)

    2015-11-01

    This statement explores the ethical considerations surrounding the provision of fertility services to transgender individuals and concludes that denial of access to fertility services is not justified.

  13. Einstein Critical-Slowing-Down is Siegel CyberWar Denial-of-Access Queuing/Pinning/ Jamming/Aikido Via Siegel DIGIT-Physics BEC ``Intersection''-BECOME-UNION Barabasi Network/GRAPH-Physics BEC: Strutt/Rayleigh-Siegel Percolation GLOBALITY-to-LOCALITY Phase-Transition Critical-Phenomenon

    Science.gov (United States)

    Buick, Otto; Falcon, Pat; Alexander, G.; Siegel, Edward Carl-Ludwig

    2013-03-01

    Einstein[Dover(03)] critical-slowing-down(CSD)[Pais, Subtle in The Lord; Life & Sci. of Albert Einstein(81)] is Siegel CyberWar denial-of-access(DOA) operations-research queuing theory/pinning/jamming/.../Read [Aikido, Aikibojitsu & Natural-Law(90)]/Aikido(!!!) phase-transition critical-phenomenon via Siegel DIGIT-Physics (Newcomb[Am.J.Math. 4,39(1881)]-{Planck[(1901)]-Einstein[(1905)])-Poincare[Calcul Probabilités(12)-p.313]-Weyl [Goett.Nachr.(14); Math.Ann.77,313 (16)]-{Bose[(24)-Einstein[(25)]-Fermi[(27)]-Dirac[(1927)]}-``Benford''[Proc.Am.Phil.Soc. 78,4,551 (38)]-Kac[Maths.Stat.-Reasoning(55)]-Raimi[Sci.Am. 221,109 (69)...]-Jech[preprint, PSU(95)]-Hill[Proc.AMS 123,3,887(95)]-Browne[NYT(8/98)]-Antonoff-Smith-Siegel[AMS Joint-Mtg.,S.-D.(02)] algebraic-inversion to yield ONLY BOSE-EINSTEIN QUANTUM-statistics (BEQS) with ZERO-digit Bose-Einstein CONDENSATION(BEC) ``INTERSECTION''-BECOME-UNION to Barabasi[PRL 876,5632(01); Rev.Mod.Phys.74,47(02)...] Network /Net/GRAPH(!!!)-physics BEC: Strutt/Rayleigh(1881)-Polya(21)-``Anderson''(58)-Siegel[J.Non-crystalline-Sol.40,453(80)

  14. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  15. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  16. Denial and immunity to change: it starts with the leader.

    Science.gov (United States)

    Kerfoot, Karlene M

    2009-01-01

    It is common for leaders to be confronted with resistance that makes forward progress impossible. The easiest action for the leader is to label the resistance as denial. Labeling behaviors that do not agree with expectations is one way leaders keep their immune system intact and fight off valuable feedback. The enlightened, well-developed leader is aware of her/his own immune system and can monitor the filtering system effectively. We have many opportunities to help organizations and leaders think through the roadmap that makes our immune systems switch off when new, helpful information is trying to enter.

  17. ISAIA: Interoperable Systems for Archival Information Access

    Science.gov (United States)

    Hanisch, Robert J.

    2002-01-01

    The ISAIA project was originally proposed in 1999 as a successor to the informal AstroBrowse project. AstroBrowse, which provided a data location service for astronomical archives and catalogs, was a first step toward data system integration and interoperability. The goals of ISAIA were ambitious: '...To develop an interdisciplinary data location and integration service for space science. Building upon existing data services and communications protocols, this service will allow users to transparently query hundreds or thousands of WWW-based resources (catalogs, data, computational resources, bibliographic references, etc.) from a single interface. The service will collect responses from various resources and integrate them in a seamless fashion for display and manipulation by the user.' Funding was approved only for a one-year pilot study, a decision that in retrospect was wise given the rapid changes in information technology in the past few years and the emergence of the Virtual Observatory initiatives in the US and worldwide. Indeed, the ISAIA pilot study was influential in shaping the science goals, system design, metadata standards, and technology choices for the virtual observatory. The ISAIA pilot project also helped to cement working relationships among the NASA data centers, US ground-based observatories, and international data centers. The ISAIA project was formed as a collaborative effort between thirteen institutions that provided data to astronomers, space physicists, and planetary scientists. Among the fruits we ultimately hoped would come from this project would be a central site on the Web that any space scientist could use to efficiently locate existing data relevant to a particular scientific question. Furthermore, we hoped that the needed technology would be general enough to allow smaller, more-focused community within space science could use the same technologies and standards to provide more specialized services. A major challenge to searching

  18. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  19. Assessment of Deafblind Access to Manual Language Systems (ADAMLS)

    Science.gov (United States)

    Blaha, Robbie; Carlson, Brad

    2007-01-01

    This document presents the Assessment of Deafblind Access to Manual Language Systems (ADAMLS), a resource for educational teams who are responsible for developing appropriate adaptations and strategies for children who are deafblind who are candidates for learning manual language systems. The assessment tool should be used for all children with a…

  20. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    White David

    2008-01-01

    Full Text Available Abstract A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel's synchrony hypothesis, or remotely along several of Esterel's execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel's facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs' utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot's controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse's floor layout into account, both of which are stored in a MySQL database.

  1. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel’s synchrony hypothesis, or remotely along several of Esterel’s execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel’s facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs’ utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot’s controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse’s floor layout into account, both of which are stored in a MySQL database.

  2. 32 CFR 1636.10 - Statement of reasons for denial.

    Science.gov (United States)

    2010-07-01

    ... CLASSIFICATION OF CONSCIENTIOUS OBJECTORS § 1636.10 Statement of reasons for denial. (a) Denial of a conscientious objector claim by a board must be accompanied by a statement specifying the reason(s) for...

  3. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  4. HIPPO Experiment Data Access and Subseting System

    Science.gov (United States)

    Krassovski, Misha; Hook, Les; Christensen, Sigurd; Boden, Tom

    2014-05-01

    atmospheric species from nearly pole-to-pole over the Pacific Ocean across all seasons. The suite of atmospheric trace gases and aerosols is pertinent to understanding the carbon cycle and challenging global climate models. This dataset will provide opportunities for research across a broad spectrum of Earth sciences, including those analyzing the evolution in time and space of the greenhouse gases that affect global climate. The Carbon Dioxide Information Analysis Center (CDIAC) at Oak Ridge National Laboratory (ORNL) provides data management support for the HIPPO experiment including long-term data storage and dissemination. CDIAC has developed a relational database to house HIPPO merged 10-second meteorology, atmospheric chemistry, and aerosol data. This data set provides measurements from all Missions, 1 through 5, that took place from January of 2009 to September 2011. This presentation introduces newly build database and web interface, reflects the present state and functionality of the HIPPO Database and Exploration System as well as future plans for expansion and inclusion of combined discrete flask and GC sample GHG, Halocarbon, and hydrocarbon data.

  5. Access Safety Systems – New Concepts from the LHC Experience

    CERN Document Server

    Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E

    2011-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...

  6. 29 CFR 530.204 - Discretionary denial or revocation.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Discretionary denial or revocation. 530.204 Section 530.204... EMPLOYMENT OF HOMEWORKERS IN CERTAIN INDUSTRIES Denial/Revocation of Homeworker Employer Certificates § 530.204 Discretionary denial or revocation. Where the Administrator finds that the employment...

  7. 29 CFR 530.205 - Mandatory denial or revocation.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Mandatory denial or revocation. 530.205 Section 530.205... EMPLOYMENT OF HOMEWORKERS IN CERTAIN INDUSTRIES Denial/Revocation of Homeworker Employer Certificates § 530.205 Mandatory denial or revocation. The Administrator shall deny or revoke a certificate in...

  8. Accessing and Sharing Data Using the CUAHSI Hydrologic Information System

    Science.gov (United States)

    Tarboton, D. G.; Horsburgh, J. S.; Whiteaker, T. L.; Maidment, D. R.; Zaslavsky, I.

    2008-12-01

    The Consortium of Universities for the Advancement of Hydrologic Science, Inc (CUAHSI) has a Hydrologic Information System (HIS) project, which is developing infrastructure to support the sharing of hydrologic data through web services and tools for data discovery, access and publication. Centralized data services support access to National Datasets such as the USGS National Water Information System (NWIS) and SNOTEL, in a standard way. Distributed data services allow users to establish their own server and publish their data through CUAHSI HIS web services. Once such a data service is registered within HIS Central, it becomes searchable and accessible through the centralized discovery and data access tools. The HIS is founded upon an information model for observations at stationary points that supports its data services. This is implemented as both XML and relational database schema for transmission and storage of data respectively. WaterML is the XML based data transmission model that underlies the machine to machine communications, while the Observations Data Model (ODM) is a relational database model for persistent data storage. Web services support access to hydrologic data stored in ODM and transmitted using WaterML directly from applications software such as Excel, MATLAB and ArcGIS that have Simple Object Access Protocol (SOAP) capability. A significant value of web services derives from the capability to use them from within a user's preferred analysis environment, rather than requiring a user to learn new software. This allows a user to work with data from national and academic sources, almost as though it was on their local disk. This poster will be computer-based with internet access for demonstration of HIS tools and functionality.

  9. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  10. Access and Use of Federal Data through NSF's CASPAR System.

    Science.gov (United States)

    Firnberg, James W.

    1991-01-01

    The National Science Foundation's Computer-Aided Science Policy and Research database system provides microcomputer-based access and manipulation of multiple national databases for federal and now institutional use. Applications at West Virginia University, Portland State University, and the State University of New York at Buffalo pilot tested the…

  11. system hardening architecture for safer access to critical business ...

    African Journals Online (AJOL)

    eobe

    a computer system or to inject malicious code into it, aimed at causing harm to ... 34 No. 4, October 2015 789 safer access to stored data, and therefore, decrease in ..... Computer and Communication Engineering, Vol. 3,. Number 1, 2014, pp ...

  12. 45 CFR 95.615 - Access to systems and records.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Access to systems and records. 95.615 Section 95.615 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION GENERAL ADMINISTRATION-GRANT PROGRAMS (PUBLIC ASSISTANCE, MEDICAL ASSISTANCE AND STATE CHILDREN'S HEALTH INSURANCE...

  13. Open access pricing methodology in economically adapted electric transmission systems

    Energy Technology Data Exchange (ETDEWEB)

    Rudnick, Hugh; Cura, Eliana; Palma, Rodrigo [Pontificia Univ. Catolica de Chile, Santiago (Chile). Dept. de Ingenieria Electrica

    1996-07-01

    Open access pricing methodologies are evaluated in a deregulated environment, as applied to an economically adapted electric transmission system over a ten year time horizon. A transmission planning methodology using a genetic algorithm is used to determine the adapted system and the required investment over the horizon. A production cost simulation algorithm is utilized to determine the operation of the hydroelectric system and the resultant short term marginal income. Different pricing methodologies to allocate the required supplement, as applied to the Chilean central interconnected electrical system, are evaluated: use of system, postage stamp and user benefit. The resultant payment allocations are assessed and their economic impact on participants is discussed. (author)

  14. Does the public deserve free access to climate system science?

    Science.gov (United States)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  15. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  16. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  17. Formalized Description of Distributed Denial of Service Attack

    Institute of Scientific and Technical Information of China (English)

    杜彦辉; 马锐; 刘玉树

    2004-01-01

    The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.

  18. Guarantee of property right in opean access systems; Open access ni okeru zaisanken no hosho

    Energy Technology Data Exchange (ETDEWEB)

    Maruyama, M. [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1996-12-25

    This paper describes discussions in California of the USA and in Germany concerning the separation of transmission department and forced liberation of transmission network in private electric power companies and the guarantee of property right. In California, the state public utility committee does not have an authority to order the separation of transmission department against electric power companies. It is only the legislature that can conduct the separation of transmission department and the third party access of transmission network based on the expropriation provisions of the constitution. In Germany, the order of separation of transmission department by the readjusting authority contradicts the guarantee of property right in the constitution. The order of third party access also exceeds the range of duty accompanied with the property right, and the procedure of expropriation is necessary for its enforcement. Problems are pointed out in the case when these discussions are applied to the separation of transmission department, third party access, and distribution system in Japan. 3 refs.

  19. Personal Access Satellite System (PASS) study. Fiscal year 1989 results

    Science.gov (United States)

    Sue, Miles K. (Editor)

    1990-01-01

    The Jet Propulsion Laboratory is exploring the potential and feasibility of a personal access satellite system (PASS) that will offer the user greater freedom and mobility than existing or currently planned communications systems. Studies performed in prior years resulted in a strawman design and the identification of technologies that are critical to the successful implementation of PASS. The study efforts in FY-89 were directed towards alternative design options with the objective of either improving the system performance or alleviating the constraints on the user terminal. The various design options and system issues studied this year and the results of the study are presented.

  20. Input-to-State Stabilizing Control Under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2015-01-01

    The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service (DoS) attacks, namely attacks that prevent transmissions over the network. We characterize frequency an

  1. Detection of denial-of-service attacks based on computer vision techniques

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Hu, Jiankun

    2014-01-01

    Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed system treats traffic records as images and detec

  2. Inferring Internet Denial-of-Service Activity

    Science.gov (United States)

    2007-11-02

    Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego dmoore@caida.org...the local network topology. kc claffy and Colleen Shannon at CAIDA provided support and valuable feed- back throughout the project. David Wetherall

  3. "LUDO" - Kids playing Distributed Denial of Service

    NARCIS (Netherlands)

    Steinberger, Jessica; Cardoso de Santanna, José Jair; Spatharas, E.; Amler, H.; Breuer, N.; Graul, K.; Kuhnert, B.; Piontek, U.; Sperotto, Anna; Baier, H.; Pras, Aiko; Bergström, Johan; Hórvath, Gyöngyi; Schofield, Brook

    2016-01-01

    Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services. GE̿ANT, the pan-European network with terabit capacities witnesses close to hundreds of DDoS attacks on a daily basis. The reason is that DDoS attacks are getting larger, more

  4. Data denial experiments for extratropical transition

    Directory of Open Access Journals (Sweden)

    Doris Anwender

    2012-11-01

    Full Text Available Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF model are designed to investigate the value of targeted observations for historical extratropical transition (ET cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC environment is, on average, as important as denying data in mid-latitude sensitive regions determined using extratropical singular vectors (SV. The impact of data denial over TC regions propagates downstream from the Atlantic towards Europe, with a maximum degradation at day 4. This degradation is mainly attributed to the data denial at the TC stage, i.e. before ET is completed. When data are denied on mid-latitude sensitive regions, the largest degradation is found around day 2 and also after the day 4 forecast. In general, the loss of information content is larger when data are denied in mid-latitude sensitive areas because these identify dynamically active regions. In both denial experiments, aircraft and satellite radiance data are the most influential observations. For the selected case of Hurricane Irene, the largest degradations are found for forecasts initialised while Irene reached its peak intensity. If observations are denied in the near storm environment, the TC mostly disappears from the analysis and the subsequent forecast. This allows the impact of Irene on the formation of the downstream cut-off low to be investigated.

  5. Use of system approaches for transmission open access pricing

    Energy Technology Data Exchange (ETDEWEB)

    Rudnick, H.; Soto, M.; Palma, R. [Pontificia University Catolica de Chile, Santiago (Chile)

    1999-02-01

    The Latin American deregulated markets have based their open access schemes on a concept that considers a multilateral use of the transmission system, with all agents contributing to the financing of a common network based on physical and economic usage, irrespective of commercial arrangements. The paper describes the concept and the existing schemes and contributes with the formulation of alternative numerical approaches for open access pricing, taking into account energy and capacity use of the system by the participant agents. Distribution factors based on DC power flows are the basic elements of the formulation, which is built based on different physical and economic considerations. The approaches are numerically evaluated in the Chilean main interconnected electrical system, with a comparison of the resultant impacts on generators and consumers. (author)

  6. Access Control Framework Based on Mobile P2P System%一种基于移动P2P系统的访问控制框架

    Institute of Scientific and Technical Information of China (English)

    方芳; 陈世平; 裘慧奇; 王佳炳

    2011-01-01

    针对移动P2P网络中的对等端容易耗尽系统资源、受到拒绝服务攻击等问题,提出了一种访问控制框架.在RBAC模型的基础上提出MT-RBAC访问控制框架,模型使用了空间上下文、信任约束和资源控制来实现移动P2P系统的访问控制机制.有效地避免了恶意节点的资源请求对系统资源的消耗,提高了系统可用性.%In order to solve the problem which has existed in the mobile p2p network, for example, the excessive consumption of system resources and the attacks of denial service, a new access control is proposed in this paper. Based on RB AC access control framework, MT-RB AC access control framework adopts the techniques of spatial context, trust constraint and resource control to achieve the access control mechanism of the Mobile P2P System. The new access control framework can effectively and efficiently increase the usability of the system, and prevent the system from the irrational resource request from spite nodes.

  7. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  8. Self-triggered Coordination over a Shared Network under Denial-of-Service

    NARCIS (Netherlands)

    Mohammadi Senejohnny, Danial; Tesi, Pietro; De Persis, Claudio

    2015-01-01

    The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among the network agents. By introducing a notion of

  9. The Marley hypothesis: denial of racism reflects ignorance of history.

    Science.gov (United States)

    Nelson, Jessica C; Adams, Glenn; Salter, Phia S

    2013-02-01

    This study used a signal detection paradigm to explore the Marley hypothesis--that group differences in perception of racism reflect dominant-group denial of and ignorance about the extent of past racism. White American students from a midwestern university and Black American students from two historically Black universities completed surveys about their historical knowledge and perception of racism. Relative to Black participants, White participants perceived less racism in both isolated incidents and systemic manifestations of racism. They also performed worse on a measure of historical knowledge (i.e., they did not discriminate historical fact from fiction), and this group difference in historical knowledge mediated the differences in perception of racism. Racial identity relevance moderated group differences in perception of systemic manifestations of racism (but not isolated incidents), such that group differences were stronger among participants who scored higher on a measure of racial identity relevance. The results help illuminate the importance of epistemologies of ignorance: cultural-psychological tools that afford denial of and inaction about injustice.

  10. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  11. Licensed Shared Access System Possibilities for Public Safety

    Directory of Open Access Journals (Sweden)

    Kalle Lähetkangas

    2016-01-01

    Full Text Available We investigate the licensed shared access (LSA concept based spectrum sharing ideas between public safety (PS and commercial radio systems. While the concept of LSA has been well developed, it has not been thoroughly investigated from the public safety (PS users’ point of view, who have special requirements and also should benefit from the concept. Herein, we discuss the alternatives for spectrum sharing between PS and commercial systems. In particular, we proceed to develop robust solutions for LSA use cases where connections to the LSA system may fail. We simulate the proposed system with different failure models. The results show that the method offers reliable LSA spectrum sharing in various conditions assuming that the system parameters are set properly. The paper gives guidelines to set these parameters.

  12. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  13. A Rewritable, Random-Access DNA-Based Storage System

    Science.gov (United States)

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  14. A Comprehensive System for Monitoring Urban Accessibility in Smart Cities.

    Science.gov (United States)

    Mora, Higinio; Gilart-Iglesias, Virgilio; Pérez-Del Hoyo, Raquel; Andújar-Montoya, María Dolores

    2017-08-09

    The present work discusses the possibilities offered by the evolution of Information and Communication Technologies with the aim of designing a system to dynamically obtain knowledge of accessibility issues in urban environments. This system is facilitated by technology to analyse the urban user experience and movement accessibility, which enabling accurate identification of urban barriers and monitoring its effectiveness over time. Therefore, the main purpose of the system is to meet the real needs and requirements of people with movement disabilities. The information obtained can be provided as a support service for decision-making to be used by city government, institutions, researchers, professionals and other individuals of society in general to improve the liveability and quality of the lives of citizens. The proposed system is a means of social awareness that makes the most vulnerable groups of citizens visible by involving them as active participants. To perform and implement the system, the latest communication and positioning technologies for smart sensing have been used, as well as the cloud computing paradigm. Finally, to validate the proposal, a case study has been presented using the university environment as a pre-deployment step in urban environments.

  15. Use of CDMA access technology in mobile satellite systems

    Science.gov (United States)

    Ramasastry, Jay; Wiedeman, Bob

    1995-01-01

    Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.

  16. Towards Voluntary Interoperable Open Access Licenses for the Global Earth Observation System of Systems (GEOSS)

    NARCIS (Netherlands)

    Onsrud, H.; Campbell, J.; Van Loenen, B.

    2010-01-01

    Access to earth observation data has become critically important for the wellbeing of society. A major impediment to achieving widespread sharing of earth observation data is lack of an operational web-wide system that is transparent and consistent in allowing users to legally access and use the ear

  17. Access Control in Decentralised Publish/Subscribe Systems

    Directory of Open Access Journals (Sweden)

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  18. Skepticism and Denial: Drawing a line

    Science.gov (United States)

    Byrne, J. M.; Brown, M. B.; Peacock, K.

    2016-12-01

    Climate denialism is distinct from a merely skeptical attitude towards generally accepted views in climate science. But drawing the line between them takes care—there are similarities between skepticism and denial, including a shared reluctance to accept conclusions that nearly all qualified scientists take to be well-justified. Here we will explore both how to draw the line, and how to effectively communicate the differences between denial and skepticism. Identifying which of these two terms best describes someone's attitude turns on whether they reject a generally accepted view based on a `high threshold' for acceptance of conclusions in general, or from a preference that the conclusion in question be false. In most cases, denialism manifests in disregard and mistreatment of evidence, including selective quotation, credulous endorsement of bad sources and incredulous rejection of good sources. Historically, current accepted views became dominant as alternatives were excluded and arguments supporting current views accumulated. The accumulated record of evidence and successful application of those views sets a high bar for proposed alternatives to them. Pure skeptics may refuse to endorse generally accepted views without rejecting or distorting the strong evidence for those views, and typically support policy responses based on the implications of that evidence. But deniers who reject scientific conclusions reject the evidence for those views while endorsing views that a true skeptic would regard as less plausible and well-supported than the accepted views. Thus motivated cognition is the key to defining denial. Pascal's famous argument for belief in God illustrates the problem: even assuming God's existence to be extremely improbable, the expected value of believing is far higher than the expected value of disbelieving. But Pascal's argument undermines its own methodology: without reasons to rely on beliefs as reliable guides to successful action, cost

  19. 19 CFR 122.183 - Denial of access.

    Science.gov (United States)

    2010-04-01

    ...; (xxxiii) Illegal use or possession of firearms or explosives; (xxxiv) Any violation of a U.S. immigration... property; (H) Aggravated assault; (I) Bribery; or (J) Illegal possession of a controlled...

  20. Accessibility of a Destination-Based Transportation System: A Large Airport Study

    Institute of Scientific and Technical Information of China (English)

    SHI Jing; YING Xiwen

    2008-01-01

    The accessibility of a destination-based transportation system is defined to quantify the perform-ance of transportation systems which access a distinct destination. The access cost is used to reflect the utility of the transportation system including the fatigue and inconvenience in the total cost. The cost is quan-tified by two coefficients which represent the different characteristics of various people. The average cost and the income-relative accessibility are used to describe various aspects of the accessibility and to evaluate the accessibility of a destination-based system. A case study uses data from the Kunming transpor-tation system to evaluate the accessibility of the present city airport. The calibrated coefficients are then used to evaluate the transportation system to the new Kunming international airport. The results show that this transportation accessibility evaluation can be combined with transportation planning to study transporta-tion sub-systems.

  1. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    Science.gov (United States)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  2. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  3. Bluetooth Navigation System using Wi-Fi Access Points

    CERN Document Server

    Agrawal, Rohit

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The system that has been introduced here uses Bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and ch...

  4. Hentschel random access tracking system HSG 84.30

    Science.gov (United States)

    Zamzow, Heinz

    1990-08-01

    The development of the Random Access Tracking System was initiated at the University of Muenster, Department of Orthopaedic Physiology by Dr. Theysohn. This system is a real-time high-speed and high-resolution multi-point tracking system. The moving objects are identified with retro-reflective markers which are illuminated by halogen spotlights placed around the camera lens. The video interface generates deflection signals which are fed to unique Random Access Cameras manufactured by Hamamatsu Corporation. These signals perform high speed window scanning and can sample up to 7,500 markers per second. Under certain circumstances this can be increased to 15,000 markers per second. From 1 to 126 markers can be detected in a line scan search mode. Window size may be varied in steps from 0.5% to 4.0% of the field of view. Using a small window it is possible to obtain 1 part in 32,768 in each direction of the field of view. The raw data are reduced to 2-D centroids of the targets. On-line data storage and display are possible using an industry-standard ATPC with DMA interface. Real-time feed-back is also possible. The video interface provides for off-line 3-D reconstructions using the data from two or more synchronized cameras. The system can be adapted to meet the needs of particular applications by modifying sample-rate, data transfer rate, and the number and the dimensions of the windows.

  5. Detecting Distributed Denial of Service Attacks Using Data Mining Techniques

    Directory of Open Access Journals (Sweden)

    Mouhammd Alkasassbeh

    2016-01-01

    Full Text Available Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks. The intrusion-detection system (IDS is one of the solutions to detecting and classifying any anomalous behavior. The IDS system should always be updated with the latest intruder attack deterrents to preserve the confidentiality, integrity and availability of the service. In this paper, a new dataset is collected because there were no common data sets that contain modern DDoS attacks in different network layers, such as (SIDDoS, HTTP Flood. This work incorporates three well-known classification techniques: Multilayer Perceptron (MLP, Naïve Bayes and Random Forest. The experimental results show that MLP achieved the highest accuracy rate (98.63%.

  6. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design.

  7. Framework for monitoring equity in access and health systems ...

    African Journals Online (AJOL)

    paper, proposes a framework for monitoring equity in access and health .... get additional data through in—depth and qualitative studies. Equity and health .... characteristics of HIV infected patients seeking care in relation to access to the Drug ...

  8. 44 CFR 71.3 - Denial of flood insurance.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance. 71... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program IMPLEMENTATION OF COASTAL BARRIER LEGISLATION § 71.3 Denial of flood insurance. (a) No new flood insurance...

  9. Development of a Denial Scale for Male Incest Offenders.

    Science.gov (United States)

    Guthrie, James T.; Canada, Richard M.; Lim, Mee-Gaik; Jennings, Glen H.

    1998-01-01

    A scale to measure denial among sexual offenders was developed for male incest offenders (N=265). Validity and reliability were tested. Four subscales correspond to the domains of denial: facts, awareness, impact, and responsibility. Development strategy and psychometric analysis are reported. Recommendations for further research are included.…

  10. 33 CFR 138.120 - Certificates, denial or revocation.

    Science.gov (United States)

    2010-07-01

    ... revocation. 138.120 Section 138.120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... Responsibility for Water Pollution (Vessels) § 138.120 Certificates, denial or revocation. (a) The Director, NPFC... equivalent of a denial. (e) If the intended revocation under paragraph (b) of this section is based...

  11. 33 CFR 135.223 - Certificates, denial or revocation.

    Science.gov (United States)

    2010-07-01

    ... revocation. 135.223 Section 135.223 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... COMPENSATION FUND Financial Responsibility for Offshore Facilities § 135.223 Certificates, denial or revocation...) Denial or revocation of a certificate shall be immediate and without prior notice in a case where...

  12. Critical Surfing: Holocaust Denial and Credibility on the Web.

    Science.gov (United States)

    Borrowman, Shane

    1999-01-01

    Discusses the nature of hate speech in general, and Holocaust denial in particular, on the World Wide Web, citing specific Web sources. Argues that, although discussion of Holocaust denial may be a difficult classroom discussion topic, and should be approached carefully, intelligent use of the Internet must be taught in the classroom. (MSE)

  13. Denial of Service Prevention for 5G

    DEFF Research Database (Denmark)

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology...

  14. LINEAR-DISPERSION DIVISION MULTIPLE-ACCESS FOR MIMO SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    Deng Dan; Lv Xingzai; Zhu Jinkang

    2008-01-01

    Comprehensive study on novel Linear-Dispersion Division Multiple-Access (LDDMA) for multi-user uplink Multiple-Input Multiple-Output (MIMO) systems is proposed. In the new multi- plexing scheme, each user's information symbol is dispersed by a User-Specific Matrix (USM) both in space and time domain and linearly combined at base-station side. And a simple random search al- gorithm, based on capacity maximization criteria, is developed to generate a bank of USMs. Simulation results are presented to demonstrate the advantages of LDDMA. When the Bit Error Rate (BER) reaches 10, the performance gains are 3dB and 5dB, compared with Time-Division Linear Dispersion Codes (TD-LDC) and BLAST, respectively.

  15. Access to Papanicolaou Test by the Unified Health System users

    Directory of Open Access Journals (Sweden)

    Vanessa Franco de Carvalho

    2016-01-01

    Full Text Available Objective: to understand how is the access to the public health service users in the Papanicolaou Test. Methods: qualitative study, with 52 women who have changes in the Pap smear exam, questioning the exam achievement frequency and the difficulties of its access and the consultations. It was developed a thematic analysis based on the Fekete accessibility reference. Results: three categories emerged: access to information on the frequency of Pap smears, highlighting the completion of the examination linked only to the professional application; access to Pap smears, in which most women do not have difficulty; access to a return visit, showing the difficulty of women getting back into service after the exam. Conclusion: most women have easy access to the Pap smear. However, there are limitations on the return visit, hindering to establish immediate actions to the beginning of treatment.

  16. Access to Papanicolaou Test by the Unified Health System users

    Directory of Open Access Journals (Sweden)

    Vanessa Franco de Carvalho

    2016-05-01

    Full Text Available Objective: to understand how is the access to the public health service users in the Papanicolaou Test. Methods: qualitative study, with 52 women who have changes in the Pap smear exam, questioning the exam achievement frequency and the difficulties of its access and the consultations. It was developed a thematic analysis based on the Fekete accessibility reference. Results: three categories emerged: access to information on the frequency of Pap smears, highlighting the completion of the examination linked only to the professional application; access to Pap smears, in which most women do not have difficulty; access to a return visit, showing the difficulty of women getting back into service after the exam. Conclusion: most women have easy access to the Pap smear. However, there are limitations on the return visit, hindering to establish immediate actions to the beginning of treatment.

  17. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  18. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  19. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  20. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Access Control Systems (Update to DO-230B): Agenda March 10, 2011 Welcome/Introductions/Administrative... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access...

  1. LAPAROSCOPIC SALPINGECTOMY IN TWO CAPTIVE LEOPARDS (PANTHERA PARDUS) USING A SINGLE PORTAL ACCESS SYSTEM.

    Science.gov (United States)

    Hartman, Marthinus J; Monnet, Eric; Kirberger, Robert M; Schoeman, Johan P

    2015-12-01

    Laparoscopic salpingectomy was performed in two adult leopards (Panthera pardus) using a single portal access system, with a multicannulated single-incision laparoscopic surgery port, without any complications. The poorly developed ovarian bursa provided easy access to the uterine tube for salpingectomy. Laparoscopic salpingectomy can be safely performed in the leopard using a single portal access system.

  2. Compact Wireless Access Nodes for WDM Bidirectional Radio-over-Fiber System Based on RSOA

    DEFF Research Database (Denmark)

    Yu, Xianbin; Gibbon, Timothy Braidwood; Tafur Monroy, Idelfonso

    2009-01-01

    We demonstrate a RSOA based WDM radio-over-fiber, bidirectional system for wireless access networks. The multi-functionalities of a RSOA, such as colorless operation, re-modulation and envelope detection, make wireless access nodes more compact.......We demonstrate a RSOA based WDM radio-over-fiber, bidirectional system for wireless access networks. The multi-functionalities of a RSOA, such as colorless operation, re-modulation and envelope detection, make wireless access nodes more compact....

  3. Software interface system for Geophysical Data Access and Management System (GPDAMS-CD)

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.

    -friendly access to large volume of data and means to visualize and extract selected data as per need. The software requires a minimum of computing expertise as it is controlled by a system of `pull down' menus, backed up by a context-sensitive system...

  4. A system for success: BMC Systems Biology, a new open access journal

    Directory of Open Access Journals (Sweden)

    Webb Penelope A

    2007-09-01

    Full Text Available Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  5. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    Science.gov (United States)

    2013-09-16

    the capability to perform NCIC checks to vet contractor employees, and not all Navy installations nave the ability to access NCIC, NCACS is not...Management Corp 10,017 REA to contract N40085-06-D-1260 Goodwill Industries 199,148 Overhead charge to contract N00189-09- C-Z003 DynCorp international

  6. "What Page, Miss?" Enhancing Text Accessibility with DAISY (Digital Accessible Information SYstem)

    Science.gov (United States)

    Spooner, Sue

    2014-01-01

    Introduction: The provision of specially formatted materials is a complex and increasingly difficult task, given the extensive and burgeoning range of texts and resources available for classroom use. The need to extend the provision of accessible formats to include digital resources (in addition to braille, audio, and large print) led to a study…

  7. The role of CRIS systems in measuring Open Access publications

    NARCIS (Netherlands)

    Scharnhorst, A.M.; Dijk, E.M.S.; Doorn, P.K.; van Berchum, M.

    2016-01-01

    Open Access to scientific results - from publications to data - is high on the agenda of science policy drivers. Since long there is no doubt that making your own research available on the web is the best way to gain visibility and impact (Lawrence 2001). The Open Access movement started with calls

  8. Single port access surgery with a novel Port Camera system.

    Science.gov (United States)

    Terry, Benjamin S; Schoen, Jonathan; Mills, Zachary; Rentschler, Mark E

    2012-06-01

    In this work, the authors designed, built, and tested a novel port camera system for single port access (SPA) laparoscopic surgery. This SPA Port Camera device integrates the monitor, laparoscopic camera, and light source into an inexpensive, portable cannula port. The device uses a 2-channel SPA port inserted through an umbilical incision, similar to traditional SPA. After insertion into a channel, the device deploys a small camera module and LED lamp in vivo. An integrated, on-patient LCD provides the view of the surgical site. The design intent of the port camera is to enhance SPA by (a) reducing the size of the SPA port through the elimination of the dedicated laparoscope channel; (b) reducing equipment cost by integrating an inexpensive CMOS sensor and LED lamp at the port tip; (c) eliminating the need for an assistant who operates the laparoscope; and (d) mechanically coupling the camera, tool port, and on-patient LCD screen. The effectiveness of the device was evaluated by comparing the video performance with a leading industry laparoscope and by performing a user evaluation study and live porcine surgery with the device. Effectiveness of the device was mixed. Overall video system performance of the device is better than an industry standard high-definition laparoscope, implying that significant cost savings over a traditional system are possible. Participant study results suggest that simulated laparoscopic tasks are as efficient with the SPA Port Camera as they are with a typical SPA configuration. However, live surgery revealed several shortcomings of the SPA Port Camera.

  9. A review of workers' compensation claims: the frequency of claim denial and medical treatment delay.

    Science.gov (United States)

    Kelley, C R; Amparo, J M

    2000-01-01

    A retrospective chart review of 257 patients who presented between January to March 1998, was conducted to identify the frequency of workers' compensation claim denial among patients who reported to Straub Clinic and Hospital. Results showed that 12.8% of claims were either "denied" or temporarily "denied pending investigation". Analysis of all the claims found that only 2% resulted in delayed medical care. Further analysis of the denied claims revealed the vast majority of claims (78.8%) were denied because the medical provider and the patient had incorrect workers' compensation carrier information. Other independent variables studied (size of the employer, category of employer, injury type, status of case, length of case and number of visits) did not predict either denial of the claim or treatment delay. This study suggests that the efficiency of our State's Workers' Compensation system would be greatly improved by developing a system to provide medical care providers with accurate insurance information.

  10. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    CERN Document Server

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  11. Science and the Public: Debate, Denial, and Skepticism

    Directory of Open Access Journals (Sweden)

    Stephan Lewandowsky

    2016-08-01

    Full Text Available When the scientific method yields discoveries that imperil people’s lifestyle or worldviews or impinge on corporate vested interests, the public and political response can be anything but favorable. Sometimes the response slides into overt denial of scientific facts, although this denial is often claimed to involve “skepticism”. We outline the distinction between true skepticism and denial with several case studies. We propose some guidelines to enable researchers to differentiate legitimate critical engagement from bad-faith harassment, and to enable members of the public to pursue their skeptical engagement and critique without such engagement being mistaken for harassment.

  12. Tinamit: Making coupled system dynamics models accessible to stakeholders

    Science.gov (United States)

    Malard, Julien; Inam Baig, Azhar; Rojas Díaz, Marcela; Hassanzadeh, Elmira; Adamowski, Jan; Tuy, Héctor; Melgar-Quiñonez, Hugo

    2017-04-01

    Model coupling is increasingly used as a method of combining the best of two models when representing socio-environmental systems, though barriers to successful model adoption by stakeholders are particularly present with the use of coupled models, due to their high complexity and typically low implementation flexibility. Coupled system dynamics - physically-based modelling is a promising method to improve stakeholder participation in environmental modelling while retaining a high level of complexity for physical process representation, as the system dynamics components are readily understandable and can be built by stakeholders themselves. However, this method is not without limitations in practice, including 1) inflexible and complicated coupling methods, 2) difficult model maintenance after the end of the project, and 3) a wide variety of end-user cultures and languages. We have developed the open-source Python-language software tool Tinamit to overcome some of these limitations to the adoption of stakeholder-based coupled system dynamics - physically-based modelling. The software is unique in 1) its inclusion of both a graphical user interface (GUI) and a library of available commands (API) that allow users with little or no coding abilities to rapidly, effectively, and flexibly couple models, 2) its multilingual support for the GUI, allowing users to couple models in their preferred language (and to add new languages as necessary for their community work), and 3) its modular structure allowing for very easy model coupling and modification without the direct use of code, and to which programming-savvy users can easily add support for new types of physically-based models. We discuss how the use of Tinamit for model coupling can greatly increase the accessibility of coupled models to stakeholders, using an example of a stakeholder-built system dynamics model of soil salinity issues in Pakistan coupled with the physically-based soil salinity and water flow model

  13. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    Science.gov (United States)

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.

  14. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  15. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    OpenAIRE

    Duangporn Prasertsubpakij; Vilas Nitivattananon

    2012-01-01

    Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR) transportation has increasingly relied on the role of two mass rapid transport syst...

  16. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  17. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  18. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  19. From System Expansion to System Contraction: Access to Higher Education in Poland

    Science.gov (United States)

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  20. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  1. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  2. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  3. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  4. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  5. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  6. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  7. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held July 15, 2011, from 10 a.m. to 1 p.m....

  8. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  9. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  10. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held February 8, 2011, from 10 a.m. to 5...

  11. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held December 9, 2010, from 10 a.m. to 5...

  12. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  13. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data System-Public access to data. 504.602-71 Section 504.602-71 Federal Acquisition Regulations System... Procurement Data System—Public access to data. (a) The FPDS database. The General Services...

  14. 7 CFR 205.405 - Denial of certification.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) ORGANIC FOODS PRODUCTION ACT PROVISIONS NATIONAL ORGANIC PROGRAM Certification § 205.405 Denial of certification. (a) When the...

  15. 7 CFR 205.507 - Denial of accreditation.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) ORGANIC FOODS PRODUCTION ACT PROVISIONS NATIONAL ORGANIC PROGRAM Accreditation of Certifying Agents § 205.507 Denial of accreditation....

  16. 27 CFR 479.65 - Denial of application.

    Science.gov (United States)

    2010-04-01

    ... EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION MACHINE GUNS, DESTRUCTIVE DEVICES, AND CERTAIN OTHER FIREARMS Tax on Making Firearms Application to Make A Firearm § 479.65 Denial of application....

  17. 33 CFR 151.08 - Denial of entry.

    Science.gov (United States)

    2010-07-01

    ... BALLAST WATER Implementation of MARPOL 73/78 and the Protocol on Environmental Protection to the Antarctic Treaty as it Pertains to Pollution from Ships General § 151.08 Denial of entry. (a) Unless a ship...

  18. 33 CFR 136.307 - Denial of designation.

    Science.gov (United States)

    2010-07-01

    ... Section 136.307 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... PROCEDURES; DESIGNATION OF SOURCE; AND ADVERTISEMENT Designation of Source and Advertisement § 136.307 Denial... Designation. Advertisement...

  19. Managing the Threat of Denial-of-Service Attacks

    Science.gov (United States)

    2001-10-01

    Cooperative Association for Internet Data Analysis ( CAIDA ) address this question in their paper, “Inferring Internet Denial-of-Service Activity.” (see...belonging to more than 2,000 distinct organizations during a three-week period.” In addition, CAIDA reports that 90% of attacks last for one hour or less...Engineering Task Force http://www.ietf.org/html.charters/ipngwg-charter.html Inferring Internet Denial-of-Service Activity CAIDA , University of

  20. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  1. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  2. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  3. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... circumvention of copyright protection systems for access control technologies which was published July 27, 2010... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final...

  4. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): November 2, 2010 Welcome/Introductions/Administrative Remarks Agenda... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access...

  5. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda April 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access...

  6. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda January 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access...

  7. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  8. Upper Bound for Energy Efficiency in Multi-Cell Fibre-Wireless Access Systems

    DEFF Research Database (Denmark)

    Koonen, A. M. J.; Popov, M.; Wessing, Henrik

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  9. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  10. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  11. GENERAL APPROACHES TO OPEN ACCESS ELECTRONIC SYSTEMS USING IN SCIENTIFIC AND PEDAGOGICAL RESEARCHES

    Directory of Open Access Journals (Sweden)

    Tetiana L. Novytska

    2016-01-01

    Full Text Available In the article the electronic open access systems, which include digital libraries, electronic tables and analytical systems are considered. There is investigated the functionality of electronic systems of open access. Based on the analysis of scientific and educational research it is highlighted the main approaches to the use of digital library and general approaches to the use of electronic systems of open access. The types of searches that can be used by users of electronic libraries are investigated. There are presented the examples of scientometric and analytical systems as well as the main advantages of Google Scholar.

  12. A CDMA architecture for a Ka-band Personal Access Satellite System

    Science.gov (United States)

    Motamedi, Masoud; Sue, Miles K.

    1990-01-01

    A Code Division Multiple Access (CDMA) architecture is currently being studied for use in a Ka-band Personal Access Satellite System (PASS). The complete architecture consisting of block diagrams of the user terminal, the supplier station, the network management center, and the satellite is described along with the access methods and frequency/time plans. The complexity of developing this system using the CDMA architecture is compared to that of a Frequency Division Multiple Access (FDMA) architecture. The inherent advantages and disadvantages of the two architectures are compared and their respective capacities are discussed.

  13. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru Miyauchi; Yanjun Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirmlow optical loss and environmental stabilities.

  14. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru; Miyauchi; Yanjun; Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirm low optical loss and environmental stabilities.

  15. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    Science.gov (United States)

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand

  16. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  17. Climate Change Denial Books and Conservative Think Tanks

    Science.gov (United States)

    Jacques, Peter J.

    2013-01-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites. PMID:24098056

  18. The storage system of PCM based on random access file system

    Science.gov (United States)

    Han, Wenbing; Chen, Xiaogang; Zhou, Mi; Li, Shunfen; Li, Gezi; Song, Zhitang

    2016-10-01

    Emerging memory technologies such as Phase change memory (PCM) tend to offer fast, random access to persistent storage with better scalability. It's a hot topic of academic and industrial research to establish PCM in storage hierarchy to narrow the performance gap. However, the existing file systems do not perform well with the emerging PCM storage, which access storage medium via a slow, block-based interface. In this paper, we propose a novel file system, RAFS, to bring about good performance of PCM, which is built in the embedded platform. We attach PCM chips to the memory bus and build RAFS on the physical address space. In the proposed file system, we simplify traditional system architecture to eliminate block-related operations and layers. Furthermore, we adopt memory mapping and bypassed page cache to reduce copy overhead between the process address space and storage device. XIP mechanisms are also supported in RAFS. To the best of our knowledge, we are among the first to implement file system on real PCM chips. We have analyzed and evaluated its performance with IOZONE benchmark tools. Our experimental results show that the RAFS on PCM outperforms Ext4fs on SDRAM with small record lengths. Based on DRAM, RAFS is significantly faster than Ext4fs by 18% to 250%.

  19. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  20. 77 FR 48199 - Privacy Act; System of Records: State-35, Information Access Programs Records

    Science.gov (United States)

    2012-08-13

    ... user must first be granted access to the Department of State computer system. All employees of the... trails of access from the computer media, thereby permitting regular and ad hoc monitoring of computer usage. RETENTION AND DISPOSAL: Records are retired and destroyed in accordance with published...

  1. Evaluation on the Occupational Information Access System as Used at Churchill High School. A Project Report.

    Science.gov (United States)

    McKinlay, Bruce; Adams, Daniel

    The Occupational Information Access System (OIAS) improves the accessibility of occupational labor market information for career planning. Its operation at Churchill High School is evaluated from several angels: the likes and dislikes of users; the effect of OIAS on users' knowledge of occupational information and on their career plans; why other…

  2. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  3. Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Kim, Tai-Hoon

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  4. TECHNOLOGY FOR ADMINISTERING OF THE ACCESS TO INFORMATION RESOURCES IN MANAGEMENT SYSTEM ON THE AVIATION ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Andrey V. Degtyarev

    2015-01-01

    Full Text Available The task of administering software-information complex occurs duringthe development of application systems for managing business-processes and is connected with the organization of access forusers to information resources in conditions of multi-user information systems for management. For solution of this problem proposed theapproach, which is based on a hierarchical system of access rightsto information resources on the levels: tool, object and procedural.Keywords: software-information complex, information resources,administering, permissions, separation of powers, access model.

  5. Distributed Denial of Service Tools, Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht.

    Energy Technology Data Exchange (ETDEWEB)

    Criscuolo, P. J.

    2000-02-14

    One type of attack on computer systems is know as a Denial of Service (DoS) attack. A DoS attack is designed to prevent legitimate users from using a system. Traditional Denial of Service attacks are done by exploiting a buffer overflow, exhausting system resources, or exploiting a system bug that results in a system that is no longer functional. In the summer of 1999, a new breed of attack has been developed called Distributed Denial of Service (DDoS) attack. Several educational and high capacity commercial sites have been affected by these DDoS attacks. A DDoS attack uses multiple machines operating in concert to attack a network or site. There is very little that can be done if you are the target of a DDoS. The nature of these attacks cause so much extra network traffic that it is difficult for legitimate traffic to reach your site while blocking the forged attacking packets. The intent of this paper is to help sites not be involved in a DDoS attack. The first tools developed to perpetrate the DDoS attack were Trin00 and Tribe Flood Network (TFN). They spawned the next generation of tools called Tribe Flood Network 2000 (TFN2K) and Stacheldraht (German for Barb Wire). These DDoS attack tools are designed to bring one or more sites down by flooding the victim with large amounts of network traffic originating at multiple locations and remotely controlled by a single client. This paper discusses how these DDoS tools work, how to detect them, and specific technical information on each individual tool. It is written with the system administrator in mind. It assumes that the reader has basic knowledge of the TCP/IP Protocol.

  6. 2 CFR 801.1105 - Cause for a limited denial of participation.

    Science.gov (United States)

    2010-01-01

    ... (Department of Veterans Affairs Optional Subpart for OMB Guidance at 2 CFR Part 180). § 801.1105 Cause for a limited denial of participation. (a) Causes. A limited denial of participation shall be based upon... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Cause for a limited denial of...

  7. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  8. 32 CFR 505.5 - Individual access to personal information.

    Science.gov (United States)

    2010-07-01

    ... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.5 Individual access to personal information... individuals under this section is not considered a “public release” of information. (c) Verification of... denying or limiting an individual's right to access or amendment and the role of the Denial Authority. (1...

  9. Access to E-learning in the Nigerian university system (NUS): a case ...

    African Journals Online (AJOL)

    Access to E-learning in the Nigerian university system (NUS): a case study of ... based programmes during an e- learning workshop organized by AfriHUB. ... Lecturers and students employ ICT facilities for teaching and learning respectively.

  10. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  11. Sandia Engineering Analysis Code Access System v. 2.0.1

    Energy Technology Data Exchange (ETDEWEB)

    2017-10-30

    The Sandia Engineering Analysis Code Access System (SEACAS) is a suite of preprocessing, post processing, translation, visualization, and utility applications supporting finite element analysis software using the Exodus database file format.

  12. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Enterprise Income Verification (EIV) System User Access Authorization Form and Rules.... This notice also lists the following information: Title of Proposal: Enterprise Income Verification...

  13. Socially desirable responding in Chinese university students: denial and enhancement?

    Science.gov (United States)

    Li, Feng; Li, Yongjuan; Wang, Yong

    2015-04-01

    This study examined the Balanced Inventory of Desirable Responding (BIDR) with one-, two-, three-, and four-dimensional models and tested the BIDR's discriminant validity with personality variables. A confirmatory and exploratory factor analysis of responses from 600 Chinese university students (314 men, 282 women, 4 missing; M age=20.0 yr.) provided results indicating that the four-factor model fit the data best; i.e., self-deception and impression management split into denial and enhancement. The Denial and Enhancement subscales with personality variables show significant differences, confirming the four-factor model. The cultural differences as a possible reason for the split were discussed.

  14. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  15. Economically adapted transmission systems in open access schemes -- Application of genetic algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Rudnick, H.; Palma, R.; Cura, E.; Silva, C. [Pontificia Univ. Catolica de Chile, Santiago (Chile). Dept. de Ingenieria Electrica

    1996-08-01

    A dynamic transmission planning methodology using a genetic algorithm is formulated for the purpose of determining an economically adapted electric transmission system in a deregulated open access environment. Transmission investment sensitivity information linked to short term marginal income is used. A computer program is developed and applied to obtain a long range adapted transmission grid for the Chilean electrical system. Two open access pricing methodologies are evaluated in a spot price framework, as applied to the adapted grid over the time horizon.

  16. Utility-Interconnected Photovoltaic Systems: Evaluating the Rationale for the Utility-Accessible External Disconnect Switch

    Energy Technology Data Exchange (ETDEWEB)

    Coddington, M.; Margolis, R.M.; Aabakken, J.

    2008-01-01

    The utility-accessible alternating current (AC) external disconnect switch (EDS) for distributed generators, including photovoltaic (PV) systems, is a hardware feature that allows a utility?s employees to manually disconnect a customer-owned generator from the electricity grid. This paper examines the utility-accessible EDS debate in the context of utility-interactive PV systems for residential and small commercial installations. It also evaluates the rationale for EDS requirements.

  17. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  18. Thermodynamic Entropy and the Accessible States of Some Simple Systems

    Science.gov (United States)

    Sands, David

    2008-01-01

    Comparison of the thermodynamic entropy with Boltzmann's principle shows that under conditions of constant volume the total number of arrangements in a simple thermodynamic system with temperature-independent constant-volume heat capacity, C, is T[superscript C/k]. A physical interpretation of this function is given for three such systems: an…

  19. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  20. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    CERN Document Server

    Di Maio, Paola

    2011-01-01

    The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are not widely adopted. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA) of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research

  1. Apartheid and healthcare access for paediatric systemic lupus ...

    African Journals Online (AJOL)

    lupus erythematosus (SLE), as a framework for evaluating the structural challenges to ... Paediatric SLE (pSLE) is more severe than the adult disease, and children with SLE .... exploration using a geographical information system. Soc Sci Med ...

  2. What systems participants know about access and service entry and why managers should listen.

    Science.gov (United States)

    Duncombe, Rohena

    2016-08-29

    Objective The present study looked at the views of people directly involved in the entry process for community health counselling using the frame of the health access literature. The concurrence of system participants' views with the access literature highlights access issues, particularly for people who are vulnerable or disadvantaged. The paper privileges the voices of the system participants, inviting local health services to consider using participatory design to improve access at the entry point.Methods People involved in the entry process for community health counselling explored the question, 'What, for you, are the features of a good intake system?' They also commented on themes identified during pilot interviews. These were thematically analysed for each participant group by the researcher to develop a voice for each stakeholder group.Results People accessing the service could be vulnerable and the entry process failed to take that into account. People directly involved in the counselling service entry system, system participants, consisted of: professionals referring in, people seeking services and reception staff taking first enquiries. They shared substantially the same concerns as each other. The responses from these system participants are consistent with the international literature on access and entry into health services.Conclusion Participatory service design could improve primary healthcare service entry at the local level. Canvassing the experiences of system participants is important for delivering services to those who have the least access and, in that way, could contribute to health equity.What is known about the topic? People with the highest health needs receive the fewest services. Health inequality is increasing.What does this paper add? System participants can provide advice consistent with the academic research literature that is useful for improving service entry at the local level.What are the implications for practitioners

  3. Application of Attribute Based Access Control Model for Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Erkan Yalcinkaya

    2017-02-01

    Full Text Available The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.

  4. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Science.gov (United States)

    2010-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical...

  5. China to Create an Access System for the Reproductive Health Industry Based on Quality Accreditation

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ Zhang Weiqing, director of the National Population and Family Planning Commission (NPFPC), disclosed at the inaugural meeting of the China Reproductive Health Industry Association (CRIA), held on March 26, 2007, that China will create an inspection system, a quality accreditation system, and an industry access system for better population structure and family planning.

  6. Measuring the Gap Between Car and Transit Accessibility : Estimating Access Using a High-Resolution Transit Network Geographic Information System

    NARCIS (Netherlands)

    Benenson, I.; Martens, C.J.C.M.; Rofé, Y.

    2010-01-01

    Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,

  7. Study of LANs access technologies in wind power system

    DEFF Research Database (Denmark)

    Wei, Mu; Chen, Zhe

    2010-01-01

    Due to the energy challenges in the world, new types of generation technologies, such as renewable energy based generators, attract great attention and are being quickly developed, which results in the dramatic developments and changes in modern power systems, the communication technologies play...... a increasingly important role in guaranteeing the power system’s stability, reliability, and security. In this paper the necessity of communication technologies employed in wind power system are introduced. According the International Standards Organization (ISO) reference 7-layered model, the communication...... power environment are explained and discussed. Furthermore the simulation of application of Ethernet in an offshore wind farm communication network by a software, OPNET, is elaborated. With the investigation of the communication technologies in this paper, the offshore wind farm SCADA system can...

  8. Asymmetry in Maritime Access and Undersea Anti-Access/Area-Denial Strategies

    Science.gov (United States)

    2007-08-31

    A corollary to the second criterion states that the threat involves a weapon, tactic, or strategy that the United States would not comnat by...Strategies and Their Implications for the United States," RAND Corporation , 2007. 32. Montgomery C. Meigs, "Unorthodox Thoughts about Asymmetric Warfare

  9. Access Control for Monitoring System-Spanning Business Processes

    NARCIS (Netherlands)

    Bassil, S.; Reichert, M.U.; Bobrik, R.; Bauer, Th.

    2007-01-01

    Integrated process support is highly desirable in environ- ments where data related to a particular (business) process are scattered over distributed and heterogeneous information systems (IS). A process monitoring component is a much-needed module in order to provide an integrated view on all these

  10. Labeling and Rating Systems: Greater Access or Censorship?

    Science.gov (United States)

    Martin, Ann M.

    2015-01-01

    This article asks the question: How well versed are school librarians on issues related to labeling and rating systems? As school librarians continue to design and implement resource location schemes to assist patrons, they must recognize the difference between using labels to create interest in books or implementing labeling and rating systems…

  11. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate ra...

  12. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...

  13. The Child with Cancer: Patterns of Communication and Denial.

    Science.gov (United States)

    Spinetta, John J.; Maloney, Lorrie J.

    1978-01-01

    Examines the role of communication and denial in coping efforts of children with cancer. Results indicate level of family communication about cancer expressed by mother's communication is correlated with hypothesized responses in child. Usefulness of three instruments as effective tools in measuring child's reactions is demonstrated. (Author/BEF)

  14. 42 CFR 433.148 - Denial or termination of eligibility.

    Science.gov (United States)

    2010-10-01

    ... Assignment of Rights to Benefits § 433.148 Denial or termination of eligibility. In administering the assignment of rights provision, the agency must: (a) Deny or terminate eligibility for any applicant or recipient who— (1) Refuses to assign his own rights or those of any other individual for whom he can...

  15. 45 CFR 5.34 - Appeal of denials.

    Science.gov (United States)

    2010-10-01

    ... give any explanation. (c) Review process. Before making a decision on an appeal of a denial, the designated review official will consult with the General Counsel to ensure that the rights and interests of... reasons why you believe that the FOIA exemption(s) we cited do not apply to the records that you...

  16. On climate change skepticism and denial in tourism

    NARCIS (Netherlands)

    Hall, C.M.; Amelung, B.; Cohen, S.; Eijgelaar, E.; Gössling, S.; Higham, J.; Leemans, R.; Peeters, P.; Ram, Y.; Scott, D.

    2015-01-01

    The period leading to and immediately after the release of the IPCC’s fifth series of climate change assessments saw substantial efforts by climate change denial interests to portray anthropogenic climate change (ACC) as either unproven theory or a negligible contribution to natural climate variabil

  17. On climate change skepticism and denial in tourism

    NARCIS (Netherlands)

    Hall, C.M.; Amelung, B.; Cohen, S.; Eijgelaar, E.; Gössling, S.; Higham, J.; Leemans, R.; Peeters, P.; Ram, Y.; Scott, D.

    2015-01-01

    The period leading to and immediately after the release of the IPCC’s fifth series of climate change assessments saw substantial efforts by climate change denial interests to portray anthropogenic climate change (ACC) as either unproven theory or a negligible contribution to natural climate

  18. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  19. 7 CFR 946.123 - Denial and appeals.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... WASHINGTON Rules and Regulations Special Purpose Certificates § 946.123 Denial and appeals. The committee may rescind a special purpose certificate issued to a handler for the purpose specified in § 946.120(a),...

  20. On climate change skepticism and denial in tourism

    NARCIS (Netherlands)

    Hall, C.M.; Amelung, B.; Cohen, S.; Eijgelaar, E.; Gössling, S.; Higham, J.; Leemans, R.; Peeters, P.; Ram, Y.; Scott, D.

    2015-01-01

    The period leading to and immediately after the release of the IPCC’s fifth series of climate change assessments saw substantial efforts by climate change denial interests to portray anthropogenic climate change (ACC) as either unproven theory or a negligible contribution to natural climate variabil

  1. 45 CFR 1701.6 - Form of denial.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Form of denial. 1701.6 Section 1701.6 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND... Libraries and Information Science, Suite 601, 1717 K Street NW., Washington, DC 20036, and (d) that judicial...

  2. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  3. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Eles, Petru; Doboli, Alex; Pop, Paul;

    2000-01-01

    In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow...... of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have...... have to be considered during scheduling but also the parameters of the communication protocol should be adapted to fit the particular embedded application. The optimization algorithm, which implies both process scheduling and optimization of the parameters related to the communication protocol...

  4. Multi-tag content access control in RFID system

    OpenAIRE

    2010-01-01

    Radio Frequency Identification (RFID) makes great flexibility and high efficiency for data acquisition in industry and daily life. At the other side, it brings the privacy risks and multiple tags collision issue. Current research in RFID system focuses on the security and privacy issue which is based on authentication protocols between a tag and a Reader. There is a need to design a reasonable protocol which takes care of both multi-tag anti-collision and security issue. This thesis presen...

  5. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  6. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Science.gov (United States)

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  7. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Energy Technology Data Exchange (ETDEWEB)

    Ohmacht, Martin

    2017-08-15

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  8. Geoculture world system, access to Balkan and Albania

    Directory of Open Access Journals (Sweden)

    Ilirjan Çukaj

    2015-03-01

    Full Text Available If culture as a term covers a broad range of relations and social behavior, mutually implicated in influential and economic cycles of the global system, then it becomes wordy geoculture. Geoculture system is used as a term by Wallerstein (2004 who had treated it as a concept largely unused and under a theory of geoculture which plays an important role in the present world system. The theses that is presented in this article is that the global trajectory in the Balkan region is increasing from culture and that, it is imperative to establish a strategic culture direction and management, which, in turn, should be formed not only as a principal need, but also as an obligation of social state institutions to find the viable solutions of the global market policy, economy and culture. And in response to the challenging question the culture of integration becomes imperative now facing nationalism. Albania will have to manage perceptions, fears and realities arising from the above mentioned phenomenon, to establish a balance between the “inside” and “outside” views. In this sense main challenge of Albania is the management of cultural globalization to get the most of opportunities despite the risk of losing ground globally

  9. AN ANALYSIS OF CURRENT COMPUTER NETWORK ATTACK PROCEDURES, THEIR MITIGATION MEASURES AND THE DEVELOPMENT OF AN IMPROVED DENIAL OF SERVICE (DoS ATTACK MODEL

    Directory of Open Access Journals (Sweden)

    IHEKWEABA OGECHI

    2013-04-01

    Full Text Available This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as a proof of concept, and then applied in the development of a model for an adaptive intelligent multi-agent for network protection, against denial of service attacks.

  10. Design and Implementation of a Library and Information Science Open Access Journal Union Catalogue System

    Directory of Open Access Journals (Sweden)

    Sinn-Cheng Lin

    2017-03-01

    Full Text Available Open access is a mode of academic communication that has been on the rise in recent years, but open access academic resources are widely dispersed across the internet, making it occasionally inconvenient in terms of its use. This research is focused on library and information science, using the OAIS reference model as the system framework, two open access platform, DOAJ and E-LIS as the data sources, and through system implementation develop a “library and information science open access journal union catalogue” system. Using the OAI-PMH protocol as the data interoperability standard, and LAMP as the development environment, four major functionalities: injest, archiving, management and access of information were designed, developed, and integrated into system build. Actual testing and verification showed this system is able to successfully collect data from DOAJ and E-LIS open journal resources related to library and information science. The system is now active and functional, and can be used by researchers in the library and science information field.

  11. Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    2000-01-01

    We present an approach to bus access optimization and schedulability analysis for the synthesis of hard real-time distribution embedded systems. The communication model is based on a time-triggered protocol. We have developed an analysis for the communication delays proposing four different message...... scheduling policies over a time-triggered communication channel. Optimization strategies for the bus access scheme are developed, and the four approaches to message scheduling are compared using extensive experiments....

  12. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  13. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  14. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  15. A Distributed Metadata Management, Data Discovery and Access System

    CERN Document Server

    Palanisamy, Giriprakash; Green, Jim; Wilson, Bruce

    2010-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, among other features. Mercury provides a single portal to information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fa...

  16. An Information System to Access Status Information of the LHCb Online

    Science.gov (United States)

    Frank, M.; Gaspar, C.

    2012-12-01

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  17. Rules and access rights of the Estonian integrated e-Health system.

    Science.gov (United States)

    Tiik, Madis

    2010-01-01

    There should be a clear understanding that when implementing an electronic health record system (EHR), one of the hardest problems we have to solve is the access rights. In Estonia this process lasted for three years and involved all stakeholders of the healthcare sector. Special ethical committee was established to advise the decision makers and doctors to help them understand the ethical dilemmas from the patient's and society's point of view. In this article you will find a short overview of the access rights of the system, roles of the healthcare systems' employees. Descriptions of some specific situations like underage patients and representation of patient with restricted active legal capacity.

  18. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  19. 28 CFR 16.99 - Exemption of the Immigration and Naturalization Service Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Immigration and....99 Exemption of the Immigration and Naturalization Service Systems-limited access. (a) The following systems of records of the Immigration and Naturalization Service are exempt from 5 U.S.C. 552a (c) (3)...

  20. Experimental grid access for dynamic discovery and data transfer in distributed interactive simulation systems

    NARCIS (Netherlands)

    A. Tirado-Ramos; K. Zajac; Z. Zhao; P.M.A. Sloot; G.D. van Albada; M. Bubak

    2003-01-01

    Interactive Problem Solving Environments (PSEs) offer an integrated approach for constructing and running complex systems, such as distributed simulation systems. New distributed infrastructures, like the Grid, support the access to a large variety of core services and resources that can be used by

  1. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2007-01-01

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  2. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to b

  3. Environmental Information Management For Data Discovery and Access System

    Science.gov (United States)

    Giriprakash, P.

    2011-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source software and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007 and released in early 2008. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, and ready customization to meet the needs of the multiple projects which use Mercury. For the end users, Mercury provides a single portal to very quickly search for data and information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow ! the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fast search results to the user, while allowing data providers to advertise the availability of their data and maintain complete control and ownership of that data.

  4. A High Speed Mobile Courier Data Access System That Processes Database Queries in Real-Time

    Science.gov (United States)

    Gatsheni, Barnabas Ndlovu; Mabizela, Zwelakhe

    A secure high-speed query processing mobile courier data access (MCDA) system for a Courier Company has been developed. This system uses the wireless networks in combination with wired networks for updating a live database at the courier centre in real-time by an offsite worker (the Courier). The system is protected by VPN based on IPsec. There is no system that we know of to date that performs the task for the courier as proposed in this paper.

  5. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  6. Accessing Multi-Source Geological Data through Network in MORPAS Software System

    Institute of Scientific and Technical Information of China (English)

    Mei Hongbo; Hu Guangdao; Chen Jianguo; Li Zhenhua

    2003-01-01

    MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.

  7. 77 FR 62346 - Holiday CVS, L.L.C., d/b/a CVS/Pharmacy Nos. 219 and 5195; Denial of Request for Redactions

    Science.gov (United States)

    2012-10-12

    .../a CVS/Pharmacy Nos. 219 and 5195; Denial of Request for Redactions On August 31, 2012, I issued a... Holiday CVS, L.L.C., d/b/a CVS/Pharmacy Nos. 219 and 5195 (hereinafter, Respondents). Prior to publication... manner in which information was obtained for Respondents' pharmacy information management system...

  8. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway.

    Science.gov (United States)

    García, Carmelo R; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Pérez, Ricardo; Alayón, Francisco

    2015-08-18

    The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  9. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  10. Development of a Multidimensional Additive Points System for Determining Access to Rheumatology Services.

    Science.gov (United States)

    White, Douglas; Solanki, Kamal; Quincey, Vicki; Minett, Andrew; Tam, Gordon; Doube, Alan; Naden, Ray

    2015-08-01

    In many countries, including New Zealand, the demand for rheumatology services exceeds their supply, resulting in some patients experiencing long delays or being denied access. The principal aim of this work was to create a validated, transparent, and fair system for determining access to rheumatology services. A panel of 5 rheumatologists, 6 primary care physicians, and 4 nurse specialists ranked a series of 25 clinical scenarios in order of priority to see a rheumatologist. Important determining factors were weighted in an iterative process to generate a multidimensional additive point score to determine access to rheumatology service. The score comprises 6 domains of 2 to 4 items weighted to give a total score out of 100. The effect of the problem on the patient's life and role, the presence of an inflammatory rheumatic disease, appropriateness of current treatment, and the ability of the rheumatologist to influence the current symptoms and future prognosis were felt to be critical factors in determining access to the service. The score showed a strong correlation with the rankings agreed by the clinical panel, and the overall intraclass correlation coefficient for the rheumatologists was 0.698. Our score has face validity, is easy to perform, and has been assessed by an independent panel of rheumatologists as providing a fair system for determining access to rheumatology services. The system is acceptable to primary care physicians and has been adopted by our local primary care organizations.

  11. Error correction coding for frequency-hopping multiple-access spread spectrum communication systems

    Science.gov (United States)

    Healy, T. J.

    1982-01-01

    A communication system which would effect channel coding for frequency-hopped multiple-access is described. It is shown that in theory coding can increase the spectrum utilization efficiency of a system with mutual interference to 100 percent. Various coding strategies are discussed and some initial comparisons are given. Some of the problems associated with implementing the type of system described here are discussed.

  12. Transparent image access in a distributed picture archiving and communications system: The master database broker

    OpenAIRE

    Cox, R D; Henri, C. J.; Rubin, R. K.

    1999-01-01

    A distributed design is the most cost-effective system for small- to medium-scale picture archiving and communications systems (PACS) implementations. However, the design presents an interesting challenge to developers and implementers: to make stored image data, distributed throughout the PACS network, appear to be centralized with a single access point for users. A key component for the distributed system is a central or master database, containing all the studies that have been scanned int...

  13. Quality Test Template toward Multi-user Access Control of Internet-Based System

    Directory of Open Access Journals (Sweden)

    Nan Nie

    2011-06-01

    Full Text Available Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

  14. Request Stream Control for the Access to Broadband Multimedia Educational Resources in the Distance Learning System

    Directory of Open Access Journals (Sweden)

    Irina Pavlovna Bolodurina

    2013-10-01

    Full Text Available This article presents a model of queuing system for broadband multimedia educational resources, as well as a model of access to a hybrid cloud system storage. These models are used to enhance the efficiency of computing resources in a distance learning system. An additional OpenStack control module has been developed to achieve the distribution of request streams and balance the load between cloud nodes.

  15. Using geographic information system tools to improve access to MS specialty care in Veterans Health Administration.

    Science.gov (United States)

    Culpepper, William J; Cowper-Ripley, Diane; Litt, Eric R; McDowell, Tzu-Yun; Hoffman, Paul M

    2010-01-01

    Access to appropriate and timely healthcare is critical to the overall health and well-being of patients with chronic diseases. In this study, we used geographic information system (GIS) tools to map Veterans Health Administration (VHA) patients with multiple sclerosis (MS) and their access to MS specialty care. We created six travel-time bands around VHA facilities with MS specialty care and calculated the number of VHA patients with MS who resided in each time band and the number of patients who lived more than 2 hours from the nearest specialty clinic in fiscal year 2007. We demonstrate the utility of using GIS tools in decision-making by providing three examples of how patients' access to care is affected when additional specialty clinics are added. The mapping technique used in this study provides a powerful and valuable tool for policy and planning personnel who are evaluating how to address underserved populations and areas within the VHA healthcare system.

  16. Seed quality of common bean accessions under organic and conventional farming systems

    Directory of Open Access Journals (Sweden)

    Diego Medeiros Gindri

    2017-06-01

    Full Text Available Agrobiodiversity is essential for a sustainable food production, and the knowledge of the potential characteristics of landrace seeds may prompt farmers to adopt the habit of seed conservation for this species. This study aimed at categorizing landrace and commercial common bean (Phaseolus vulgaris L. accessions, according to the physiological quality (viability and vigor of seeds produced in the field, during two growing seasons, under organic and conventional farming systems. Germination percentage, field emergence, electrical conductivity, accelerated aging, cold test and seedling length were assessed. The landrace bean accessions exhibit diversity in the physiological seed quality, in terms of their viability and vigor. No differences were observed between the farming systems, in relation to the physiological quality of the seeds produced. The categorization of landrace common bean accessions allows to identify those with superior physiological seed quality.

  17. 49 CFR 37.185 - Fleet accessibility requirement for OTRB fixed-route systems of large operators.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Fleet accessibility requirement for OTRB fixed....185 Fleet accessibility requirement for OTRB fixed-route systems of large operators. Each large... percent of the buses in its fleet with which it provides fixed-route service are readily accessible to...

  18. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    Science.gov (United States)

    2001-10-01

    digital commerce , but some researchers have also looked at the use of payment schemes as a means of mitigating denials of service. Fungible (or...transferable) digital payment schemes range from anonymous cash schemes such as David Chaum’s Digicash [Digi] [Cha83], to electronic checks and...Markup WGs, www.w3.org/ ECommerce /Micro-payments/ [Milli] Compaq Millicent, www.millicent.digital.com [Pay] PayPal, www.paypal.com [NS2] NS-2

  19. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  20. Impact Analysis of Denial of Service (DoS due to Packet Flooding

    Directory of Open Access Journals (Sweden)

    Dr. Deepak Arora

    2014-06-01

    Full Text Available In the current scenario, it is noticed that when a server reached to its threshold value then there is situation of packet flooding. Flooding can arise in two ways first when many user make request to the server at same instant of time and other when a single user makes a huge number of requests intentionally to jam the network traffic for that particular server. This intentionally arise situation is called as Denial of Service (DoS attack. DoS attacks are gigantic threat to internet users and websites. Distributed Denial of Service (DDoS is an improvised approach for restricting the legitimate users to use intended service. DDoS attacker uses software vulnerabilities of other computer system on the network in order to setup the attacking network for the victim. In this paper, the focus will be on the behavior of server or victim machine regarding various parameters under DoS attack by using LAN network simulated on OPNET Modeler. It provides model families, that can be used for simulation and record various parameters as realistic value.

  1. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  2. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  3. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Rotger, Gabriel Pons; Sick Nielsen, Thomas

    2015-01-01

    and Metro system due to the construction of a new terminal Metro station connecting southern townships to the city centre of Copenhagen. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  4. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    Science.gov (United States)

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  5. 28 CFR 16.92 - Exemption of Environment and Natural Resources Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ....92 Exemption of Environment and Natural Resources Division Systems—limited access. (a)(1) The...) Environment and Natural Resources Division Case and Related Files System, JUSTICE/ENRD-003. (ii) (2) These..., the applicable exemption may be waived by the Environment and Natural Resources Division. (b)...

  6. An API-based search system for one click access to information

    NARCIS (Netherlands)

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    2013-01-01

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  7. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    Science.gov (United States)

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  8. The integration of open access journals in the scholarly communication system: Three science fields

    DEFF Research Database (Denmark)

    Faber Frandsen, Tove

    2009-01-01

    The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences...

  9. Accessibility Evaluation of Online Learning Management System for Persons with Visual Impairment

    Science.gov (United States)

    Suwannawut, Nantanoot

    2014-01-01

    Many academic institutions around the world are utilizing and investing in online learning management systems (LMS). While several research studies have examined the functionality of this type of technology, little attention has been paid to accessibility issues, in particular to the complex web-based interfaces for learners with disabilities,…

  10. Massive M2M Access with Reliability Guarantees in LTE Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals...

  11. 28 CFR 16.80 - Exemption of Office of Professional Responsibility System-limited access.

    Science.gov (United States)

    2010-07-01

    ....80 Exemption of Office of Professional Responsibility System—limited access. (a) The following system...), (e)(5) and (8), (f) and (g): (1) Office of Professional Responsibility Record Index (JUSTICE/OPR-001... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of Professional...

  12. Greece's health crisis: from austerity to denialism.

    Science.gov (United States)

    Kentikelenis, Alexander; Karanikolos, Marina; Reeves, Aaron; McKee, Martin; Stuckler, David

    2014-02-22

    Greece's economic crisis has deepened since it was bailed out by the international community in 2010. The country underwent the sixth consecutive year of economic contraction in 2013, with its economy shrinking by 20% between 2008 and 2012, and anaemic or no growth projected for 2014. Unemployment has more than tripled, from 7·7% in 2008 to 24·3% in 2012, and long-term unemployment reached 14·4%. We review the background to the crisis, assess how austerity measures have affected the health of the Greek population and their access to public health services, and examine the political response to the mounting evidence of a Greek public health tragedy.

  13. Design and Implementation of File Access and Control System Based on Dynamic Web

    Institute of Scientific and Technical Information of China (English)

    GAO Fuxiang; YAO Lan; BAO Shengfei; YU Ge

    2006-01-01

    A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained.

  14. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  15. Health and healthcare access among Zambia's female prisoners: a health systems analysis.

    Science.gov (United States)

    Topp, Stephanie M; Moonga, Clement N; Mudenda, Constance; Luo, Nkandu; Kaingu, Michael; Chileshe, Chisela; Magwende, George; Heymann, Jody S; Henostroza, German

    2016-09-26

    Research exploring the drivers of health outcomes of women who are in prison in low- and middle-income settings is largely absent. This study aimed to identify and examine the interaction between structural, organisational and relational factors influencing Zambian women prisoners' health and healthcare access. We conducted in-depth interviews of 23 female prisoners across four prisons, as well as 21 prison officers and health care workers. The prisoners were selected in a multi-stage sampling design with a purposive selection of prisons followed by a random sampling of cells and of female inmates within cells. Largely inductive thematic analysis was guided by the concepts of dynamic interaction and emergent behaviour, drawn from the theory of complex adaptive systems. We identified compounding and generally negative effects on health and access to healthcare from three factors: i) systemic health resource shortfalls, ii) an implicit prioritization of male prisoners' health needs, and iii) chronic and unchecked patterns of both officer- and inmate-led victimisation. Specifically, women's access to health services was shaped by the interactions between lack of in-house clinics, privileged male prisoner access to limited transport options, and weak responsiveness by female officers to prisoner requests for healthcare. Further intensifying these interactions were prisoners' differential wealth and access to family support, and appointments of senior 'special stage' prisoners which enabled chronic victimisation of less wealthy or less powerful individuals. This systems-oriented analysis revealed how Zambian women's prisoners' health and access to healthcare is influenced by weak resourcing for prisoner health, administrative biases, and a prevailing organisational and inmate culture. Findings highlight the urgent need for investment in structural improvements in health service availability but also interventions to reform the organisational culture which shapes

  16. Combinatory Spread—Spectrum Multiple—Access Based on Residue Number System:System and Performance

    Institute of Scientific and Technical Information of China (English)

    YangLieliang; LiChengshu

    1995-01-01

    A combinatory direct-sequence based on residue number system(RNS),spread spec-trum multiple-access communication system model is presented.Under this communication envi-ronment,each user is assigned a set of∑i=1lmi(when i≠j,gcd(mi,mj)=1)othogonal sequences;Each receiver has ∑i=1l micorrelators used for despread,log2(пi=1lmi) information bits can be trans-mitted in a symbol period.We obtain approximations for the multiuser probability of error when the channel noise is a combination of additive white Gaussian noise (AWGN)and multiple-access interference .In section4,we compare the performance such as transmission capability,system structure,and the probability of error with the system proposed by P.K.Enge.

  17. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  18. Closed Catheter Access System Implementation in Reducing Bloodstream Infection Rate in Low Birth Weight Preterm Infants

    Directory of Open Access Journals (Sweden)

    Lily eRundjan

    2015-03-01

    Full Text Available Background Bloodstream infection (BSI is one of the significant causes of morbidity and mortality encountered in a neonatal intensive care unit (NICU, especially in developing countries. Despite the implementation of infection control practices, such as strict hand hygiene, the BSI rate in our hospital is still high. The use of a closed catheter access system to reduce BSI related to intravascular catheter has hitherto never been evaluated in our hospital. Objective To determine the effects of closed catheter access system implementation in reducing the BSI rate in preterm neonates with low birth weight.Methods Randomized clinical trial was conducted on 60 low birth weight preterm infants hospitalized in the neonatal unit at Cipto Mangunkusumo Hospital, Jakarta, Indonesia from June to September, 2013. Randomized subjects either received a closed or non-closed catheter access system. Subjects were monitored for 2 weeks for the development of BSI based on clinical signs, abnormal infection parameters, and blood culture. Results Closed catheter access system implementation gave a protective effect towards the occurrence of culture-proven BSI (relative risk 0.095, 95% CI 0.011 to 0.85, p=0.026. Risk of culture-proven BSI in the control group was 10.545 (95% CI 1.227 to 90.662, p=0.026. BSI occurred in 75% of neonates without risk factors of infection in the control group compared to none in the study group.Conclusions The use of a closed catheter access system reduced the BSI in low birth weight preterm infants. Choosing the right device design, proper disinfection of device and appropriate frequency of connector change should be done simultaneously.

  19. Research and teaching access to a large clinical picture archiving and communication system

    OpenAIRE

    Harrison, Marc; Koh, Justin; Tran, Steven; Mongkolwat, Patanasak; Channin, David S.

    2001-01-01

    Purpose: To identify practical issues surrounding delivering digital images from picture archiving and communication systems (PACS) for research and teaching purposes. The complexity of Digital Imaging and Communications in Medicine (DICOM) access methods, security, patient confidentiality, PACS database integrity, portability, and scalability are discussed. A software prototype designed to resolve these issues is described.System Architecture: A six-component, three-tier, client server softw...

  20. A Novel Memory Structure for Embedded Systems: Flexible Sequential and Random Access Memory

    Institute of Scientific and Technical Information of China (English)

    Ying Chen; Karthik Ranganathan; Vasudev V. Pai; David J. Lilja; Kia Bazargan

    2005-01-01

    The on-chip memory performance of embedded systems directly affects the system designers' decision about how to allocate expensive silicon area. A novel memory architecture, flexible sequential and random access memory (FSRAM),is investigated for embedded systems. To realize sequential accesses, small "links" are added to each row in the RAM array to point to the next row to be prefetched. The potential cache pollution is ameliorated by a small sequential access buffer (SAB). To evaluate the architecture-level performance of FSRAM, we ran the Mediabench benchmark programs on a modified version of the SimpleScalar simulator. Our results show that the FSRAM improves the performance of a baseline processor with a 16KB data cache up to 55%, with an average of 9%; furthermore, the FSRAM reduces 53.1% of the data cache miss count on average due to its prefetching effect. We also designed RTL and SPICE models of the FSRAM, which show that the FSRAM significantly improves memory access time, while reducing power consumption, with negligible area overhead.

  1. Building a foundation for systems change: increasing access to physical activity programs for older adults.

    Science.gov (United States)

    Lachenmayr, Sue; Mackenzie, Geraldine

    2004-10-01

    Although 25% of U.S. adults are physically inactive, this percentage increases dramatically for older adults. Organizational change theory guided a state health department in identifying system gaps and developing strategies to expand programming for seniors. A survey of provider agencies in New Jersey assessed (a) capacity for physical activity programs for older adults, (b) accessibility of programs, and (c) barriers to providing programs. One hundred sixty agencies provided physical activity programs to almost 184,000 individuals annually. Fewer than one half of the agencies provided exercise programs for people with disabilities, and only 44% provided in-home programs. Eighty-two percent of program providers wanted to expand programming but cited lack of trained instructors and peer leaders, inadequate facility space, insufficient funding, and limited transportation resources as barriers. Sustaining older adult behavior change requires infrastructure that will ensure access to diverse physical activities. This article provides strategies to expand access to physical activity programs for older adults.

  2. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  3. What’s blocking sustainability? Human nature, cognition, and denial

    Directory of Open Access Journals (Sweden)

    William Rees

    2010-10-01

    Full Text Available In 1992, 1,700 of the world’s top scientists issued a public statement titled The World Scientists’ Warning to Humanity. They reported that “a great change in our stewardship of the Earth and the life on it is required if vast human misery is to be avoided and our global home on this planet is not to be irretrievably mutilated.” More than a decade later, the authors of the Millennium Ecosystem Assessment were moved to echo the scientists’ warning asserting that “[h]uman activity is putting such a strain on the natural functions of the Earth that the ability of the planet’s ecosystems to sustain future generations can no longer be taken for granted.” Ours is allegedly a science-based culture. For decades, our best science has suggested that staying on our present growth-based path to global development implies catastrophe for billions of people and undermines the possibility of maintaining a complex global civilization. Yet there is scant evidence that national governments, the United Nations, or other official international organizations have begun seriously to contemplate the implications for humanity of the scientists’ warnings, let alone articulate the kind of policy responses the science evokes. The modern world remains mired in a swamp of cognitive dissonance and collective denial seemingly dedicated to maintaining the status quo. We appear, in philosopher Martin Heidegger’s words, to be “in flight from thinking.” Just what is going on here? I attempt to answer this question by exploring the distal, biosocial causes of human economic behavior. My working hypothesis is that modern H. sapiens is unsustainable by nature—unsustainability is an inevitable emergent property of the systemic interaction between contemporary technoindustrial society and the ecosphere. I trace this conundrum to humanity’s once-adaptive, subconscious, genetic predisposition to expand (shared with all other species, a tendency reinforced by

  4. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    Science.gov (United States)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  5. Open Access Intellectual Property Systems: A Comparison to Commercial Solutions in Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    Jan Cerny

    2016-07-01

    Full Text Available ICT/IS management plays an important role within the framework of innovation management, and one of the key elements of this role is the support of Competitive Intelligence in the context of innovation processes. The strategic information needs of innovation management are also directed towards different kinds of intellectual property (IP information entities and commercialization. The purpose of this paper is to define these entities and IP information systems as an important part of a company’s Competitive Intelligence Unit for competitor analysis and technology trends. The open access IP information systems will be analysed together with commercial solutions.. The aim of this paper is to underline the importance of open access IP systems compared to added value commercial solutions for competitive intelligence purposes for SMEs. The comparison will be carried out using examples of patent searches within a concrete dataset.

  6. Discovery of abundant, accessible hydrocarbons nearly everywhere in the solar system

    Energy Technology Data Exchange (ETDEWEB)

    Zuppero, A.

    1996-05-01

    analysis of the data gathered during the Comet Halley encounter during 1987 resulted in a body of literature asserting that all comets contain substantial percentages of hydrocarbon solids. These solids appear to have a strong similarity to petrochemicals. Arguments are made that the amount of hydrocarbon material in the accessible comets of the inner Solar system can substantially exceed the known reserves of hydrocarbons on Earth. An example is given of at least one conceptually simple method to use comet material as feedstock for space transportation schemes that can move masses through the solar system comparable to the mass carried by oil supertankers. The presentation concludes we need to send prospecting and assay probes to a sampling of the accessible comets to determine the amount of hydrocarbons and the form and location of materials needed for space transportation systems.

  7. Performance Analysis of Slotted Random Access DS-CDMA Systems with Multipacket Reception

    Institute of Scientific and Technical Information of China (English)

    ZHANGJidong; XULi; ZHENGBaoyu; XIAOHaiyong

    2004-01-01

    Multiple packets reception (MPR) is a new method to improve the network performance. If a node in the network has the capability of MPR, the node can receive multiple packets simultaneously, not to discard all the packets like the traditional method. In this paper, Bit error rate (BER) for direct-sequence spread spectrum multiple access system over Rice fading channel is considered, based on the standard Gaussian approximation, and the explicit close-form expression for BER is provided, which is expressed by a single integral. Moreover, the performance of random multiple access in the Direct-sequence code division multiple access (DS-CDMA) system with the capability of multiple packets reception is analyzed over Gaussian channel Rayleigh fading channel and Rice fad-ing channel, respectively, where the multiple packets reception is obtained by the method of match filter. The simulation results show that the MPR capability improves the throughput of DS-CDMA system greatly, compared with the conventional single packet reception. The system has the maximum throughput when signals are transmitted over the Gaussian channel. Also, the impact of Signal-to-noise ratio (SNR), channel coding and the traffic arrival model on the throughput of DS-CDMA system is given in the simulation and the analysis for the simulation results is provided.

  8. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  9. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-01-01

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption. PMID:27657096

  10. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, C.L.; O' Rourke, J.E.; Allirot, D.; O' Connor, K.

    1980-09-01

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report.

  11. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Directory of Open Access Journals (Sweden)

    Line Neerup Handlos

    2016-09-01

    Full Text Available Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  12. Defense and cleaning system for Distributed Denial of Service (DDoS) attacks%大规模拒绝服务(DDoS)攻击的防御与清洗系统

    Institute of Scientific and Technical Information of China (English)

    李振兴; 王萌; 李光程; 陈炫慧; 卢文静

    2016-01-01

    Firstly, the selection, representation, analysis and model solution of DDoS attack feature are established. Then, proceeding from this, the DDoS attack defense method based on the variable threshold constraint of sensitive access parameters is also provided. Finally, the DDoS attack traffic cleaning technique based on the variable probability mark is studied.%首先建立DDoS攻击特征的选择、表示、分析以及模型求解。然后,在此基础上研究基于敏感访问参数可变阈值约束的DDoS攻击防御方法。最后,研究基于可变概率标记的DDoS攻击流量清洗技术。

  13. Retention in a public health care system with free access to treatment

    DEFF Research Database (Denmark)

    Helleberg, Marie; Engsig, Frederik N; Kronborg, Gitte;

    2012-01-01

    OBJECTIVE:: We aimed to assess retention of HIV infected individuals in the Danish health care system over a 15-year period. METHODS:: Loss to follow-up (LTFU) was defined as 365 days without contact to the HIV care system. Data were obtained from the nationwide Danish HIV Cohort study, The Danis......, especially after initiation of HAART. Absence from HIV care is associated with increased mortality. We conclude that high rates of retention can be achieved in a health care system with free access to treatment and is associated with a favorable outcome....

  14. Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features

    Directory of Open Access Journals (Sweden)

    Prathamesh Timse

    2014-04-01

    Full Text Available This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition system when an unknown person is being detected, wherein the system will send an email to the owner of the system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a Dropbox [8] account.

  15. Can a self-referral system help improve access to psychological treatments?

    Science.gov (United States)

    Brown, June S L; Boardman, Jed; Whittinger, Naureen; Ashworth, Mark

    2010-05-01

    Referrals for psychological treatment have been problematic for many years. Even though GPs have attempted to limit access into the small psychological treatment services, long waiting lists have developed which have deterred referrals and deferred psychological care. GPs have understandably been frustrated. In addition, the consultation rate for psychological problems is low when compared with the rate of identified mental health problems in population surveys. Possible reasons include patients' failure to recognise the problem as psychological and thus not consulting one's GP, and/or the problem not being detected by the GP. While a self-referral system may be seen as a way of trying to allow non-consulters to receive treatment, this has been viewed with some scepticism since it may allow the 'worried well' to access already limited services. However, a study has shown that those self-referring to advertised psychological workshops had high levels of psychological morbidity and also were more representative of the population, in terms of ethnicity, than GP referrals. The government has set up the Increasing Access to Psychological Therapies (IAPT) programme to address some of the service shortfalls by expanding the provision of psychological therapists. Notably, the IAPT programme is allowing self-referrals such that any member of the public can access the service directly, bypassing general practice. Although not available at all the sites, this represents a radical shift from the present system in which access to talking therapy is generally only available through direct referral by the GP. The implications of this new development are discussed.

  16. Security Camera System can be access into mobile with internet from remote place

    Directory of Open Access Journals (Sweden)

    Dr. Khanna SamratVivekanand Omprakash

    2012-01-01

    Full Text Available This paper represents how camera can captured the images and video into the database and then it may transformed to the mobile with help of Internet. Developing mobile applications how the data can be viewed on the mobile from the remote place. By assigning real IP to the storage device from ISP and connected to the internet . Developing mobile applications on windows mobile which runs only on the windows mobile . Wireless camera in terms of 4 , 8, 12, 16 are connected with the system. Windows based application develop for 4 , 8 , 12,16 channels to see at a time on desktop computer . The PC is connected with internet and having Client server application which is connected to the Windows Web hosting Server through the internet. With the help of ISP server we can assign IP to the Window Web Server with domain name . Domain name will be access from the world. By developing mobile applications on web we can access it on mobile . Separate setup of windows .exe develop for the Windows Mobile phone to access the information from the server. Client setup can be installed on the mobile and it fetches the data from server and server is based on real IP with domain name and connected with Internet . Digital Wireless cameras are connected & data is stored in Digital Video Recorder having 1 Terabyte of hard disk with different channel like 4, 8, 12,16. We can see Video output in mobile by installing the client setup or by accessing directly from web browser which supports the application for mobile. The beauty of this software is that we can access security camera system into the mobile with internet from remote place.

  17. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  18. A web accessible scientific workflow system for vadoze zone performance monitoring: design and implementation examples

    Science.gov (United States)

    Mattson, E.; Versteeg, R.; Ankeny, M.; Stormberg, G.

    2005-12-01

    Long term performance monitoring has been identified by DOE, DOD and EPA as one of the most challenging and costly elements of contaminated site remedial efforts. Such monitoring should provide timely and actionable information relevant to a multitude of stakeholder needs. This information should be obtained in a manner which is auditable, cost effective and transparent. Over the last several years INL staff has designed and implemented a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition from diverse sensors (geophysical, geochemical and hydrological) with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic javascript and html/css) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This system has been implemented and is operational for several sites, including the Ruby Gulch Waste Rock Repository (a capped mine waste rock dump on the Gilt Edge Mine Superfund Site), the INL Vadoze Zone Research Park and an alternative cover landfill. Implementations for other vadoze zone sites are currently in progress. These systems allow for autonomous performance monitoring through automated data analysis and report generation. This performance monitoring has allowed users to obtain insights into system dynamics, regulatory compliance and residence times of water. Our system uses modular components for data selection and graphing and WSDL compliant webservices for external functions such as statistical analyses and model invocations. Thus, implementing this system for novel sites and extending functionality (e.g. adding novel models) is relatively straightforward. As system access requires a standard webbrowser

  19. Hate in the Classroom: Free Expression, Holocaust Denial, and Liberal Education

    Science.gov (United States)

    Cohen-Almagor, Raphael

    2008-01-01

    This article is concerned with a specific type of hate speech: Holocaust denial. It is concerned with the expression of this idea by educators. Should we allow Holocaust deniers to teach in schools? This article attempts to answer this question through a close look at the Canadian experience. First, I will establish that Holocaust denial is a…

  20. 42 CFR 442.118 - Denial of payments for new admissions to an ICF/MR.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Denial of payments for new admissions to an ICF/MR... of payments for new admissions to an ICF/MR. (a) Basis for denial of payments. The Medicaid agency may deny payment for new admissions to an ICF/MR that no longer meets the applicable conditions of...

  1. Cognitive dissonance as an explanation of the genesis, evolution and persistence of Thabo Mbeki's HIV denialism.

    Science.gov (United States)

    Kenyon, Chris

    2008-05-01

    The ongoing damage that the newer forms of HIV denialism are visiting upon our country is evidenced by the recent firing of Nozizwe Madlala-Routledge, the South African Deputy Minister of Health. It is widely believed that the underlying reason for her dismissal was her support of orthodox HIV treatment and prevention strategies and her disdain for HIV denialism. This paper seeks to understand the origins, spread and metamorphosis of President Thabo Mbeki's HIV denialism in South Africa. Using the theory of cognitive dissonance, I argue that, given the structural beliefs of the African National Congress (ANC) and the pattern of emergence of HIV in the 1980s, a degree of scepticism around the putative science of HIV was probable in ANC circles. On assuming the Presidency in 1999, Mbeki tapped into this scepticism to formulate his initial biological version of HIV denialism, which claimed that 'a virus can't cause a syndrome.' The steady erosion of support for this flagrant HIV denialism, together with the rise of neoliberal thinking in the ANC, would lead to the evolution of this biological denialism into a form of treatment denialism. This ideology argued against the widespread provision and use of antiretroviral treatment. Empirical evidence is presented to demonstrate the extent to which ongoing HIV denial in the general population is continuing to fuel the spread of HIV.

  2. 77 FR 56701 - Morgan Olson, LLC, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2012-09-13

    ... Administration [Docket No. NHTSA-2012-0028; Notice 2] Morgan Olson, LLC, Denial of Petition for Decision of... Petition Denial. SUMMARY: Morgan Olson, LLC (Morgan Olson),\\1\\ has determined that certain model year 2009, 2010, and 2011 Morgan Olson walk-in van-type trucks having a gross vehicle weight rating (GVWR) over...

  3. 26 CFR 1.585-5 - Denial of bad debt reserves for large banks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Denial of bad debt reserves for large banks. 1...) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions § 1.585-5 Denial of bad debt... other section for an addition to a reserve for bad debts. However, for these years, except as...

  4. Hate in the Classroom: Free Expression, Holocaust Denial, and Liberal Education

    Science.gov (United States)

    Cohen-Almagor, Raphael

    2008-01-01

    This article is concerned with a specific type of hate speech: Holocaust denial. It is concerned with the expression of this idea by educators. Should we allow Holocaust deniers to teach in schools? This article attempts to answer this question through a close look at the Canadian experience. First, I will establish that Holocaust denial is a…

  5. 34 CFR 5.80 - Review of denial of a record.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Review of denial of a record. 5.80 Section 5.80 Education Office of the Secretary, Department of Education AVAILABILITY OF INFORMATION TO THE PUBLIC PURSUANT TO PUB. L. 90-23 (Eff. until 7-14-10) Administrative Review § 5.80 Review of denial of a...

  6. ANOMALY BASED APPROACH FOR DEFENDING DENIAL OF SERVICE ATTACK IN WEB TRAFFIC

    Directory of Open Access Journals (Sweden)

    R. Ramkumar

    2015-10-01

    Full Text Available Distributed Denial of Service (DDOS attacks has become a great threat for internet security. This attackis an advanced form of DOS (Denial of Service attack. This attack changes its whole origin ID and it gives trouble to find it out and it has become a serious threat for internet security.

  7. 19 CFR 181.71 - Denial of preferential tariff treatment dependent on origin verification and determination.

    Science.gov (United States)

    2010-04-01

    ... FREE TRADE AGREEMENT Origin Verifications and Determinations § 181.71 Denial of preferential tariff... 19 Customs Duties 2 2010-04-01 2010-04-01 false Denial of preferential tariff treatment dependent...) of this part, Customs shall deny preferential tariff treatment on an imported good, or shall deny...

  8. 42 CFR 431.223 - Denial or dismissal of request for a hearing.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Denial or dismissal of request for a hearing. 431.223 Section 431.223 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND... Fair Hearings for Applicants and Recipients Right to Hearing § 431.223 Denial or dismissal of...

  9. Low-Cost Encoding Device for Optical Code Division Multiple Access System

    OpenAIRE

    Mohammad S. Ab-Rahman; Boonchuan Ng; Norshilawati M. Ibrahim; Sahbudin Shaari

    2009-01-01

    Problem statement: Instead of using Fiber Bragg Grating (FBG) to develop the coded spectrums, which consist of expensive elements, the grating also are highly sensitive to environmental changes and this will contribute to the increment of capital and operational expenditures (CAPEX and OPEX). Approach: This study presented the development of low-cost 16-ports encoding device for Optical Code Division Multiple Access (OCDMA) systems based on Arrayed Waveguide Grating (AWG) devices and optical ...

  10. Osiris: accessible and reproducible phylogenetic and phylogenomic analyses within the Galaxy workflow management system

    OpenAIRE

    2014-01-01

    Background Phylogenetic tools and ‘tree-thinking’ approaches increasingly permeate all biological research. At the same time, phylogenetic data sets are expanding at breakneck pace, facilitated by increasingly economical sequencing technologies. Therefore, there is an urgent need for accessible, modular, and sharable tools for phylogenetic analysis. Results We developed a suite of wrappers for new and existing phylogenetics tools for the Galaxy workflow management system that we call Osiris. ...

  11. An Acquisition Performance Analysis of DS-MC-CDMA System under Multiple Access Interference Conditions

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Multi-Access Interference's (MAI's) effect on parallel acquisition performance of DS-Multi-carrier CDMA system under the typical indoor radio channel is discussed in the paper. Moreover, a comparison of acquisition performance impairment produced by the MAI in DS-MC-CDMA and DS-Single-carrier CDMA is also made. Results are given in terms of average acquisition time obtained by means of simulations and theory analysis.

  12. 42 CFR 442.119 - Duration of denial of payments and subsequent termination of an ICF/MR.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Duration of denial of payments and subsequent termination of an ICF/MR. 442.119 Section 442.119 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... § 442.119 Duration of denial of payments and subsequent termination of an ICF/MR. (a) Period of denial...

  13. Denial of reward in the neonate shapes sociability and serotonergic activity in the adult rat.

    Directory of Open Access Journals (Sweden)

    Anastasia Diamantopoulou

    Full Text Available BACKGROUND: Manipulations of the early environment are linked to long-lasting alterations of emotionality and social capabilities. Denial of rewarding mother-pup interactions in early life of rats could serve as model for child neglect. Negative consequences for social competence in later life, accompanied by changes in the serotonergic system would be expected. In contrast, rewarding mother-pup contact should promote adequate social abilities. METHODOLOGY/PRINCIPAL FINDINGS: Male Wistar rats trained in a T-maze during postnatal days 10-13 under denial (DER or permission (RER of maternal contact were tested for play behavior in adolescence and for coping with defeat in adulthood. We estimated serotonin (5-HT levels in the brain under basal conditions and following defeat, as well as serotonin receptor 1A (5-HT1A and serotonin transporter (SERT expression. DER rats exhibited increased aggressive-like play behavior in adolescence (i.e. increased nape attacks, p<0.0001 and selected a proactive coping style during defeat in adulthood (higher sum of proactive behaviors: number of attacks, flights, rearings and defensive upright posture; p = 0.011, p<0.05 vs RER, non-handled-NH. In adulthood, they had lower 5-HT levels in both the prefrontal cortex (p<0.05 vs RER and the amygdala (p<0.05 vs NH, increased 5-HT levels following defeat (PFC p<0.0001 and decreased serotonin turnover (amygdala p = 0.008. The number of 5-HT1A immunopositive cells in the CA1 hippocampal area was increased (p<0.05 DER, vs RER, NH; SERT levels in the amygdala were elevated (p<0.05 vs RER, NH, but were lower in the prefrontal cortex (p<0.05 vs NH. CONCLUSIONS/SIGNIFICANCE: Denial of expected maternal reward early in life negatively affects sociability and the serotonergic system in a complex manner. We propose that our animal model could contribute to the identification of the neurobiological correlates of early neglect effects on social behavior and coping with challenges, but

  14. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Directory of Open Access Journals (Sweden)

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  15. Frequency-selective design of wireless power transfer systems for controlled access applications

    Science.gov (United States)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  16. GAPforAPE: an augmented browsing system to improve Web 2.0 accessibility

    Science.gov (United States)

    Mirri, Silvia; Salomoni, Paola; Prandi, Catia; Muratori, Ludovico Antonio

    2012-09-01

    The Web 2.0 evolution has spread more interactive technologies which affected accessibility for users who navigate the Web by using assistive technologies. In particular, the partial download of new data, the continuous refreshing, and the massive use of scripting can represent significant barriers especially for people with visual impairments, who enjoy the Web by means of screen readers. On the other hand, such technologies can be an opportunity, because they can provide a new means of transcoding Web content, making the Web more accessible. In this article we present GAPforAPE, an augmented browsing system (based on Web browsers extensions) which offers a user's profiling system and transcodes Web content according to constrains declared by users: the same Web page is provided to any user, but GAPforAPE computes adequate customizations, by exploiting scripting technologies which usually affect Web pages accessibility. GAPforAPE imitates screen readers behavior: it applies a specific set of transcoding scripts devoted to a given Web site, when available, and a default set of transcoding operations otherwise. The continuous and quick evolution of the Web has shown that a crowdsourcing system is a desirable solution, letting the transcoding scripts evolve in the same way.

  17. Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization Along With Password Authentication And Billing System

    Directory of Open Access Journals (Sweden)

    Asst.Prof.T.A.More

    2015-03-01

    Full Text Available In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.

  18. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  19. The denial of death thesis: sociological critique and implications for palliative care.

    Science.gov (United States)

    Zimmermann, Camilla; Rodin, Gary

    2004-03-01

    It has become commonplace to say that contemporary western society is 'death-denying'. This characterization, which sociologists have termed the 'denial of death thesis', first arose in the social science, psychological and clinical medical literature in the period between 1955 and 1985. During the same time period, the hospice and palliative care movements were developing and in part directed themselves against the perceived cultural denial of death in western society. While the denial of death has been taken for granted by the lay public as well as by clinicians, in the sociological literature it has been increasingly questioned. In this paper we use sociological critiques of the denial of death thesis to raise critical questions about the theory and practice of contemporary palliative care. In particular, we argue that the emphasis of palliative care should not be on extinguishing the denial of death but on the relief of suffering.

  20. The Consent Solution to Punishment and the Explicit Denial Objection

    Directory of Open Access Journals (Sweden)

    Miroslav Imbrisevic

    2010-06-01

    Full Text Available Recently, David Boonin has put forward several objections to Carlos S. Nino's 'Consensual Theory of Punishment'. In this paper I will defend Nino against the 'explicit denial objection'. I will discuss whether Boonin's interpretation of Nino as a tacit consent theorist is right. I will argue that the offender's consent is neither tacit nor express, but a special category of implicit consent. Further, for Nino the legal-normative consequences of an act (of crime are 'irrevocable', i.e. one cannot (expressly and successfully deny liability to them. I will suggest an explanation for Nino's irrevocability claim.

  1. The optimal access system for future far-offshore wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  2. The optimal access system for future far-offshore wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  3. An Automated Mouse Tail Vascular Access System by Vision and Pressure Feedback.

    Science.gov (United States)

    Chang, Yen-Chi; Berry-Pusey, Brittany; Yasin, Rashid; Vu, Nam; Maraglia, Brandon; Chatziioannou, Arion X; Tsao, Tsu-Chin

    2015-08-01

    This paper develops an automated vascular access system (A-VAS) with novel vision-based vein and needle detection methods and real-time pressure feedback for murine drug delivery. Mouse tail vein injection is a routine but critical step for preclinical imaging applications. Due to the small vein diameter and external disturbances such as tail hair, pigmentation, and scales, identifying vein location is difficult and manual injections usually result in poor repeatability. To improve the injection accuracy, consistency, safety, and processing time, A-VAS was developed to overcome difficulties in vein detection noise rejection, robustness in needle tracking, and visual servoing integration with the mechatronics system.

  4. Adaptive radio resource allocation for multiple traffic OFDMA broadband wireless access system

    Institute of Scientific and Technical Information of China (English)

    LU Yan-hui; LUO Tao; YIN Chang-chuan; YUE Guang-xin

    2006-01-01

    In this article, an adaptive radio resource allocation algorithm applied to multiple traffic orthogonal frequency division multiple access (OFDMA) system is proposed, which distributes subcarriers and bits among users according to their different quality of service requirements and traffic type. By classifying and prioritizing the users based on their traffic characteristic and ensuring resource for higher priority users, the new scheme decreases tremendously the outage probability of the users requiting a real-time transmission without impact on the spectrum efficiency of system, as well as the outage probability of data users is not increased compared with the radio resource allocation methods published.

  5. Analysis and Simulation for Capacity of Time Division-Synchronous Code Division Multiple Access System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Capacity both in uplink and downlink of TD-SCDMA (time division-synchronous code division multiple access)system is studied in a multi-cell environment. The theoretical expressions of the mean of intercell interference in uplinkand the mean of sum of power allocation in downlink are given, by which uplink and downlink capacity is analyzed.Furthermore, we give the simulation models for both uplink and downlink capacity. The results from theoretical analysisand simulation fit very well. In the end, the maximum number of users that TD-SCDMA system can serve for 12.2kspeech service is given.

  6. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  7. Design and performance evaluation of a wideband FM spread-spectrum multiple-access system

    Science.gov (United States)

    Wachsman, R. H.; Ghais, A. F.

    1971-01-01

    The system described performs the tracking and communications functions of a tracking and data relay satellite system (TDRS). The spread-spectrum signal format is achieved through wide deviation FM by a sinusoidal subcarrier unique to each multiple-access user. A compound phase-locked loop tracks carrier and subcarrier and demodulates data and ranging signals. Design parameters of user and ground terminals for TDRS are given. Acquisition procedures are described. Performance analyses are presented including the effects of noise, RFI, multipath and other users.

  8. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    Science.gov (United States)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  9. Access Denied

    Science.gov (United States)

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  10. Power and Channel Allocation for Non-orthogonal Multiple Access in 5G Systems: Tractability and Computation

    OpenAIRE

    Lei, Lei; Yuan, Di; Ho, Chin Keong; Sun, Sumei

    2016-01-01

    Network capacity calls for significant increase for 5G cellular systems. A promising multi-user access scheme, non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC), is currently under consideration. In NOMA, spectrum efficiency is improved by allowing more than one user to simultaneously access the same frequency-time resource and separating multi-user signals by SIC at the receiver. These render resource allocation and optimization in NOMA different from orth...

  11. Towards the Adoption of Open Source and Open Access Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Ilias Maglogiannis

    2012-01-01

    Full Text Available As the Electronic Health Record (EHR systems constantly expand to support more clinical activities and their implementations in healthcare organizations become more widespread, several communities have been working intensively for several years to develop open access and open source EHR software, aiming at reducing the costs of EHR deployment and maintenance. In this paper, we describe and evaluate the most popular open source electronic medical records such as openEMR, openMRS and patientOS, providing their technical features and potentials. These systems are considered quite important due to their prevalence. The article presents the key features of each system and outlines the advantages and problems of Open Source Software (OSS Systems through a review of the literature, in order to demonstrate the possibility of their adoption in modern electronic healthcare systems. Also discussed are the future trends of OS EHRs in the context of the Personal Health Records and mobile computing paradigm.

  12. U-Access: a web-based system for routing pedestrians of differing abilities

    Science.gov (United States)

    Sobek, Adam D.; Miller, Harvey J.

    2006-09-01

    For most people, traveling through urban and built environments is straightforward. However, for people with physical disabilities, even a short trip can be difficult and perhaps impossible. This paper provides the design and implementation of a web-based system for the routing and prescriptive analysis of pedestrians with different physical abilities within built environments. U-Access, as a routing tool, provides pedestrians with the shortest feasible route with respect to one of three differing ability levels, namely, peripatetic (unaided mobility), aided mobility (mobility with the help of a cane, walker or crutches) and wheelchair users. U-Access is also an analytical tool that can help identify obstacles in built environments that create routing discrepancies among pedestrians with different physical abilities. This paper discusses the system design, including database, algorithm and interface specifications, and technologies for efficiently delivering results through the World Wide Web (WWW). This paper also provides an illustrative example of a routing problem and an analytical evaluation of the existing infrastructure which identifies the obstacles that pose the greatest discrepancies between physical ability levels. U-Access was evaluated by wheelchair users and route experts from the Center for Disability Services at The University of Utah, USA.

  13. Development of Environmental Decision Support System: Unifying Cross-Discipline Data Access Through Open Source Tools

    Science.gov (United States)

    Freeman, S.; Darmenova, K.; Higgins, G. J.; Apling, D.

    2012-12-01

    A common theme when it comes to accessing climate and environmental datasets is that it can be difficult to answer the five basic questions: Who, What, When, Where, and Why. Sometimes even the act of locating a data set or determining how it was generated can prove difficult. It is even more challenging for non-scientific individuals such as planners and policy makers who need to access and include such information in their work. Our Environmental Decision Support System (EDSS) attempts to address this issue by integrating several open source packages to create a simple yet robust web application for conglomerating, searching, viewing, and downloading environmental information for both scientists and decision makers alike. The system is comprised of several open source components, each playing an important role in the EDSS. The Geoportal web application provides an intuitive interface for searching and managing metadata ingested from data sets/data sources. The GeoServer and ncWMS web applications provide overlays and information for visual presentations of the data through web mapping services (WMS) by ingesting ESRI shapefiles, NetCDF, and HDF files. Users of the EDSS can browse the catalog of available products, enter a simple search string, or even constrain searches by temporal and spatial extents. Combined with a custom visualization web application, the EDSS provides a simple yet efficient means for users to not only access and manipulate climate and environmental data, but also trace the data source and the analytical methods used in the final decision aids products.

  14. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  15. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  16. An Entropy Architecture for Defending Distributed Denial-of-service Attacks

    Directory of Open Access Journals (Sweden)

    S. K. Srivatsa

    2009-10-01

    Full Text Available The goal of intrusion detection is to identify entities attempting to destabilize the security controls. Network based intrusion detection techniques are used to identify unauthorized, illicit and anomalous behavior based on the network traffic. Identifying the network intruders is the most significant problem for network administrators and network security experts. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. New threats are emerging at an increasing rate. Distributed Denial-of-Service (DDoS attacks have emerged as a popular means of causing mass damage. The impacts of DoS attack will cause greater collateral damage. DoS attacks remain a serious threat to the users, organizations, and infrastructures of the Internet. The approaches used in the existing defense techniques are based on traffic characteristics such as traffic deviation, attack pattern matching etc, which may not yield accurate detection and involves high complexity. In this paper, the router based entropy algorithm has been designed to improve the performance and protection from the distributed denial-of-service attacks. This work includes attack tree construction, attacks detection and clustering of alerts. By calculating the predicted entropy for a router, alerts are raised for flows in which the predicted entropy is more than a threshold value. Then the alerts are grouped into different clusters according to their source, target, time and attack-type. It helps to avoid group redundant alerts and to associate alerts that are of the same nature. By Simulation results, it has been shown that the proposed architecture improves the detection accuracy and throughput while reducing the alert overhead. In this paper, we have explored the current research potential in terms of security, throughput performance of the router and impact of DoS attack technology based on intruder activity and attack tools.

  17. Open-Access, Low-Magnetic-Field MRI System for Lung Research

    Science.gov (United States)

    Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William

    2009-01-01

    An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.

  18. Holocaust Denial is a Form of Hate Speech

    Directory of Open Access Journals (Sweden)

    Raphael Cohen-Almagor

    2009-12-01

    Full Text Available

    In this short piece I wish to take issue with the assertion that Holocaust denial is not hateful per se. My aim is to show that it is, and therefore that Facebook should reconsider its position. All Internet providers and web-hosting companies whose terms of service disallow hateful messages on their servers should not host or provide forums for such hate-mongering. This is of urgent need as Holocaust denial is prevalent in Europe, the United States (USA and across the Arab and Muslim parts of the world. 

  19. Accessibility needs and challenges of a mHealth system for patients with dexterity impairments.

    Science.gov (United States)

    Yu, Daihua X; Parmanto, Bambang; Dicianno, Brad E; Watzlaf, Valerie J; Seelman, Katherine D

    2017-01-01

    Purpose State: An innovative mobile health system called iMHere (interactive Mobile Health and Rehabilitation) has been developed at the University of Pittsburgh to support self-care and adherence to self-care regimens for patients with chronic conditions. The goal of this study is to explore and to identify the accessibility needs and preferences of individuals with dexterity impairments when they use the iMHere system. Participants were asked to perform tasks after a one-week field trial. The time for a participant to complete each task, the number of possible errors a participant made and the number of errors a participant was able to self-correct were recorded and analyzed. The Telehealth Usability Questionnaire was collected to rate participants' experiences. Nine participants with various levels of dexterity abilities were included in the study. A statistically significant negative correlation was identified between participants' dexterity levels and their error ratios by using a Pearson product-moment correlation (r = -0.434, n = 36, p = 0.004). Approximately 51% of errors detected was self-corrected without any help, but other errors called for resolution from a researcher. Due to the diversity of participants' dexterity impairments, their needs and preferences differ one from another. Personalized design may be the key to approaching these challenges in improving accessibility. Implications for Rehabilitation An innovative mobile health system called iMHere has been developed to support self-care and adherence to self-care regimens as part of rehabilitation for patients with chronic conditions. Before populations with these limitations can harness the potential of mHealth, accessibility of mHealth has to be addressed to ensure its quality and value. Dexterity limitations are commonly associated with chronic disease, accidents or aging. The study presented here identified the potential issues and barriers to accessibility related to user

  20. Hybrid mathematical and rule-based system for transmission network planning in open access schemes

    Energy Technology Data Exchange (ETDEWEB)

    Kandil, M. S. [Electrical Department, Mansura University, (Egypt); EI-Debeiky, S. M. [Electrical Department, Ain Shams University, (Egypt); Hasanien, N. E. [Egyptian Electricity Authority, Studies and Researches Department, (Egypt)

    2001-09-01

    The paper presents a planning methodology using an application of a mathematical and a rule-based expert system (ES) to expand the transmission network in open access schemes. In this methodology, the ES suggests a realistic set of generation additions with proper economic signals to the participants, before proceeding with the transmission expansion. A feasible list of transmission alternatives is then assumed to accommodate the proposals for generation. A mathematical method is performed based on marginal cost allocation to optimise the location for the new generation and its transmission expansion scheme simultaneously for each alternative. The optimum alternative, which minimises the overall system's cost function and satisfies the future demand under different operating conditions, is obtained. The ES interacts with the power system planning tools to produce the optimum expansion plan. A practical application is given to demonstrate the effectiveness of the developed prototype system. (Author)

  1. A Frequency—Diversity Spread—Spectrum Multiple Access System with Random Signature Sequences

    Institute of Scientific and Technical Information of China (English)

    CaoYewen; XiangHaige

    1995-01-01

    A new scheme for the spread-spectrum multiple access system named Frequency-Diver-sity Spread-Spectrum Multiple Access(FD-DDMA)system,is proposed.In this FD-SSMA sys-tem,the same information will be modulated on a group of mutually orthogonal frequency compo-nents(carriers)with a random signature sequence at the same time,and it will be demodulated by a coherent receiver for every component and then incorporated (ad if using frequency diversity)on the basis of this random sequence.The spectrum of the modulated signal is very close to that of a white-noise in a wider frequency band due to orthogonality for all frequency components and prop-erty of the random sequence,the system becomes a spread-spectrum one.The (Inverse)Fast Froier Transform(IFFT,FFT)can be applied in the system ,which provides additional flexibility.The performance in an asynchronous mode,such as ability of multiusers,anti-interferences ,is an-alyzed.

  2. Remote access to an interferometric fringes stabilization active system via RENATA

    Science.gov (United States)

    Espitia-Gómez, Javier; Ángel-Toro, Luciano

    2013-11-01

    The Advanced Technology National Network (RENATA, for its acronym in Spanish) is a Colombian, collaborative work tool, linked to other networks worldwide, in which take participation researchers, teachers and students, by sharing laboratory resources located in different universities, institutes and research centers throughout the country. In the Universidad EAFIT (Medellín, Colombia) it has been designed an interferometric fringes stabilization active system, which can be accessed remotely via the RENATA network. A Mach-Zehnder interferometer was implemented, with independent piezoelectric actuators in each arm, with which the lengths of optical path of light that goes over in each of them can be modified. Using these actuators, one can simultaneously perturb the system and compensate the phase differences caused by that perturbation. This allows us to experiment with different disturbs, and analyze the system response to each one of them. This can be made from any location worldwide, and especially from those regions in which optical and optoelectronic components required for the implementation of the interferometer or for the stabilization system are not available. The device can also be used as a platform in order to conduct diverse experiments, involving optical and controlling aspects, constituting with this in a pedagogic tool. For the future, it can be predicted that remote access to available applications would be possible, as well as modifications of the implemented code in labVIEW™, so that researchers and teachers can adapt and improve their functionalities or develop new applications, based on the collaborative work.

  3. Vote-by-Phone: An Investigation of a Usable and Accessible IVR Voting System

    Directory of Open Access Journals (Sweden)

    Danae Holmes

    2016-11-01

    Full Text Available One of the main goals of the Help America Vote Act (HAVA was to ensure that voters with disabilities could vote privately and independently. However, the current state of most voting methods does not allow for private and independent voting for everyone. In response to this issue, we tested a remote IVR voting system developed by Author 1 and Author 2 (2013, with an added audio speed adjustment feature and synthetic voice to increase usability and accessibility, especially for visually impaired voters (Pinter, 2011. The focus of this research was to examine the viability and usability of the IVR voting system as an accessible voting platform for visually impaired voters. The system was tested by users with and without visual impairments, and usability was measured using the three ISO 9241-11 usability metrics (ISO 9241-11, 1998 of efficiency (time to complete a ballot, effectiveness (accuracy, and satisfaction (subjective usability. Results indicate that the IVR voting system could be a viable voting alternative to other established voting methods, with similar performance among sighted and visually impaired users.

  4. Access to the energy system network simulator (ESNS), via remote computer terminals. [BNL CDC 7600/6600 computer facility

    Energy Technology Data Exchange (ETDEWEB)

    Reisman, A W

    1976-08-15

    The Energy System Network Simulator (ESNS) flow model is installed on the Brookhaven National Laboratory (BNL) CDC 7600/6600 computer facility for access by off-site users. The method of access available to outside users is through a system called CDC-INTERCOM, which allows communication between the BNL machines and remote teletype terminals. This write-up gives a brief description of INTERCOM for users unfamiliar with this system and a step-by-step guide to using INTERCOM in order to access ESNS.

  5. Silence and Denial in Everyday Life-The Case of Animal Suffering.

    Science.gov (United States)

    Wicks, Deidre

    2011-02-21

    How can we make sense of the fact that we live in a world where good people co-exist in silence about widespread animal suffering. How is it that sites of suffering such as laboratories, factory farms, abattoirs and animal transportation are all around us and yet we 'do not, in a certain sense, know about them' [1]. This 'not knowing' is one of the most difficult barriers for animal activists who must constantly develop new strategies in an attempt to catch public attention and translate it into action. Recent contributions from the 'sociology of denial' have elucidated many of the mechanisms involved in 'not knowing' in relation to human atrocities and genocide. In this context, 'denial' refers to the maintenance of social worlds in which an undesirable situation is unrecognized, ignored or made to seem normal [2]. These include different types of denial: personal, official and cultural, as well as the process of normalization whereby suffering becomes invisible through routinization, tolerance, accommodation, collusion and cover up. Denial and normalization reflect both personal and collective states where suffering is not acknowledged [3]. In this paper, I will examine insights from the sociology of denial and apply them to human denial and normalization of animal suffering. This will include an examination of denial which is both individual and social and the implications of these insights for theory and practice in the human/animal relationship.

  6. Systems Change Enhances Access to Family Planning Training and Care Delivery.

    Science.gov (United States)

    Carvajal, Diana N; Khanna, Niharika; Williams, Mozella; Gold, Marji

    2016-09-01

    Long-acting reversible contraceptives (LARCs) are very effective methods of pregnancy prevention. To ensure autonomy over childbearing, women need access to contraception and abortion services. Family physicians can improve access by increasing numbers and locations of trained providers. In 2014, the University of Maryland (UMD) Reproductive Health EDucation In family medicine (RHEDI) program sought to enhance LARC and abortion training by increasing: (1) resident participation in LARC services, (2) resident participation/interest in abortion care, (3) patient access to LARCs and medication abortions (MABs). We used a pre-post framework comparing years 2013 and 2014 with respect to number of resident-provided LARC services, number of residents participating in abortion, and total number of LARCs and MABs provided practice-wide. The setting is an urban residency practice. (1) increased dedicated appointments for LARC and MABs, (2) dedicated appointment scheduler, (3) comprehensive family planning didactics and clinical workshops, (4) faculty-supported Residents for Choice group. 2014: Residents provided substantially more LARC services compared to 2013. Placement increased from 50 to 90, and removals tripled (25 to 73). 2014 site-wide LARC placement also increased (160 versus 98), removals increased (44 in 2013, 106 in 2014). Twelve residents per year are eligible to participate in abortion care. In 2013, two participated: in 2014, 10 participated. MABs provided in 2014 (18) did not change from 2013 (17). The UMD RHEDI program demonstrated that attention to care-provision systems and education enhances resident training and increases patient access to family planning services. Programs with similar goals may find our methods helpful.

  7. Accessibility patterns and community integration among previously homeless adults: a Geographic Information Systems (GIS) approach.

    Science.gov (United States)

    Chan, Dara V; Gopal, Sucharita; Helfrich, Christine A

    2014-11-01

    Although a desired rehabilitation goal, research continues to document that community integration significantly lags behind housing stability success rates for people of a variety of ages who used to be homeless. While accessibility to resources is an environmental factor that may promote or impede integration activity, there has been little empirical investigation into the impact of proximity of community features on resource use and integration. Using a Geographic Information Systems (GIS) approach, the current study examines how accessibility or proximity to community features in Boston, United States related to the types of locations used and the size of an individual's "activity space," or spatial presence in the community. Significant findings include an inverse relationship between activity space size and proximity to the number and type of community features in one's immediate area. Specifically, larger activity spaces were associated with neighborhoods with less community features, and smaller activity spaces corresponded with greater availability of resources within one's immediate area. Activity space size also varied, however, based on proximity to different types of resources, namely transportation and health care. Greater community function, or the ability to navigate and use community resources, was associated with better accessibility and feeling part of the community. Finally, proximity to a greater number of individual identified preferred community features was associated with better social integration. The current study suggests the ongoing challenges of successful integration may vary not just based on accessibility to, but relative importance of, specific community features and affinity with one's surroundings. Community integration researchers and housing providers may need to attend to the meaning attached to resources, not just presence or use in the community.

  8. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks.

    Science.gov (United States)

    Saleh, Mohammed A; Abdul Manaf, Azizah

    2015-01-01

    The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  9. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  10. National Geothermal Data System (USA): an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. Lee; Richard, Stephen; Blackman, Harold; Anderson, Arlene; Patten, Kim

    2014-05-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in April, 2014 will provide open access to millions of data records, sharing -relevant geoscience and longer term to land use data to propel geothermal development and production. NGDS serves information from all of the U.S. Department of Energy's sponsored development and research projects and geologic data from all 50 states, using free and open source software. This interactive online system is opening new exploration opportunities and potentially shortening project development by making data easily discoverable, accessible, and interoperable. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 6 million records online, including 1.72 million well headers (oil and gas, water, geothermal), 670,000 well logs, and 497,000 borehole temperatures and is growing rapidly. There are over 312 interoperable Web services and another 106 WMS (Web Map Services) registered in the system as of January, 2014. Companion projects run by Southern Methodist University and U.S. Geological Survey (USGS) are adding millions of additional data records. The DOE Geothermal Data Repository, currently hosted on OpenEI, is a system node and clearinghouse for data from hundreds of U.S. DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS complies with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with support from the US

  11. Sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems

    Science.gov (United States)

    Otsuji, Taiichi; Sugawara, Kenta; Tamamushi, Gen; Dobroiu, Adrian; Suemitsu, Tetsuya; Ryzhii, Victor; Iwatsuki, Katsumi; Kuwano, Shigeru; Kani, Jun-ichi; Terada, Jun

    2016-02-01

    This paper reviews advances in sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems. Graphene-channel field effect transistors (G-FETs) and InP-based high electron mobility transistors (inP-HEMT) are experimentally examined as photonic frequency converters. Optoelectronic properties and three-terminal functionalities of the G-FETs and InP-HEMTs are exploited to perform single-chip photonic double-mixing operation over the 120 GHz wireless communication band. A single transistor can photomix the optical subcarriers to generate LO and mix down the RF data on the sub-THz carrier to the IF band.

  12. Improved H_∞ filtering for Markov jumping linear systems with non-accessible mode information

    Institute of Scientific and Technical Information of China (English)

    GUO YaFeng; LI ShaoYuan

    2009-01-01

    This paper is concerned with the H_∞ filtering problems for both continuous-and discrete-time Markov jumping linear systems (MJLS) with non-accessible mode Information.A new design method is proposed,which greatly reduces the overdesign Introduced in the derivation process.The desired filters can be obtained from the solution of convex optimization problems in terms of linear matrix inequalities (LMIs),which can be solved via efficient interior-point algorithms.Numerical examples are provided to Illustrate the advantages of the proposed approach.

  13. Measuring access to primary medical care: some examples of the use of geographical information systems.

    Science.gov (United States)

    Parker, E B; Campbell, J L

    1998-06-01

    This paper explores the potential for geographical information system technology in defining some variables influencing the use of primary care medical services. Eighteen general practices in Scotland contributed to a study examining the accessibility of their services and their patients' use of the local Accident and Emergency Department. Geo-referencing of information was carried out through analysis of postcode data relating to practices and patients. This information was analyzed using ARC/INFO GIS software in conjunction with the ORACLE relational database and 1991 census information. The results demonstrate that GIS technology has an important role in defining and analyzing the use of health services by the population.

  14. Design of Nutrition Catering System for Athletes Based on Access Database

    Directory of Open Access Journals (Sweden)

    Hongjiang Wu,

    2015-08-01

    Full Text Available In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO and Structure Query Language (SQL were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring nutrition of common food and recommended of functional nourishing food could be achieved for different events and different level of athletes.

  15. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  16. Exploring the drivers of health and healthcare access in Zambian prisons: a health systems approach.

    Science.gov (United States)

    Topp, Stephanie M; Moonga, Clement N; Luo, Nkandu; Kaingu, Michael; Chileshe, Chisela; Magwende, George; Heymann, S Jody; Henostroza, German

    2016-11-01

    Prison populations in sub-Saharan Africa (SSA) experience a high burden of disease and poor access to health care. Although it is generally understood that environmental conditions are dire and contribute to disease spread, evidence of how environmental conditions interact with facility-level social and institutional factors is lacking. This study aimed to unpack the nature of interactions and their influence on health and healthcare access in the Zambian prison setting. We conducted in-depth interviews of a clustered random sample of 79 male prisoners across four prisons, as well as 32 prison officers, policy makers and health care workers. Largely inductive thematic analysis was guided by the concepts of dynamic interaction and emergent behaviour, drawn from the theory of complex adaptive systems. A majority of inmates, as well as facility-based officers reported anxiety linked to overcrowding, sanitation, infectious disease transmission, nutrition and coercion. Due in part to differential wealth of inmates and their support networks on entering prison, and in part to the accumulation of authority and material wealth within prison, we found enormous inequity in the standard of living among prisoners at each site. In the context of such inequities, failure of the Zambian prison system to provide basic necessities (including adequate and appropriate forms of nutrition, or access to quality health care) contributed to high rates of inmate-led and officer-led coercion with direct implications for health and access to healthcare. This systems-oriented analysis provides a more comprehensive picture of the way resource shortages and human interactions within Zambian prisons interact and affect inmate and officer health. While not a panacea, our findings highlight some strategic entry-points for important upstream and downstream reforms including urgent improvement in the availability of human resources for health; strengthening of facility-based health services systems

  17. Power Stabilization Strategy of Random Access Loads in Electric Vehicles Wireless Charging System at Traffic Lights

    Directory of Open Access Journals (Sweden)

    Linlin Tan

    2016-10-01

    Full Text Available An opportunity wireless charging system for electric vehicles when they stop and wait at traffic lights is proposed in this paper. In order to solve the serious power fluctuation caused by random access loads, this study presents a power stabilization strategy based on counting the number of electric vehicles in a designated area, including counting method, power source voltage adjustment strategy and choice of counting points. Firstly, the circuit model of a wireless power system with multi-loads is built and the equation of each load is obtained. Secondly, after the counting method of electric vehicles is stated, the voltage adjustment strategy, based on the number of electric vehicles when the system is at a steady state, is set out. Then, the counting points are chosen according to power curves when the voltage adjustment strategy is adopted. Finally, an experimental prototype is implemented to verify the power stabilization strategy. The experimental results show that, with the application of this strategy, the charging power is stabilized with the fluctuation of no more than 5% when loads access randomly.

  18. Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization

    Directory of Open Access Journals (Sweden)

    Laurent Segers

    2014-02-01

    Full Text Available Indoor localization of persons and objects poses a great engineering challenge. Previously developed localization systems demonstrate the use of wideband techniques in ultrasound ranging systems. Direct sequence and frequency hopping spread spectrum ultrasound signals have been proven to achieve a high level of accuracy. A novel ranging method using the frequency hopping spread spectrum with finite impulse response filtering will be investigated and compared against the direct sequence spread spectrum. In the first setup, distances are estimated in a single-access environment, while in the second setup, two senders and one receiver are used. During the experiments, the micro-electromechanical systems are used as ultrasonic sensors, while the senders were implemented using field programmable gate arrays. Results show that in a single-access environment, the direct sequence spread spectrum method offers slightly better accuracy and precision performance compared to the frequency hopping spread spectrum. When two senders are used, measurements point out that the frequency hopping spread spectrum is more robust to near-far effects than the direct sequence spread spectrum.

  19. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  20. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Zummo SalamA

    2008-01-01

    Full Text Available Abstract We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  1. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  2. Low Complexity Receiver Structures for Space-Time Coded Multiple-Access Systems

    Directory of Open Access Journals (Sweden)

    Jayaweera Sudharman K

    2002-01-01

    Full Text Available Multiuser detection for space-time coded synchronous multiple-access systems in the presence of independent Rayleigh fading is considered. Under the assumption of quasi-static fading, it is shown that optimal (full diversity achieving space-time codes designed for single-user channels, can still provide full diversity in the multiuser channel. The joint optimal maximum likelihood multiuser detector, which can be implemented with a Viterbi-type algorithm, is derived for such space-time coded systems. Low complexity, partitioned detector structures that separate the multiuser detection and space-time decoding into two stages are also developed. Both linear and nonlinear multiuser detection schemes are considered for the first stage of these partitioned space-time multiuser receivers. Simulation results show that these latter methods achieve performance competitive with the single-user bound for space-time coded systems.

  3. [Accession to the PIC/S and pharmaceutical quality system in Japan].

    Science.gov (United States)

    Katori, Noriko

    2014-01-01

    In March, 2012, Japan made the application for membership of the Pharmaceutical Inspection convention and Pharmaceutical Inspection Co-operation scheme (PIC/S) which is an international body of a GMP inspection. The globalization of pharmaceutical manufacturing and sales has been a driving force behind the decision to become a PIC/S member. For the application for membership, Japan's GMP inspectorate needs to fulfill PIC/S requirements, for example, the inspection organization has to have a quality system as a global standard. One of the other requirements is that the GMP inspectorate can access Official Medicines Control Laboratories (OMCL) having high analytical skills and also have a quality system based on ISO 17025. I would like to describe the process to make up a quality system in the National Institute of Health Sciences and also the circumstances around the PIC/S application in Japan.

  4. NATIONAL GEOTHERMAL DATA SYSTEM: AN EXEMPLAR OF OPEN ACCESS TO DATA

    Energy Technology Data Exchange (ETDEWEB)

    Blackman, Harold [Arizona Geological Survey; Blackman, Harold M. [Arizona Geological Survey; Blackman, Harold M. [Arizona Geological Survey; Blackman, Harold [Boise State University; Blackman, Harold [United States Department of Energy; Blackman, Harold

    2013-10-01

    The formal launch of National Geothermal Data System (NGDS – www.geothermaldata.org) in 2014 will provide open access to technical geothermal-relevant data from all of the Department of Energy- sponsored geothermal development and research projects and geologic data from all 50 states. By making data easily discoverable and accessible this system will open new exploration opportunities and shorten project development. The prototype data system currently includes multiple data nodes, and nationwide data online and available to the public, indexed through a single catalog under construction at http://search.geothermaldata.org. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Additional data record is being added by companion projects run by Boise State University, Southern Methodist University, and the USGS. The National Renewable Energy Laboratory is managing the Geothermal Data Repository, an NGDS node that will be a clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational system sustainable after the original implementation will

  5. National Geothermal Data System: an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.

    2013-12-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational

  6. A Survey On Various Defense Mechanisms Against Application Layer Distributed Denial Of Service Attack

    Directory of Open Access Journals (Sweden)

    Ms. Anuja R. Zade

    2011-11-01

    Full Text Available The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, revenue loss, and customer churns etc and is one of the most difficult problems to defend against in the internet. The goal of paper is to understand various techniquesproposed recently to defend against specifically application layer Distributed Denial of Service attack. The next step in the path would be to come up with a better solution to solve this problem. Undoubtedly the following discussed techniques are extremely good. A collaborative approach using few of them can be a better solution.

  7. Ocean Surface Topography Mission (OSTM) /Jason-2: Near Real-Time Altimetry Validation System (NRTAVS) QA Reports (NODC Accession 0044984)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains the descriptions for the OSTM/Jason-2 Near Real-Time Altimetry Validation System Quality Reports, which are served through the NOAA/NESDIS...

  8. ANM to Perceive and Thwart Denial of Service Attack in WLAN

    Directory of Open Access Journals (Sweden)

    Durairaj M

    2015-05-01

    Full Text Available Wireless infrastructure network is vulnerable to Denial of Service (DoS attack which makes the resources unavailable for its intended user. As an outcome of DoS attack, authenticated user is denied from accessing the network by spoofing legitimate client identity. Reduced protection in management frame led to MAC spoof DoS attack. Though 802.11w was developed to protect the management frame, the network is vulnerable to different DoS attacks and unable to prevent all types of DoS attacks. This motivated us to propose a mechanism to detect and prevent substantial number of DoS attacks. This paper proposes an algorithm called Alternative Numbering Mechanism (ANM which prevents DoS attacks. The proposed solution is simulated in NS2 for experimentation. Packet delivery ratio, control overhead, normalized routing overhead, delay time, throughput and packet drop were measured for experimentation and to evaluate the performance of ANM. The experimental results of ANM demonstrate that the performance of ANM is encouraging and prevents nearly all types of DoS attacks.

  9. Making Water Chemistry Data From Volcano-Hydrothermal Systems Accessible Using Open Source Tools

    Science.gov (United States)

    Venezky, D. Y.; Mariner, R. H.; Hurwitz, S.; Evans, W. C.

    2004-12-01

    Chemical and isotopic data collected over several decades by the U.S. Geological Survey from volcano-hydrothermal systems were recently organized into a web-accessible database for public use. The data were collected by members of the Barnes and/or Mariner projects and were supplemented with data from samples submitted for analysis by other researchers with similar interests. The data are primarily chemical and isotopic analyses of waters (thermal, mineral, or fresh) and associated gas (free and/or dissolved) collected from hot springs, mineral springs, cold springs, geothermal wells, fumaroles, and gas seeps. Additional data for a few streams, lakes, and oil wells are included. The web site follows a multi-stage design, first allowing for basic access to the MySQL database, then a user-friendly GIS (Geographic Information System) interface, and finally access to additional documentation and searching features. The initial web pages allow the user to choose the type of data (site, physical parameters, major and minor dissolved constituents, dissolved and free gas composition, water isotopes, and other isotopes) and the sample location. The data are then shown in a table that can be downloaded in several formats. The second stage of the project added an open-source GIS package called WorldKit, which gives easy-to-code and easy-to-use clickable icons on a base map using XML (Extensible Markup Language). WorldKit is also adding a zoom interface (zoomify) that uses new technology to reduce the display time. The final stage of the project involves more complex queries, alternative data presentation, and integrated background information. The more complex queries allow users to select multiple types of data from multiple sites. The data can be found at http://hotspringchem.wr.usgs.gov/.

  10. Implementasi Indoor Positioning System Berbasis Smartphone dengan Penambahan Access Point untuk Studi Kasus Gedung Teknik Informatika ITS

    Directory of Open Access Journals (Sweden)

    Fananda Herda Perdana

    2017-01-01

    Full Text Available Saat ini kebutuhan masyarakat akan informasi lokasi sangat tinggi, terutama dengan memanfaatkan teknologi teknologi GPS. Tetapi untuk di dalam ruangan sistem ini memiliki akurasi yang rendah, apalagi untuk gedung indoor sehingga dikembangkan dengan konsep 3D Indoor Positioning System. Untuk meminimalisir penurunan akurasi Indoor Positioning System karena minimnya jumlah access point atau persebaran access point yang kurang merata, maka dalam penelitian ini akan ditambahkan access point di lokasi yang memiliki akses sinyal Wi-Fi di Gedung Teknik Informatika. Uji coba dilakukan dengan cara melakukan perbandingan hasil akurasi dari pengujian di beberapa lokasi kampus Teknik Informatika ITS ketika sebelum dilakukan penambahan access point dan ketika sesudah dilakukan penambahan access point. Setelah dilakukan penambahan access point di beberapa titik lokasi yang memiliki cakupan sinyal Wi-Fi lemah, dihasilkan akurasi yang meningkat hingga 16,67%, dari akurasi semula 78,70% menjadi  95,36% untuk seluruh titik uji coba pada gedung kampus. Selain itu juga penambahan access point berhasil meningkatkan akurasi 9 ruangan dari total 23 ruangan yang diuji secara signifikan (meningkat di atas 20%, terutama di daerah sekitar penambahan access point.

  11. Tendons, Concentric Tubes, and a Bevel Tip: Three Steerable Robots in One Transoral Lung Access System.

    Science.gov (United States)

    Swaney, Philip J; Mahoney, Arthur W; Remirez, Andria A; Lamers, Erik; Hartley, Bryan I; Feins, Richard H; Alterovitz, Ron; Webster, Robert J

    2015-05-01

    Lung cancer is the most deadly form of cancer, and survival depends on early-stage diagnosis and treatment. Transoral access is preferable to traditional between-the-ribs needle insertion because it is less invasive and reduces risk of lung collapse. Yet many sites in the peripheral zones of the lung or distant from the bronchi cannot currently be accessed transorally, due to the relatively large diameter and lack of sufficient steerablity of current instrumentation. To remedy this, we propose a new robotic system that uses a tendon-actuated device (bronchoscope) as a first stage for deploying a concentric tube robot, which itself is a vehicle through which a bevel steered needle can be introduced into the soft tissue of the lung outside the bronchi. In this paper we present the various components of the system and the workflow we envision for deploying the robot to a target using image guidance. We describe initial validation experiments in which we puncture ex vivo bronchial wall tissue and also target a nodule in a phantom with an average final tip error of 0.72 mm.

  12. Accessibility to general practitioners in rural South Australia. A case study using geographic information system technology.

    Science.gov (United States)

    Bamford, E J; Dunne, L; Taylor, D S; Symon, B G; Hugo, G J; Wilkinson, D

    To demonstrate the potential of GIS (geographic information system) technology and ARIA (Accessibility/Remoteness Index for Australia) as tools for medical workforce and health service planning in Australia. ARIA is an index of remoteness derived by measuring road distance between populated localities and service centres. A continuous variable of remoteness from 0 to 12 is generated for any location in Australia. We created a GIS, with data on location of general practitioner services in non-metropolitan South Australia derived from the database of RUMPS (Rural Undergraduate Medical Placement System), and estimated, for the 1170 populated localities in South Australia, the accessibility/inaccessibility of the 109 identified GP services. Distance from populated locality to GP services. Distance from populated locality to GP service ranged from 0 to 677 km (mean, 58 km). In all, 513 localities (43%) had a GP service within 20 km (for the majority this meant located within the town). However, for 173 populated localities (15%), the nearest GP service was more than 80 km away. There was a strong correlation between distance to GP service and ARIA value for each locality (0.69; P planning. Adding measures of health need and more detailed data on types and extent of GP services provided will allow more sophisticated planning.

  13. FLOSYS--a web-accessible workflow system for protocol-driven biomolecular sequence analysis.

    Science.gov (United States)

    Badidi, E; Lang, B F; Burger, G

    2004-11-01

    FLOSYS is an interactive web-accessible bioinformatics workflow system designed to assist biologists in multi-step data analyses. FLOSYS allows the user to create complex analysis pathways (protocols) graphically, similar to drawing a flowchart: icons representing particular bioinformatics tools are dragged and dropped onto a canvas and lines connecting those icons are drawn to specify the relationships between the tools. In addition, FLOSYS permits to select input-data, execute the protocol and store the results in a personal workspace. The three-tier architecture of FLOSYS has been implemented in Java and uses a relational database system together with new technologies for distributed and web computing such as CORBA, RMI, JSP and JDBC. The prototype of FLOSYS, which is part of the bioinformatics workbench AnaBench, is accessible on-line at http://malawimonas.bcm.umontreal.ca: 8091/anabench. The entire package is available on request to academic groups who wish to have a customized local analysis environment for research or teaching.

  14. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  15. Results of an Iridium-Based Data Communication System Providing Internet Access to Polar Expeditions

    Science.gov (United States)

    Mohammad, A.; Frost, V.; Braaten, D.

    2003-12-01

    ' W) from June 23-July 17, 2003. We measured the reliability, throughput and general performance of this system over periods of up to 24 hours. This included delay, loss, throughput, call drops/up-time, relative signal strengths, connection time and number of connection retries. The system was also successfully tested while moving across the ice sheet at speeds of up to 30 km/h. We were successful in uploading and downloading large files (.2MB to 7.2MB) to the Internet. In combination with a modified Wi-Fi deployment, wireless Internet access was also provided to the entire NorthGRIP camp for a few days. The field experiments have shown that standard Internet protocols combined with MLPPP and Iridium modems can provide Internet access for polar expeditions at useful data rates. The 4-modem configuration we tested was observed to be >90 % efficient, e.g., a 2.5 MB video file was transferred in 35 min. at 9.524 Kb/s. The system had an average up-time of over 90 % and thus is stable and suitable for autonomous operation. Mobile performance results were very similar to that of stationary systems. While the end-to-end network architecture developed to provide Internet access worked well, the system round trip time is significant ( ˜ 1.8 seconds), which can impair real time interactions.

  16. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  17. Search Hanford Accessible Reports Electronically system test plan and documentation: Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    White, E.L.

    1994-12-07

    The purpose of this document is to describe the following items: the approach, resources, and sequence of the testing activities; identifies the components and features to be tested; the personnel responsible for testing; the risks associated with this plan; and test cases and procedures. This document contains all test documentation for the SHARE system. The Search Hanford Accessible Reports Electronically (SHARE) testing process is based upon WHC-CM-3-10, Software Practices, Section SP-3.3 REV 0, and Appendix J REV 0. These procedures and guidelines are based on IEEE Standard 829-1983. The planning in this document was further influenced through guidance in IEEE Standard 1012-1986. This document contains the System, Acceptance, Integration and Component Test Plans, Designs, Procedures, and Cases for SHARE. The Test Cases and procedures have been attached to the document.

  18. Widened Participation and Unequal Access to the System of Higher Education in Denmark

    DEFF Research Database (Denmark)

    Munk, Martin D.; Thomsen, Jens Peter

    This paper deals with access to Higher Education (HE), more specifically with social differentiation within Danish university field of studies and institutions. We use Danish register data and investigate choice of field of study and choice of university institution while controlling for a range...... of student background variables. Theoretically we draw on notions of forms of capital and of channelling, diversion and effectively maintained inequality in the educational system. We find that it is important to differentiate not only between fields of studies, but also between university institutions......, in explaining the processes of inequality and differentiation in the Danish University system. Here two dimensions are important: the university institutions degree of social selectivity and whether it is has a ‘classic’ university profile (liberal arts) or a more ‘modern’ applied-oriented profile....

  19. Impact of Croatian EU accession on its foreign trade and customs system

    Directory of Open Access Journals (Sweden)

    Ivana Štulec

    2014-12-01

    Full Text Available The paper provides an overview of the effects of Croatian EU accession on its foreign trade and customs system, with special emphasis on bilateral trade with EU and CEFTA countries. With Croatia entering the EU, Croatian trade agreements with the South Eastern European countries no longer apply due to its simultaneous exit from CEFTA. These processes will certainly lead to certain changes in the Croatian foreign trade. The paper, therefore, analyses the current state and the dynamics of foreign trade with EU and CEFTA member countries in the period from 2007 to 2013. Moreover, we also offer an overview of possible changes in foreign trade and customs system, as well as the potential effects of these changes estimated within the previous theoretical and empirical research.

  20. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose;

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services....... For demonstration, we transmit a 2.5 Gbit/s signal through the proposed system and successfully achieve a bit-error-rate (BER) performance well below the 7% overhead forward error correction limit of the BER of 2 × 10¿3 for both the wireline and the wireless signals in the 60 GHz band after 25 km single-mode fiber...... for each DWDM user can be simultaneously supported. Besides, each baseband channel can be transparently upconverted tomultiple radio-frequency (RF) bands for different wireless standards, which can be flexibly filtered at the end user to select the on-demand RF band, depending on the wireless applications...

  1. Towards a Next Generation Universally Accessible ‘Online Shopping-for-Apparel’ System

    DEFF Research Database (Denmark)

    Kristensen, Kasper; Borum, Nanna; Christiansen, Line Gad

    2013-01-01

    This paper reports initial research findings from on-going longitudinal participatory design studies within a national (Danish) funded project to realize a gesture-controlled ‘Online shopping-for-apparel’ system – A Virtual Dressing Room (VDR). A product that reduces customer purchase returns......, reportedly up to 40%, which is a huge burden to the clothing industries as shopping percentile of sales online continues to increase, is targeted. Three studies are reported where results cumulate to highlight the need for continued research to realize a next-generation system to improve the user experience...... of online shopping for apparel where conclusions point to the need for adaptive user interface improvements. Unforeseen was that wheelchair-bound public especially responded positively to the potentials for the concept due to their limited mobility in shopping and this accessibility aspect can...

  2. Effectiveness of Space-Division Multiple-Access in MIMO Communication Systems with Parallel Data Transmission

    Science.gov (United States)

    Ermolayev, V. T.; Flaksman, A. G.; Averin, I. M.; Gribov, D. V.

    2004-02-01

    We consider multiple-input multiple-output (MIMO) cellular communication systems with antenna arrays at both link ends and data transmission via parallel eigenchannels matched with a random spatial channel. We analyze the effectiveness of the space-division multiple-access (SDMA) method, which does not require estimation of signal-arrival directions and is based on orthogonalization of the parallel channels of all users. We obtained approximate analytical expressions for the mean ratio of the signal power to the noise power and the MIMO system capacity, which are derived for the case of Rayleigh fading of signals. Although the obtained formulas are much simpler than the exact ones, they ensure high accuracy for an arbitrary number of transmitting and receiving antennas and an arbitrary power of transmitter. Our results demonstrate the high effectiveness of the proposed SDMA method.

  3. Hospital Outpatient Information System Development based on the Access VBA%基于Access VBA的医院门诊信息系统开发

    Institute of Scientific and Technical Information of China (English)

    刘坤彪; 陈姝

    2013-01-01

    以中小医院管理信息系统开发为研究对象,采用Ac-cess VBA技术框架,遵循结构化的程序设计方法和面向对象的程序设计方法,深入地探讨了中小医院门诊信息系统的设计与实现。从而为中小企业信息系统开发的技术选型和解决方案提供了一种实用、快捷的思路和途径。%According to the characteristics of the small and medium-sized database application system and the actual de-mand, this paper proposes a technical framework suitable for small and medium-sized database application system - Ac-cess VBA. Making small and medium-sized hospital man-agement information system development as the research ob-ject, using the Access VBA technology framework, follow-ing a structured programming method and object-oriented programming method, the paper deeply discusses the small and medium-sized hospital outpatient information system design and implementation process. It provides a practical and fast thinking and approach for small and medium enter-prises to select information systems technology.

  4. A Hybrid System for Acquisition of and Access to the Data from Foundry Technical Standards

    Directory of Open Access Journals (Sweden)

    A. Macioł

    2007-07-01

    Full Text Available The growing importance of automatized systems for interchange of commercial and technical information prompts searching for new forms of knowledge modelling. One of the possible solutions presented in this article is the use of relational databases for acquisition of information comprised in technical standards and of a rule-based reasoning system providing access to these bases. The study describes the structure of a database created under the assumption that concepts describing knowledge will be recorded in data collecting system and not in relational schema. The user is free to define by himself the structure of the knowledge without the need of introducing any changes to the relational schema. At the same time, the reasoning system enables very efficient knowledge searching. At present, tests are carried out on a software operating on a MS SQL Server. The project work and test performance of the system confirm that the adopted assumptions have been right and correct. The development of a new interface is anticipated using internet techniques. As a next step, the information resources collected in the system will be successively expanded using also information sources other than the technical standards.

  5. A web-accessible content-based cervicographic image retrieval system

    Science.gov (United States)

    Xue, Zhiyun; Long, L. Rodney; Antani, Sameer; Jeronimo, Jose; Thoma, George R.

    2008-03-01

    Content-based image retrieval (CBIR) is the process of retrieving images by directly using image visual characteristics. In this paper, we present a prototype system implemented for CBIR for a uterine cervix image (cervigram) database. This cervigram database is a part of data collected in a multi-year longitudinal effort by the National Cancer Institute (NCI), and archived by the National Library of Medicine (NLM), for the study of the origins of, and factors related to, cervical precancer/cancer. Users may access the system with any Web browser. The system is built with a distributed architecture which is modular and expandable; the user interface is decoupled from the core indexing and retrieving algorithms, and uses open communication standards and open source software. The system tries to bridge the gap between a user's semantic understanding and image feature representation, by incorporating the user's knowledge. Given a user-specified query region, the system returns the most similar regions from the database, with respect to attributes of color, texture, and size. Experimental evaluation of the retrieval performance of the system on "groundtruth" test data illustrates its feasibility to serve as a possible research tool to aid the study of the visual characteristics of cervical neoplasia.

  6. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  7. A Mechanism Denial Study on the Madden-Julian Oscillation

    Directory of Open Access Journals (Sweden)

    In-Sik Kang

    2011-12-01

    Full Text Available A series of Madden-Julian oscillation (MJO mechanism-denial experiments is performed using an atmospheric general circulation model (AGCM. Daily climatological seasonal cycles of i surface latent heat flux, ii net radiative heating rate, and iii surface wind stress are obtained from a control simulation and prescribed in place of the normal interactive computations of these fields in order to turn off the i wind-induced surface heat exchange (WISHE, ii cloud-radiation interaction (CRI, and iii frictional wave-CISK (FWC mechanisms, respectively. Dual and triple mechanism denial experiments are also conducted by switching off multiple mechanisms together. The influence of each mechanism is assessed by comparing experiments with that mechanism turned off to those in which it is not. CRI and WISHE are both found to be important to the simulated MJO amplitude and propagation speed, while FWC has weaker and less systematic effects. The MJO is weakened when CRI is turned off, but strengthened when WISHE is turned off, indicating that CRI amplifies the MJO in the control simulation while WISHE weakens it. The negative influence of WISHE is shown to result from simulated phase relationships between surface winds, surface fluxes and convection which differ significantly from those found in observations, and thus is not interpreted as evidence against a positive role for WISHE in the development and maintenance of the observed MJO. The positive influence of CRI in the model is consistent with a strong simulated relationship between daily grid-point column-integrated radiative and convective heating; the mean ratio of the latter to the former exceeds 0.2 for rain rates less than 14 mm d-1. CRI is also shown to suppress an excessive excitation of the convectively coupled Kelvin wave so that the amplitude and frequency of the MJO is maintained.

  8. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  9. 78 FR 53189 - Dorel Juvenile Group, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-08-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Dorel Juvenile Group, Denial of Petition for Decision of... petition. SUMMARY: Dorel Juvenile Group, Inc. (DJG) has determined that certain child restraint...

  10. Electromagnetic Susceptibility of the Area Denial Weapon System (ADWS)

    Science.gov (United States)

    2006-08-01

    igniter is about to initiate. The high cost of such temperature sensors normally precludes taking the igniter all the way to the ignition point and...Engineering Study”, DSTO Industrial Report, in preparation. [7] S. Baffreau, S. Bendhia, M. Ramdani, E. Sicard , “Characterisation of Microcontroller

  11. Testing a bedside personal computer Clinical Care Classification System for nursing students using Microsoft Access.

    Science.gov (United States)

    Feeg, Veronica D; Saba, Virginia K; Feeg, Alan N

    2008-01-01

    This study tested a personal computer-based version of the Sabacare Clinical Care Classification System on students' performance of charting patient care plans. The application was designed as an inexpensive alternative to teach electronic charting for use on any laptop or personal computer with Windows and Microsoft Access. The data-based system was tested in a randomized trial with the control group using a type-in text-based-only system also mounted on a laptop at the bedside in the laboratory. Student care plans were more complete using the data-based system over the type-in text version. Students were more positive but not necessarily more efficient with the data-based system. The results demonstrate that the application is effective for improving student nursing care charting using the nursing process and capturing patient care information with a language that is standardized and ready for integration with other patient electronic health record data. It can be implemented on a bedside stand in the clinical laboratory or used to aggregate care planning over a student's clinical experience.

  12. Difficulties in accessing and availing of public health care systems among rural population in Chittoor District, Andhra Pradesh

    Directory of Open Access Journals (Sweden)

    Geetha Lakshmi Sreerama

    2015-01-01

    Full Text Available Context: Despite policies to make health care accessible to all, it is not universally accessible. Frequent evaluation of barriers to accessibility of health care services paves path for improvement. Hence, present study is undertaken to evaluate the factors and public health policies influencing health care access to rural people in Chittoor District, Andhra Pradesh, which can be interpolated for other regions. Aims: To assess knowledge, perceptions, availing of public health care services, barriers to health care access in Chittoor District, Andhra Pradesh. Settings and Design: Cross-sectional, hospital-based survey in the Government Maternity Hospital (GMH, Tirupati, a tertiary care center. Materials and Methods: Fifty women delivered normally in GMH through convenient sampling technique. Data collected on standardized pro forma as per IMS Institute of Healthcare Informatics. Statistical Analysis Used: Is done through MS Excel 2007, Epi Info 7 (of Centres for Disease Control and Prevention, Atlanta, USA and frequencies were described. Results: Distance, waiting hours, societal responsibility, nature of the illness, presumed commercialization of Medicare system, attitudes of health care providers, and loss of wages were not barriers for accessing health care. Accredited Social Health Activist (ASHA and availability of ambulance services made great improvements in health care accessibility. Absenteeism of health care providers is a problem. Conclusions: Expanding the ambulance services and ASHA network will be an effective measure for further accessibility to health care. Absenteeism of health care providers needs correction.

  13. Wòch nan Soley: the denial of the right to water in Haiti.

    Science.gov (United States)

    Varma, Monika Kalra; Satterthwaite, Margaret L; Klasing, Amanda M; Shoranick, Tammy; Jean, Jude; Barry, Donna; Fawzi, Mary C Smith; McKeever, James; Lyon, Evan

    2008-01-01

    This article combines health and water research results, evidence from confidential documents released under the Freedom of Information Act, legal analysis, and discussion of historical context to demonstrate that actions taken by the international community through the Inter-American Development Bank are directly related to a lack of access to clean water in Haiti. The article demonstrates that these actions constitute a clear violation of Haitians' right to water under both domestic and international law. The article exposes the United States governments role in blocking the disbursal of millions of dollars in international bank loans that would have had life-saving consequences for the Haitian people. The loans were derailed in 2001 by politically-motivated interventions on behalf of the US and other members of the international community in direct violation of the Inter-American Development Bank charter. To demonstrate the impact of these interventions, the article presents data gathered in a study that employed human rights and public health methodologies to assess the right to water in Haiti. The data reveal that Haitians experience obstacles concerning every aspect of the right to water: diffculties with water availability, limited physical and economic accessibility, and poor water quality. The article provides a framework of concrete duties and obligations that should be followed by all actors involved in Haiti in order to realize Haitians' human right to water. In response to the undeniable link between the international community's political interference and the intolerably poor state of potable water in Haiti, the article concludes with a recommendation that all actors in Haiti follow a rights-based approach to the development and implementation of water projects in Haiti. The full report of Wòch nan Soley: The Denial of the Right to Water in Haiti is available online at http://www.pih.org/inforesources/Reports/Hait_Report_FINAL.pdf.

  14. Usability evaluation of the South African National Accessibility Portal interactive voice response system

    CSIR Research Space (South Africa)

    Greeff, M

    2008-10-01

    Full Text Available One of the most prominent problems that persons with disabilities face in South Africa, is access to relevant disability related information. To address this need the South African National Accessibility Portal (NAP Portal) was developed...

  15. AGRICULTURAL COOPERATIVE FIRMS: BUDGETARY ADJUSTMENTS AND ANALYSIS OF CREDIT ACCESS APPLYING SCORING SYSTEMS

    Directory of Open Access Journals (Sweden)

    Giuseppe Bonazzi

    2014-01-01

    Full Text Available Cooperatives are one of the most important types of companies in the agricultural sector. Cooperatives allow overcoming the limitations of the fragmentation of agricultural property, increasing the level of production of small-sized farms and selling the product so that it reaches a sufficient critical mass. Moreover, cooperatives are often characterized by undercapitalization and even difficult credit access because banks conduct their analysis applying rating systems that do not take into account the typicality of the cooperative budget. To assess this topic, in this article, an analysis has been conducted on a sample of 100 cooperatives, making adjustments to the annual budget in order to consider the typicality of their annual accounts. The results of the analysis show that suggested adjustments allow a more correct expression of the economic results and capital adequacy of the cooperative and that the results, expressed in terms of scoring, are higher than that achieved by a traditional analysis. This methodology could improve the credit access capacity for agricultural cooperatives and then reduce financial constraints, particularly in developing countries.

  16. Influence of access to an integrated trauma system on in-hospital mortality and length of stay.

    Science.gov (United States)

    Kuimi, Brice L Batomen; Moore, Lynne; Cissé, Brahim; Gagné, Mathieu; Lavoie, André; Bourgeois, Gilles; Lapointe, Jean

    2015-07-01

    Few data are available on population-based access to specialised trauma care and its influence on patient outcomes in an integrated trauma system. We aimed to evaluate the influence of access to an integrate trauma system on in-hospital mortality and length of stay (LOS). All adults admitted to acute care hospitals for major trauma [International Classification of Diseases Injury Severity Score (ICISStrauma system between 2006 and 2011 were included using an administrative hospital discharge database. The influence of access to an integrated trauma system on in-hospital mortality and LOS was assessed globally and for critically injured patients (ICISSinjury [traumatic brain injury (TBI), abdominal/thoracic, spine, orthopaedic] using logistic and linear multivariable regression models. We identified 22,749 injury admissions. In-hospital mortality was 7% and median LOS was 9 days for all injuries. Overall, 92% of patients were treated within the trauma system. Globally, patients who did not have access had similar mortality and LOS compared to patients who had access. However, we observed a 62% reduction in mortality for critical abdominal/thoracic injuries (odds ratio=0.38; 95% CI, 0.16-0.92) and an 8% increase in LOS for TBI patients (geometric mean ratio=1.08; 95% CI, 1.02-1.14) treated within the trauma system. Results provides evidence that in a health system with an integrated mature trauma system, access to specialised trauma care is high and the small proportion of patients treated outside the system, have similar mortality and LOS compared to patients treated within the system. This study suggests that the Québec trauma system performs well in its mandate to offer appropriate treatment to victims of injury that require specialised care. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  18. Single-port-access surgery with a novel magnet camera system.

    Science.gov (United States)

    Terry, Benjamin S; Mills, Zachary C; Schoen, Jonathan A; Rentschler, Mark E

    2012-04-01

    In this paper, we designed, built, and tested a novel single-port access laparoscopic surgery (SPA) specific camera system. This device (magnet camera) integrates a light source and video camera into a small, inexpensive, portable package that does not compete for space with the surgical tools during SPA. The device is inserted through a 26-mm incision in the umbilicus, followed by the SPA port, which is used to maintain an insufflation seal and support the insertion of additional tools. The camera, now in vivo, remains separate from the SPA port, thereby removing the need for a dedicated laparoscope, and, thus, allowing for an overall reduction in SPA port size or the use of a third tool through the insertion port regularly reserved for the traditional laparoscope. The SPA camera is mounted to the abdominal ceiling using one of the two methods: fixation to the SPA port through the use of a rigid ring and cantilever bar, or by an external magnetic handle. The purpose of the magnet camera system is to improve SPA by: 1) eliminating the laparoscope SPA channel; 2) increasing the field of view through enhanced camera system mobility; and 3) reducing interference between the camera system and the surgical tools at the port, both in vivo and ex vivo.

  19. Posture-Dependent Human 3He Lung Imaging in an Open Access MRI System: Initial Results

    CERN Document Server

    Tsai, L L; Li, C -H; Rosen, M S; Patz, S; Walsworth, R L

    2007-01-01

    The human lung and its functions are extremely sensitive to orientation and posture, and debate continues as to the role of gravity and the surrounding anatomy in determining lung function and heterogeneity of perfusion and ventilation. However, study of these effects is difficult. The conventional high-field magnets used for most hyperpolarized 3He MRI of the human lung, and most other common radiological imaging modalities including PET and CT, restrict subjects to lying horizontally, minimizing most gravitational effects. In this paper, we briefly review the motivation for posture-dependent studies of human lung function, and present initial imaging results of human lungs in the supine and vertical body orientations using inhaled hyperpolarized 3He gas and an open-access MRI instrument. The open geometry of this MRI system features a "walk-in" capability that permits subjects to be imaged in vertical and horizontal positions, and potentially allows for complete rotation of the orientation of the imaging su...

  20. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    Science.gov (United States)

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning.

  1. Joint robustness security in optical OFDM access system with Turbo-coded subcarrier rotation.

    Science.gov (United States)

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun; Wang, Yongjun

    2015-01-12

    This paper proposes a novel robust physical secure method for optical orthogonal frequency division multiplexing (OFDM) access system based on Turbo-coded subcarrier rotation. It can realize a secure communication while keep robustness to channel noise. The subcarrier rotation is controlled by the interleaver module of Turbo coding, which is under the charge of Logistic map. The random puncturing can further enhance the security. The channel feedback can ensure the puncturing module working at a suitable coding rate. A 72.28 Gb/s encrypted 16QAM-OFDM signal is successfully demonstrated in the experiment. The results show robust performance under different channel noise conditions and good resistance to illegal optical network unit (ONU).

  2. Parent Burden in Accessing Outpatient Psychiatric Services for Adolescent Depression in a Large State System.

    Science.gov (United States)

    Gallo, Kaitlin P; Olin, S Serene; Storfer-Isser, Amy; O'Connor, Briannon C; Whitmyre, Emma D; Hoagwood, Kimberly E; Horwitz, Sarah McCue

    2017-04-01

    This study examined barriers facing parents who seek outpatient psychiatric care in a large state system for adolescents with depression. A total of 264 outpatient facilities licensed to treat youths in New York were contacted by using a mystery shopper methodology. Callers tracked the number of call attempts, in-person appointments, and other steps required prior to seeing a psychiatrist. Fewer than two-thirds of parents made a psychiatry, therapy, or intake appointment. Of those who did not make an appointment, 19% received no referrals. Most callers made at least two calls and spoke with at least two people before initiating scheduling. Virtually all clinics required at least one intake or therapy appointment before receipt of a psychiatry appointment. Parental burden did not differ by region, urbanicity, clinic type, seasonality (spring or summer), or insurance status. Families of youths with mental health needs face considerable burden in accessing timely treatment.

  3. Interoperable Medical Instrument Networking and Access System with Security Considerations for Critical Care

    Directory of Open Access Journals (Sweden)

    Deniz Gurkan

    2010-01-01

    Full Text Available The recent influx of electronic medical records in the health care field, coupled with the need of providing continuous care to patients in the critical care environment, has driven the need for interoperability of medical devices. Open standards are needed to support flexible processes and interoperability of medical devices, especially in intensive care units. In this paper, we present an interoperable networking and access architecture based on the CAN protocol. Predictability of the delay of medical data reports is a desirable attribute that can be realized using a tightly-coupled system architecture. Our simulations on network architecture demonstrate that a bounded delay for event reports offers predictability. In addition, we address security issues related to the storage of electronic medical records. We present a set of open source tools and tests to identify the security breaches, and appropriate measures that can be implemented to be compliant with the HIPAA rules.

  4. Multiagent -Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Li Husheng

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of -learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the -learning are illustrated using a Metrick-Polak plot, which shows the traces of -values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent -learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  5. Treatment Trends for Stage I Testicular Seminoma in an Equal-Access Medical System.

    Science.gov (United States)

    Wingate, Jonathan T; Etzioni, Ruth; Macdonald, Dusten M; Brand, Timothy C

    2016-10-01

    The practice patterns for adjuvant therapies for stage I seminoma are rapidly evolving, and surveillance is currently preferred. How these recommendations have affected contemporary practice in an equal-access US population is unknown. A total of 436 men diagnosed with clinical stage IA-IB seminoma from 2001 to 2011 were identified in the Automated Central Tumor Registry (ACTUR). The ACTUR is the cancer registry system for the Department of Defense. Logistic regression models analyzed the association between patient characteristics and adjuvant therapy. Overall and recurrence-free survival were determined from Kaplan-Meier analysis. The use of adjuvant radiotherapy in this population decreased significantly from 2001 to 2011. In 2001, 83.9% of patients received radiotherapy compared with only 24.0% in 2011. During that period, a concomitant increase occurred in the use of chemotherapy from 0% to 38.0%. A later year of diagnosis was significantly associated with a greater rate of receiving chemotherapy relative to radiotherapy (P associated with the receipt of surveillance (P = .412 for 2006-2011 vs. 2001-2005; odds ratio, 0.83; 95% CI, 0.54-1.29). Black race or age was not significantly associated with adjuvant therapy. With a median follow-up period of 4.7 years, the 5-year overall and recurrence-free survival rates were 98.0% and 77.0%, respectively. The use of adjuvant radiotherapy has been replaced by chemotherapy for clinical stage I testicular seminoma in an equal-access system. The lack of an increase in active surveillance in our cohort might represent overtreatment of the population. Published by Elsevier Inc.

  6. Detection of Denial of Service Attack in Wireless Network using Dominance based Rough Set

    Directory of Open Access Journals (Sweden)

    N. Syed Siraj Ahmed

    2015-12-01

    Full Text Available Denial-of-service (DoS attack is aim to block the services of victim system either temporarily or permanently by sending huge amount of garbage traffic data in various types of protocols such as transmission control protocol, user datagram protocol, internet connecting message protocol, and hypertext transfer protocol using single or multiple attacker nodes. Maintenance of uninterrupted service system is technically difficult as well as economically costly. With the invention of new vulnerabilities to system new techniques for determining these vulnerabilities have been implemented. In general, probabilistic packet marking (PPM and deterministic packet marking (DPM is used to identify DoS attacks. Later, intelligent decision proto-type was proposed. The main advantage is that it can be used with both PPM and DPM. But it is observed that, data available in the wireless network information system contains uncertainties. Therefore, an effort has been made to detect DoS attack using dominance based rough set. The accuracy of the proposed model obtained over the KDD cup dataset is 99.76 and it is higher than the accuracy achieved by resilient back propagation (RBP model.

  7. Promoting discovery and access to real time observations produced by regional coastal ocean observing systems

    Science.gov (United States)

    Anderson, D. M.; Snowden, D. P.; Bochenek, R.; Bickel, A.

    2015-12-01

    In the U.S. coastal waters, a network of eleven regional coastal ocean observing systems support real-time coastal and ocean observing. The platforms supported and variables acquired are diverse, ranging from current sensing high frequency (HF) radar to autonomous gliders. The system incorporates data produced by other networks and experimental systems, further increasing the breadth of the collection. Strategies promoted by the U.S. Integrated Ocean Observing System (IOOS) ensure these data are not lost at sea. Every data set deserves a description. ISO and FGDC compliant metadata enables catalog interoperability and record-sharing. Extensive use of netCDF with the Climate and Forecast convention (identifying both metadata and a structured format) is shown to be a powerful strategy to promote discovery, interoperability, and re-use of the data. To integrate specialized data which are often obscure, quality control protocols are being developed to homogenize the QC and make these data more integrate-able. Data Assembly Centers have been established to integrate some specialized streams including gliders, animal telemetry, and HF radar. Subsets of data that are ingested into the National Data Buoy Center are also routed to the Global Telecommunications System (GTS) of the World Meteorological Organization to assure wide international distribution. From the GTS, data are assimilated into now-cast and forecast models, fed to other observing systems, and used to support observation-based decision making such as forecasts, warnings, and alerts. For a few years apps were a popular way to deliver these real-time data streams to phones and tablets. Responsive and adaptive web sites are an emerging flexible strategy to provide access to the regional coastal ocean observations.

  8. [Sometimes We Should Maintain a Mental Distance from a Patient--Relevance to Caring for Cancer Patients in Denial].

    Science.gov (United States)

    Akechi, Tatsuo

    2015-01-01

    In Japan, cancer has been the leading cause of death since 1981 and is the most common and representative life-threatening disease. Cancer treatment has markedly progressed, and so the development of cancer is now not necessarily a death sentence. Nevertheless, approximately half of cancer patients actually die as a result of the disease even today. Cancer causes marked suffering of patients. Patients with advanced and/or terminal cancer suffer from various physical symptoms and are forced to face a continuous decline in their physical function, and previous studies reported that psychological distress is frequently observed in cancer patients, especially in advanced and/or terminally ill patients. Several types of psychological defense mechanism, especially denial, are frequently observed in these patients. There are multiple levels of denial For example, a patient with true denial denies the presence of cancer itself, although true denial is quite rare. A patient with moderate denial is likely to deny an association between distressing symptoms and disease, while one with mild denial denies the life-threatening nature of disease. Denial is a psychological defense mechanism that often helps advanced cancer patients to manage their anxiety and depression. It allows such patients to continue living while facing the painfulness of their situation. In this situation, it is important for therapists to note the patient's denial. Simply being aware of the denial can, in itself, be supportive for the patient. However, when denial does not work adaptively, such as it prohibiting adherence to necessary treatment and not being useful for ameliorating psychological distress and improving the quality of life, medical staff may consider confronting a patient with the reality of the situation carefully. This paper discusses the relevance of acknowledging denial and caring for patients with denial from the point of view of psycho-oncology.

  9. Establishment of Security Broadband Access System%一个安全宽带接入系统的建立

    Institute of Scientific and Technical Information of China (English)

    李健; 知俊民; 王晓明; 盖磊

    2012-01-01

    针对原有宽带接入方式缺少安全认证和审计、容易遭受网络攻击等不足,提出一个安全宽带接入方案,建立安全宽带接入系统,包括基于双ISP的接入系统、PPPoE+RADIUS认证系统以及基于JSP的宽带查询系统,应用结果证明,该系统能有效提高宽带接入的安全性和可靠性.%The existing inadequacies of CTBT beijing NDC broadband access system is analyzed in this paper, such as no authentication and audit, being susceptible to network attacks and so on. A new security broadband access solution is designed. The security broadband access system is sec up, including dual ISP access. PPPOE+RADIUS access authentication system and query system based on JSP are realized. The system's security, availability, reliability are proved in application.

  10. A web product data management system based on Simple Object Access Protocol

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the serverside technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture,a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.

  11. A SYSTEM FOR ACCESSING A COLLECTION OF HISTOLOGY IMAGES USING CONTENT-BASED STRATEGIES

    Directory of Open Access Journals (Sweden)

    Camargo J

    2010-12-01

    Full Text Available Histology images are an important resource for research, education and medical practice. The availability of image collections with reference purposes is limited to printed formats such as books and specialized journals. When histology image sets are published in digital formats, they are composed of some tens of images that do not represent the wide diversity of biological structures that can be found in fundamental tissues. Making a complete histology image collection available to the general public having a great impact on research and education in different areas such as medicine, biology and natural sciences. This work presents the acquisition process of a histology image collection with 20,000 samples in digital format, from tissue processing to digital image capturing. The main purpose of collecting these images is to make them available as reference material to the academic comunity. In addition, this paper presents the design and architecture of a system to query and explore the image collection, using content-based image retrieval tools and text-based search on the annotations provided by experts. The system also offers novel image visualization methods to allow easy identification of interesting images among hundreds of possible pictures. The system has been developed using a service-oriented architecture and allows web-based access in http://www.informed.unal.edu.co

  12. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  13. Implement Instructions Access Files Directly in Operating Systems%在操作系统实现指令对文件的直接寻址

    Institute of Scientific and Technical Information of China (English)

    刘福岩; 尤晋元

    2000-01-01

    In this paper, the concept and implementation of Instructions Directly Access File are discussed,its advantage and profit are analysed. The author belives Instructions Directly Access File should be adopted in operating system.

  14. A comparison of the boomerang wire vascular access management system versus manual compression alone during percutaneous diagnostic and interventional cardiovascular procedures.

    Science.gov (United States)

    Echeverria, Angela; Krajcer, Zvonimir

    2016-01-01

    Vascular closure devices allow for early sheath removal, allowing for earlier patient mobilization The Boomerang vascular access management system does not alter arterial integrity for future interventions Access site complications provide significant morbidity in diagnostic and therapeutic interventions.

  15. Insurance denials for cancer clinical trial participation after the Affordable Care Act mandate.

    Science.gov (United States)

    Mackay, Christine B; Antonelli, Kaitlyn R; Bruinooge, Suanna S; Saint Onge, Jarron M; Ellis, Shellie D

    2017-08-01

    The Affordable Care Act (ACA) includes a mandate requiring most private health insurers to cover routine patient care costs for cancer clinical trial participation; however, the impact of this provision on cancer centers' efforts to accrue patients to clinical trials has not been well described. First, members of cancer research centers and community-based institutions (n = 252) were surveyed to assess the status of insurance denials, and then, a focused survey (n = 77) collected denial details. Univariate and multivariate analyses were used to examine associations between the receipt of denials and site characteristics. Overall, 62.7% of the initial survey respondents reported at least 1 insurance denial during 2014. Sites using a precertification process were 3.04 times more likely to experience denials (95% confidence interval, 1.55-5.99; P ≤ .001), and similar rates of denials were reported from sites located in states with preexisting clinical trial coverage laws versus states without them (82.3% vs 85.1%; χ = 50.7; P ≤ .001). Among the focused survey sites, academic centers reported denials more often than community sites (71.4% vs 46.4%). The failure of plans to cover trial participation was cited as the most common reason provided for denials (n = 33 [80.5%]), with nearly 80% of sites (n = 61) not receiving a coverage response from the insurer within 72 hours. Despite the ACA's mandate for most insurers to cover routine care costs for cancer clinical trial participation, denials and delays continue. Denials may continue because some insurers remain exempt from the law, or they may signal an implementation failure. Delays in coverage may affect patient participation in trials. Additional efforts to eliminate this barrier will be needed to achieve federal initiatives to double the pace of cancer research over the next 5 years. Future work should assess the law's effectiveness at the patient level to inform these efforts

  16. Implementation the NASA Planetary Data System PDS4 Providing Access to LADEE Data

    Science.gov (United States)

    Beebe, Reta F.; Huber , Lyle; Neakrase, Lynn; Reese, Shannon; Crichton, Daniel; Hardman, Sean; Delory, Gregory; Neese, Carol

    2014-11-01

    The NASA Planetary Data System (PDS) is responsible for archiving all planetary data acquired by robotic missions, and observational campaigns with ground/space-based observatories. PDS has moved to version 4 of its archive system. PDS4 uses XML to enhance search and retrieval capabilities. Although the efforts are system wide, the Atmospheres Node has acted as the lead node and is presenting a preliminary users interface for retrieval of LADEE data. LADEE provides the first opportunity to test out the end-to-end process of archiving data from an active mission into the new PDS4 architecture. The limited number of instruments, with simple data structures, is an ideal test of PDS4. XML uses schema (analogous to blueprints) to control the structure of the corresponding XML labels. In the case of PDS4, these schemas allow management of the labels and their content by forcing validation dictated by the underlying Information Model (IM). The use of a central IM is a vast improvement over PDS3 because of the uniformity it provides across all nodes. PDS4 has implemented a product-centric approach for archiving data and supplemental documentation. Another major change involves the Central Registry, where all products are registered and accessible to search engines. Under PDS4, documents, data, and other ancillary data are all products that are registered in the system. Together with the XML implementation, the Registry allows the search routines to be more complex and inclusive than they have been in the past. For LADEE, the PDS nodes and LADEE instrument teams worked together to identify data products that LADEE would produce. Documentation describing instruments and data products were produced by the teams and peer reviewed by PDS. XML label templates were developed by the PDS and provided to the instrument teams to integrate into their pipelines. Data from the primary mission (100 days) have been certified and harvested into the registry and are accessible through the

  17. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...

  18. National Geothermal Data System: Transforming the Discovery, Access, and Analytics of Data for Geothermal Exploration

    Energy Technology Data Exchange (ETDEWEB)

    Patten, Kim [Arizona Geological Survey

    2013-05-01

    Compendium of Papers from the 38th Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California February 11-13, 2013 The National Geothermal Data System (NGDS) is a distributed, interoperable network of data collected from state geological surveys across all fifty states and the nation’s leading academic geothermal centers. The system serves as a platform for sharing consistent, reliable, geothermal-relevant technical data with users of all types, while supplying tools relevant for their work. As aggregated data supports new scientific findings, this content-rich linked data ultimately broadens the pool of knowledge available to promote discovery and development of commercial-scale geothermal energy production. Most of the up-front risks associated with geothermal development stem from exploration and characterization of subsurface resources. Wider access to distributed data will, therefore, result in lower costs for geothermal development. NGDS is on track to become fully operational by 2014 and will provide a platform for custom applications for accessing geothermal relevant data in the U.S. and abroad. It is being built on the U.S. Geoscience Information Network (USGIN) data integration framework to promote interoperability across the Earth sciences community. The basic structure of the NGDS employs state-of-the art informatics to advance geothermal knowledge. The following four papers comprising this Open-File Report are a compendium of presentations, from the 38th Annual Workshop on Geothermal Reservoir Engineering, taking place February 11-13, 2013 at Stanford University, Stanford, California. “NGDS Geothermal Data Domain: Assessment of Geothermal Community Data Needs,” outlines the efforts of a set of nationwide data providers to supply data for the NGDS. In particular, data acquisition, delivery, and methodology are discussed. The paper addresses the various types of data and metadata required and why simple links to existing

  19. ABSTRACT MODELS FOR SYSTEM VIRTUALIZATION

    Directory of Open Access Journals (Sweden)

    M. G. Koveshnikov

    2015-05-01

    Full Text Available The paper is dedicated to issues of system objects securing (system files and user system or application configuration files against unauthorized access including denial of service attacks. We have suggested the method and developed abstract system virtualization models, which are used toresearch attack scenarios for different virtualization modes. Estimation for system tools virtualization technology effectiveness is given. Suggested technology is based on redirection of access requests to system objects shared among access subjects. Whole and partial system virtualization modes have been modeled. The difference between them is the following: in the whole virtualization mode all copies of access system objects are created whereon subjects’ requests are redirected including corresponding application objects;in the partial virtualization mode corresponding copies are created only for part of a system, for example, only system objects for applications. Alternative solutions effectiveness is valued relating to different attack scenarios. We consider proprietary and approved technical solution which implements system virtualization method for Microsoft Windows OS family. Administrative simplicity and capabilities of correspondingly designed system objects security tools are illustrated on this example. Practical significance of the suggested security method has been confirmed.

  20. 10 CFR 62.12 - Contents of a request for emergency access: General information.

    Science.gov (United States)

    2010-01-01

    ... is requested, including— (1) The characteristics and composition of the waste, including, but not... chemical composition; (iii) Physical state (solid, liquid, gas); (iv) Type of solidification media; and (v..., including— (1) The circumstances that led to the denial of access to existing low-level radioactive...

  1. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    Science.gov (United States)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  2. Air Superiority And The Anti Access/Area Denial Environment In The Asia pacific In 2044

    Science.gov (United States)

    2014-04-01

    advanced air defenses, mining, and other methods, to complicate our operational calculus …. Accordingly, the U.S. military will invest as required...MA: Pearson , 2013), 243-248. 6 Ibid., 248-251. 7 Ibid., 243. 8 Banyan, “Hai-handed,” The Economist, 13 January 2014, http://www.economist.com...Nye Jr. and David A. Welch, Understanding Global Conflict and Cooperation: An Introduction to Theory and History, 9th ed. (Boston, MA: Pearson , 2013

  3. The Army’s Role in Overcoming Anti-Access and Area Denial Challenges

    Science.gov (United States)

    2013-01-01

    numbers. Additionally, for nations that possess these kinds of advanced capa - bilities, the norm is for the larger portion of the missile inventory to...might be the most appealing option to an opponent. Additionally, an initial high- altitude burst could serve as a stern warning that further nuclear...force ratio and capa - bility disparity are combined with current and continued threat advancement, the challenge to the joint forces can be substantial

  4. Integrating the Land and Air Components in an Anti-Access/Area Denial Environment

    Science.gov (United States)

    2013-06-01

    August 1990, Iraq invaded the sovereign nation of Kuwait . In response, the United States mobilized and deployed between 575,000 and 700,000 personnel to...Regan Books, 2004. Grau, Lester W. and Dodge Billingsley. Operation ANACONDA: America’s First Major Battle in Afghanistan. Lawrence, KA : University

  5. Command and Control in the Anti-Access/Area Denial Environment

    Science.gov (United States)

    2014-02-13

    and be able to share SA across domains.14 This will require technical solutions along with increased emphasis on education and theory to promote...61 This mental flexibility will require a greater emphasis on education and theory than technical expertise. Kometer stresses the importance of...Rest of the C2 Iceberg ,” Air and Space Power Journal 28, no. 4 (July-August 2014): 41. 11 Lt Col Paul J. Maykish, “C2 Rising: A Historical View of

  6. The Future of Armor in an Anti-Access Area Denial Environment

    Science.gov (United States)

    2014-06-13

    definitions of what a theory is, this thesis will 82John W. Creswell , Qualitative Inquiry and Research Design: Choosing Among Five Approaches (Thousand......H., with George Sullivan, and William D. Sullivan. Lessons of the 2006 Israeli-Hezbollah War. Washington, DC: The CSIS Press, 2007. Creswell , John W

  7. Basing Strategies for Air Refueling Forces in Anti-access/Area-Denial Environments

    Science.gov (United States)

    2015-09-01

    millions of ethnic and recent- migrant Chinese nationals present in every Asia-Pacific country.6 Formidable as the Chinese battle array has become, it is...LaguindinganOzamiz Pagadia Zamboanga Santos Bangoy KC-46-capable aireld KC-130J-/A400M-capable aireld Ormoc Mactan Bohol Tagbilaran Negros Cebu Figure

  8. Improving Standoff Bombing Capacity in the Face of Anti-Access Area Denial Threats

    Science.gov (United States)

    2015-09-01

    using a visual software package called Analytica. Excel was used as a primary interface between Analytica models. Multi-model Structure and...the pallets would be 1,800 lbs. or 4% of the C-130 available payload. This may sounds like an optimistic assumption. The truth is that the uncertainty...Eckbreth, Alan, Charles Saff, Kevin Connolly, Natalie Crawford, Chris Eick, Mark Goorsky, Neil Kacena, David Miller, Robert Schafrik, and Douglas

  9. 22 CFR 212.36 - Denial of request for access to records.

    Science.gov (United States)

    2010-04-01

    ... a request for records may be made, initially, only by the Chief, Customer Outreach and Oversight... Administrative Services, Bureau for Management, Room 803, SA-2, Agency for International Development, 21st and Virginia Ave., N.W., Washington, D.C., 20523-0217. (2) In order for the Agency to make a timely response to...

  10. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Science.gov (United States)

    2010-10-01

    ... status, the aircraft operator must request from the individual a verifying identity document pursuant to... B. The individual must present a verifying identity document to the covered aircraft operator at the... identity document, the covered aircraft operator must transmit the SFPD elements from the...

  11. Improving Standoff Bombing Capacity in the Face of Anti-Access Area Denial Threats

    Science.gov (United States)

    2015-02-01

    Akaike information criterion (AIC), and Bayesian information criterion (BIC) in all combinations of the potential covariates.140 However, the top ranked...For More Information Visit RAND at www.rand.org Explore the Pardee RAND Graduate School View document details Support RAND Browse Reports & Bookstore...Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint

  12. The Bears Den: Russian Anti Access/Area Denial in the Maritime Domain

    Science.gov (United States)

    2016-05-01

    developing A2/AD “bubbles” in four areas: the Baltic, the Black Sea, Syria , and the Arctic. AU/ACSC/Wemyss, Matthew J./AY16 v Long-range missile...US’s attention.42 Russian President Vladimir Putin called the collapse of the Soviet Union “the greatest geopolitical catastrophe of the 20th...AD “bubbles” that take advantage of regional geography: the Baltic, the Black Sea, and Syria .46 A fourth area of A2/AD concern has developed in

  13. A surveillance system for monitoring, public reporting, and improving minority access to cancer clinical trials.

    Science.gov (United States)

    Carpenter, William R; Tyree, Seth; Wu, Yang; Meyer, Anne-Marie; DiMartino, Lisa; Zullig, Leah; Godley, Paul A

    2012-08-01

    The Institute of Medicine (IOM) has recommended that each person with cancer should have access to clinical trials, which have been associated with improving care quality and disparities. With no effective enrollment monitoring system, patterns of trial enrollment remain unclear. We developed a population-based, statewide system designed to facilitate monitoring of cancer trial enrollment and targeting of future interventions to improve it. Person-level cancer incidence data from the North Carolina Central Cancer Registry (NCCCR), person-level treatment trial accrual data from the National Cancer Institute (NCI), and county-level Area Resource Files (ARF) measures for 12 years, 1996-2007, were studied. Deidentified person-level data necessitated county-level analysis. Enrollment rates were estimated as the ratio of trial enrollment to cancer incidence for each race, gender, year, and county combination. Multivariable analysis examined factors associated with trial accrual. Sensitivity analyses examined spurious fluctuations and temporal discordance of incidence and enrollment. The NCI treatment trial enrollment rate was 2.39% for whites and 2.20% for minorities from 1996 to 2007, and 2.88% and 2.47%, respectively, from 2005 to 2007. Numerous counties had no minority enrollment. The 2005-2007 enrollment rates for white and minority females was 4.04% and 3.59%, respectively, and for white and minority males was 1.74% and 1.36%, respectively. Counties with a medical school or NCI Community Clinical Oncology Program (CCOP)-affiliated practice had higher trial enrollment. We examined NCI trial accrual only - industry-sponsored and investigator-initiated trials were excluded; however, studies comprise the majority of all clinical trial participants. Delays in data availability may hinder the immediacy of population-based analyses. Model stability and consistency suggest that this system is effective for population-based enrollment surveillance. For North Carolina, it

  14. The Earth System Grid Federation : an Open Infrastructure for Access to Distributed Geospatial Data

    Science.gov (United States)

    Cinquini, Luca; Crichton, Daniel; Mattmann, Chris; Harney, John; Shipman, Galen; Wang, Feiyi; Ananthakrishnan, Rachana; Miller, Neill; Denvil, Sebastian; Morgan, Mark; Pobre, Zed; Bell, Gavin M.; Drach, Bob; Williams, Dean; Kershaw, Philip; Pascoe, Stephen; Gonzalez, Estanislao; Fiore, Sandro; Schweitzer, Roland

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  15. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems

    Directory of Open Access Journals (Sweden)

    Danish Shehzad

    2016-01-01

    Full Text Available Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.

  16. The Earth System Grid Federation: An Open Infrastructure for Access to Distributed Geo-Spatial Data

    Energy Technology Data Exchange (ETDEWEB)

    Cinquini, Luca [Jet Propulsion Laboratory, Pasadena, CA; Crichton, Daniel [Jet Propulsion Laboratory, Pasadena, CA; Miller, Neill [Argonne National Laboratory (ANL); Mattmann, Chris [Jet Propulsion Laboratory, Pasadena, CA; Harney, John F [ORNL; Shipman, Galen M [ORNL; Wang, Feiyi [ORNL; Bell, Gavin [Lawrence Livermore National Laboratory (LLNL); Drach, Bob [Lawrence Livermore National Laboratory (LLNL); Ananthakrishnan, Rachana [Argonne National Laboratory (ANL); Pascoe, Stephen [STFC Rutherford Appleton Laboratory, NCAS/BADC; Kershaw, Philip [STFC Rutherford Appleton Laboratory, NCAS/BADC; Gonzalez, Estanislao [German Climate Computing Center; Fiore, Sandro [Euro-Mediterranean Center on Climate Change; Schweitzer, Roland [Pacific Marine Environmental Laboratory, National Oceanic and Atmospheric Administration; Danvil, Sebastian [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement; Morgan, Mark [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF s architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  17. The Earth System Grid Federation: An Open Infrastructure for Access to Distributed Geospatial Data

    Energy Technology Data Exchange (ETDEWEB)

    Ananthakrishnan, Rachana [Argonne National Laboratory (ANL); Bell, Gavin [Lawrence Livermore National Laboratory (LLNL); Cinquini, Luca [Jet Propulsion Laboratory, Pasadena, CA; Crichton, Daniel [Jet Propulsion Laboratory, Pasadena, CA; Danvil, Sebastian [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement; Drach, Bob [Lawrence Livermore National Laboratory (LLNL); Fiore, Sandro [Euro-Mediterranean Center on Climate Change; Gonzalez, Estanislao [German Climate Computing Center; Harney, John F [ORNL; Mattmann, Chris [Jet Propulsion Laboratory, Pasadena, CA; Kershaw, Philip [STFC Rutherford Appleton Laboratory, NCAS/BADC; Miller, Neill [Argonne National Laboratory (ANL); Morgan, Mark [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement; Pascoe, Stephen [STFC Rutherford Appleton Laboratory, NCAS/BADC; Schweitzer, Roland [Pacific Marine Environmental Laboratory, National Oceanic and Atmospheric Administration; Shipman, Galen M [ORNL; Wang, Feiyi [ORNL

    2013-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF s architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  18. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems.

    Science.gov (United States)

    Shehzad, Danish; Bozkuş, Zeki

    2016-01-01

    Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.

  19. Capacitive ECG system with direct access to standard leads and body surface potential mapping.

    Science.gov (United States)

    Oehler, Martin; Schilling, Meinhard; Esperer, Hans Dieter

    2009-12-01

    Capacitive electrodes provide the same access to the human electrocardiogram (ECG) as galvanic electrodes, but without the need of direct electrical skin contact and even through layers of clothing. Thus, potential artifacts as a result of poor electrode contact to the skin are avoided and preparation time is significantly reduced. Our system integrates such capacitive electrodes in a 15 sensor array, which is combined with a Tablet PC. This integrated lightweight ECG system (cECG) is easy to place on the chest wall and allows for simultaneous recordings of 14 ECG channels, even if the patient is slightly dressed, e.g., with a t-shirt. In this paper, we present preliminary results on the performance of the cECG regarding the capability of recording body surface potential maps (BSPMs) and obtaining reconstructed standard ECG leads including Einthoven, Goldberger and, with some limitations, Wilson leads. All signals were measured having the subject lie in a supine position and wear a cotton shirt. Signal quality and diagnostic ECG information of the extracted leads are compared with standard ECG measurements. The results show a very close correlation between both types of ECG measurements. It is concluded that the cECG lends itself to rapid screening in clinically unstable patients.

  20. The Earth System Grid Federation : an Open Infrastructure for Access to Distributed Geospatial Data

    Science.gov (United States)

    Cinquini, Luca; Crichton, Daniel; Mattmann, Chris; Harney, John; Shipman, Galen; Wang, Feiyi; Ananthakrishnan, Rachana; Miller, Neill; Denvil, Sebastian; Morgan, Mark; hide

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  1. A multi-agent conversational system with heterogeneous data sources access

    KAUST Repository

    Eisman, Eduardo M.

    2016-01-28

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  2. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  3. EMODnet Physics: One-stop Portal to access Multiplatform Observing Systems

    Science.gov (United States)

    Novellino, Antonio; Benedetti, Giacomo; D'Angelo, Paolo; Gorringe, Patrick; Thjisse, Peter; Schaap, Dick; Pouliquen, Sylvie; Manzella, Giuseppe

    2016-04-01

    The EMODnet Physics is being developed through a stepwise approach in three major stages and is currently in its second phase of development (2013 - 2016). It is a one-stop portal to access to near real time and historical achieved data sets. It provides a combined array of services and functionalities (such as dynamic map facility for viewing and downloading, dashboard reporting and machine-to-machine communication services) to users for obtaining free of charge data, meta-data and data products on the physical conditions of European sea basins and oceans. Moreover, the system provides full interoperability with third-party software through WMS service, Web Service and Web catalogues in order to exchange data and products according to the most recent standards. In particular, interoperability is assured with the IODE Ocean Data Portal with which EMODnet Physics is collaborating. EMODnet Physics is built on and it is working in coordination and cooperation EuroGOOS-ROOSs, CMEMS and the SeaDataNet network of NODCs. By means of joint activities with its three pillars and with the most relevant Organizations and associations within the sector, EMODnet is undergoing significant improvements and expansion. In the last year, EMODnet Physics has steadily enhanced the number and type of platforms covered providing high quality data integrating sources from a growing network. In particular, a major step forward sees the integration of emerging measuring systems such as HF radars, which are able to provide the resolution of surface current speeds and directions covering large regions of the coastal oceans, and that now do populate the EMODnet Platform. Nowadays the system does integrate information by more than 7.300 stations, among which 2915 moorings, 2728 drifting buoys and around 1200 ARGO floats. EMODnet Physics was also updated with two ready-to-use data products: the Ice (Copernicus CMEMS - SEAICE_GLO_SEAICE_L4_NRT_OBSERVATIONS_011_001) and Sea Level Trends (produced

  4. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  5. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  6. FUZZY MODELLING OF A NETWORK DENIAL OF SERVICE (DOS ATTACK PHENOMENON.

    Directory of Open Access Journals (Sweden)

    IHEKWEABA. OGECHI

    2013-04-01

    Full Text Available This paper presents the fuzzy modeling of a network Denial of Service (DoS attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic approach as well as an improved mechanism for generating the fuzzy inference rules were outlined. Further, the paper discusses the basic concept of fuzzy logic, fuzzy systems and reasons for their adoption in modern control operations. DoS attack detection, using some basic traffic characteristics: bitrates, entropy and Hurst experiment as it’s inputs, was x-rayed. Here, an attack trace file collected atthe edge router of the Computer Science Department, University of California Los Angeles was used to develop the fuzzy inference model.The data set was partitioned into a training dataset and a testing dataset. The fuzzy concept learning system (FCLS algorithm was used for constructing the fuzzy decision tree, using the trace files.Inference rules were then generated from the constructed decision tree. The simulation and evaluation of the fuzzy model was performed with the testing dataset.

  7. Packet track and traceback mechanism against denial of service attacks

    Institute of Scientific and Technical Information of China (English)

    LI Li; SHEN Su-bin

    2008-01-01

    The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and traceback mechanism is proposed, which features rapid response and high accuracy. In this scheme, routers apply packet marking scheme and send traceback messages, which enables the victim to design the path tree in peace time. During attack times the victim can trace attackers back within the path tree and perform rapid packet filtering using the marking in each packet. Traceback messages overcome Pi's limitation, wherein too much path information is lost in path identifiers; whereas path identifiers can be used to expedite the design of the path-tree, which reduces the high overhead in iTrace. Therefore, our scheme not only synthesizes the advantages but also compromises the disadvantages of the above two methods. Simulation results with NS-2 show the validity of our scheme.

  8. Lay denial of knowledge for justified true beliefs.

    Science.gov (United States)

    Nagel, Jennifer; Juan, Valerie San; Mar, Raymond A

    2013-12-01

    Intuitively, there is a difference between knowledge and mere belief. Contemporary philosophical work on the nature of this difference has focused on scenarios known as "Gettier cases." Designed as counterexamples to the classical theory that knowledge is justified true belief, these cases feature agents who arrive at true beliefs in ways which seem reasonable or justified, while nevertheless seeming to lack knowledge. Prior empirical investigation of these cases has raised questions about whether lay people generally share philosophers' intuitions about these cases, or whether lay intuitions vary depending on individual factors (e.g. ethnicity) or factors related to specific types of Gettier cases (e.g. cases that include apparent evidence). We report an experiment on lay attributions of knowledge and justification for a wide range of Gettier Cases and for a related class of controversial cases known as Skeptical Pressure cases, which are also thought by philosophers to elicit intuitive denials of knowledge. Although participants rated true beliefs in Gettier and Skeptical Pressure cases as being justified, they were significantly less likely to attribute knowledge for these cases than for matched True Belief cases. This pattern of response was consistent across different variations of Gettier cases and did not vary by ethnicity or gender, although attributions of justification were found to be positively related to measures of empathy. These findings therefore suggest that across demographic groups, laypeople share similar epistemic concepts with philosophers, recognizing a difference between knowledge and justified true belief. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. Teenage sexuality and rights in Chile: from denial to punishment.

    Science.gov (United States)

    Casas, Lidia; Ahumada, Claudia

    2009-11-01

    While Chile sees itself as a country that has fully restored human rights since its return to democratic rule in 1990, the rights of teenagers to comprehensive sexuality education are still not being met. This paper reviews the recent history of sexuality education in Chile and related legislation, policies and programmes. It also reports a 2008 review of the bylaws of 189 randomly selected Chilean schools, which found that although such bylaws are mandatory, the absence of bylaws to prevent discrimination on grounds of pregnancy, HIV and sexuality was common. In relation to how sexual behaviour and discipline were addressed, bylaws that were non-compliant with the law were very common. Opposition to sexuality education in schools in Chile is predicated on the denial of teenage sexuality, and many schools punish sexual behaviour where transgression is perceived to have taken place. While the wider Chilean society has been moving towards greater recognition of individual autonomy and sexual diversity, this cultural shift has yet to be reflected in the government's political agenda, in spite of good intentions. Given this state of affairs, the Chilean polity needs to recognise its youth as having human rights, or will continue to fail in its commitment to them.

  10. Interfaces to PeptideAtlas: a case study of standard data access systems.

    Science.gov (United States)

    Killcoyne, Sarah; Handcock, Jeremy; Robinson, Thomas; Deutsch, Eric W; Boyle, John

    2012-09-01

    Access to public data sets is important to the scientific community as a resource to develop new experiments or validate new data. Projects such as the PeptideAtlas, Ensembl and The Cancer Genome Atlas (TCGA) offer both access to public data and a repository to share their own data. Access to these data sets is often provided through a web page form and a web service API. Access technologies based on web protocols (e.g. http) have been in use for over a decade and are widely adopted across the industry for a variety of functions (e.g. search, commercial transactions, and social media). Each architecture adapts these technologies to provide users with tools to access and share data. Both commonly used web service technologies (e.g. REST and SOAP), and custom-built solutions over HTTP are utilized in providing access to research data. Providing multiple access points ensures that the community can access the data in the simplest and most effective manner for their particular needs. This article examines three common access mechanisms for web accessible data: BioMart, caBIG, and Google Data Sources. These are illustrated by implementing each over the PeptideAtlas repository and reviewed for their suitability based on specific usages common to research. BioMart, Google Data Sources, and caBIG are each suitable for certain uses. The tradeoffs made in the development of the technology are dependent on the uses each was designed for (e.g. security versus speed). This means that an understanding of specific requirements and tradeoffs is necessary before selecting the access technology.

  11. Access to planetary science for the broad public: a more familiar planetary nomenclature and terminology system

    Science.gov (United States)

    Hargitai, H.

    The Planetary Sciences in the last decades has accumulated an amount of knowledge that is comparable to other Earth Sciences. The study of planets is not any more a computation of orbital data, but the investigation and description of surface features of dozens of planetary bodies, including our own Earth. This way, it is only an extention of the present Earth sciences like geography, geology, geophisics, meteorolgy etc. In Hungary, Planetary Science studies has been made for decades, but especially today, numerous popular scientific works are published, and the subject of planetology (and also exobiology linked to it) is taught in more and more secondary schools and universities. This ma kes a demand for a Hungarian language terminology and nomenclature in the relatively new discipline of Planetology. It is needed because the present terminology of geosciences is not adequeate for the description of the surface conditions and structures in other planetary bodies. In the mean time it has to be in accord with the Earth-based system. Since this is areal discipline in its subject, it is of high importance that the areas studied be identifiable easily, unambiguously and descriptively. This make s the translation/transcription of IAU's nomenclature our second goal. This is not a simple transliteration of the proper names used in planetary body nomenclatures, but the task is also the setting of the basic rules used in the making of Hungarian nomenclature system. It would be useful, if the system would be useable for any body of the solar system. It has to fit into the system of both the IAU's nomenlcature and the Hungarian geographic name system [1]. This makes a double task: to make a system that is appropriate both linguistically and scientifically. At the same time, in popular science and elementary education, the planetary features' common names and some basic terms should be in the mother languages of the readers, and not in latin or English (outside the anglophone

  12. Implementing Joint Operational Access: From Concept to Joint Force Development

    Science.gov (United States)

    2014-01-01

    global commons.2 Potential enemies are developing antiaccess/area-denial (A2/AD) capabilities3 that could threaten access and jeopardize missions...efforts in U.S. 5th Fleet area of responsibility (U.S. Navy/Travis K. Mendoza ) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting...Military Sealift Command fleet replenishment oiler USNS Guadalupe conduct replenishment at sea (U.S. Navy/Travis K. Mendoza ) 142 Joint Doctrine

  13. Ten Years of China's Accession to the WTO and Changes of Global Multilateral Trading System%Ten Years of China's Accession to the WTO and Changes of Global Multilateral Trading System

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    China's accession to the World Trade Organization has been for ten years. This paper reviews the reform and development after China's accession to the World Trade Organization. In the past ten years, China has contributed to global multilateral trade system in many ways, such as promoting the development of international trade, opposing trade protectionism, faithfully carrying out multilateral trade rules, coordinating multilateral trade negotiations, actively participating in multilateral trading system construction as well as effectively safeguarding the interests of developing countries. For ten years, multilateral trading system has changed mainly in force structure, topic structure and external transparency. Looking into the future, multilateral trade system reform should focus on system construction and opposition to trade protectionism. Finally, based on practice experience in WTO these years, this paper reaches several enlightenments of China's participating in global economic management.

  14. Examining How Web Designers' Activity Systems Address Accessibility: Activity Theory as a Guide

    Science.gov (United States)

    Russell, Kyle

    2014-01-01

    While accessibility of information technologies is often acknowledged as important, it is frequently not well addressed in practice. The purpose of this study was to examine the work of web developers and content managers to explore why and how accessibility is or is not addressed as an objective as websites are planned, built and maintained.…

  15. Big Brother Is Helping You: Supporting Self-Access Language Learning with a Student Monitoring System

    Science.gov (United States)

    Reinders, Hayo

    2007-01-01

    Self-access and language advising are relatively recent and increasingly common types of language support offered in schools and tertiary institutions around the world. There is a great deal of anecdotal support for the positive contribution of such support to student learning. Self-access and language advising hold strong potential as…

  16. United Kingdom's experience. [Power system transmission open access

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, S.M.

    1994-12-01

    This is a presentation of the United Kingdom's experience with power transmission open access. The topics of the presentation include the objectives of changing, commercial arrangements and economic drivers, long term effects, the effects of moving to a more competitive environment, and factors affecting open access such as political climate and market regulation.

  17. 76 FR 32258 - Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI)

    Science.gov (United States)

    2011-06-03

    ... is forestalling complaints about lack of access to Government-provided information and about... the Direct and Indirect Subscribers, the public currently does not have access to concrete information... Government Act, complies with Executive Branch policies and directives, makes Federal Government...

  18. Low-Cost Encoding Device for Optical Code Division Multiple Access System

    Directory of Open Access Journals (Sweden)

    Mohammad S. Ab-Rahman

    2009-01-01

    Full Text Available Problem statement: Instead of using Fiber Bragg Grating (FBG to develop the coded spectrums, which consist of expensive elements, the grating also are highly sensitive to environmental changes and this will contribute to the increment of capital and operational expenditures (CAPEX and OPEX. Approach: This study presented the development of low-cost 16-ports encoding device for Optical Code Division Multiple Access (OCDMA systems based on Arrayed Waveguide Grating (AWG devices and optical switches. The encoding device is one of the new technologies that used to transmit the coded data in the optical communication system by using AWG and optical switches. It provided a high security for data transmission due to all data will be transmitted in binary code form. The output signals from AWG were coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmitted to the receiver. The 16-ports encoding device used 16 Double Pole Double Throw (DPDT toggle switches to control the polarization of voltage source from +5 V to -5 V for 16 optical switches. When +5 V was given, the optical switch will give code '1' and vice versa. Results: We found that the insertion loss, crosstalk, uniformity and Optical Signal-Noise-Ratio (OSNR for the developed prototype are Conclusion: We had successful developed the AWG-based OCDMA encoding device prototype and characterized using linearity testing and continuous signal testing. The developed prototype was expected to be applied in the optical communication system on Passive Optical Networks (PONs.

  19. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  20. Climate Change Denial Books and Conservative Think Tanks: Exploring the Connection.

    Science.gov (United States)

    Dunlap, Riley E; Jacques, Peter J

    2013-06-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites.