WorldWideScience

Sample records for access denial systems

  1. Automated Image Intelligence Adaptive Sensor Management System for High Altitude Long Endurance UAVs in a Dynamic and Anti-Access Area Denial Environment

    Science.gov (United States)

    Kim, Gi Young

    The problem we investigate deals with an Image Intelligence (IMINT) sensor allocation schedule for High Altitude Long Endurance UAVs in a dynamic and Anti-Access Area Denial (A2AD) environment. The objective is to maximize the Situational Awareness (SA) of decision makers. The value of SA can be improved in two different ways. First, if a sensor allocated to an Areas of Interest (AOI) detects target activity, then the SA value will be increased. Second, the SA value increases if an AOI is monitored for a certain period of time, regardless of target detections. These values are functions of the sensor allocation time, sensor type and mode. Relatively few studies in the archival literature have been devoted to an analytic, detailed explanation of the target detection process, and AOI monitoring value dynamics. These two values are the fundamental criteria used to choose the most judicious sensor allocation schedule. This research presents mathematical expressions for target detection processes, and shows the monitoring value dynamics. Furthermore, the dynamics of target detection is the result of combined processes between belligerent behavior (target activity) and friendly behavior (sensor allocation). We investigate these combined processes and derive mathematical expressions for simplified cases. These closed form mathematical models can be used for Measures of Effectiveness (MOEs), i.e., target activity detection to evaluate sensor allocation schedules. We also verify these models with discrete event simulations which can also be used to describe more complex systems. We introduce several methodologies to achieve a judicious sensor allocation schedule focusing on the AOI monitoring value. The first methodology is a discrete time integer programming model which provides an optimal solution but is impractical for real world scenarios due to its computation time. Thus, it is necessary to trade off the quality of solution with computation time. The Myopic Greedy

  2. 22 CFR 212.36 - Denial of request for access to records.

    Science.gov (United States)

    2010-04-01

    ... Section 212.36 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency... responsible for the denial, and the right of the person to appeal the adverse determination. (b) The denial of... Administrative Services, Bureau for Management, Room 803, SA-2, Agency for International Development, 21st...

  3. 28 CFR 17.47 - Denial or revocation of eligibility for access to classified information.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Denial or revocation of eligibility for access to classified information. 17.47 Section 17.47 Judicial Administration DEPARTMENT OF JUSTICE..., the identity of the deciding authority, and written notice of the right to appeal. (d) Within 30...

  4. Denial Logic

    CERN Document Server

    Lengyel, Florian

    2012-01-01

    We define Denial Logic DL, a system of justification logic that models an agent whose justified beliefs are false, who cannot avow his own propositional attitudes and who can believe contradictions but not tautologies of classical propositional logic. Using Artemov's natural semantics for justification logic JL, in which justifications are interpreted as sets of formulas, we provide an inductive construction of models of DL, and prove soundness and completeness results for DL. Some logical notions developed for JL, such as constant specifications and the internalization property, are inconsistent with DL. This leads us to define negative constant specifications for DL, which can be used to model agents with justified false beliefs. Denial logic can therefore be relevant to philosophical skepticism. We use DL with what we call coherent negative constant specifications to model a Putnamian brain in a vat with the justified false belief that it is not a brain in a vat, and derive a model of JL in which "I am a b...

  5. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  6. Imprisoned and imperiled: access to HIV and TB prevention and treatment, and denial of human rights, in Zambian prisons

    Directory of Open Access Journals (Sweden)

    Todrys Katherine W

    2011-02-01

    Full Text Available Abstract Background Although HIV and tuberculosis (TB prevalence are high in prisons throughout sub-Saharan Africa, little research has been conducted on factors related to prevention, testing and treatment services. Methods To better understand the relationship between prison conditions, the criminal justice system, and HIV and TB in Zambian prisons, we conducted a mixed-method study, including: facility assessments and in-depth interviews with 246 prisoners and 30 prison officers at six Zambian prisons; a review of Zambian legislation and policy governing prisons and the criminal justice system; and 46 key informant interviews with government and non-governmental organization officials and representatives of international agencies and donors. Results The facility assessments, in-depth interviews and key informant interviews found serious barriers to HIV and TB prevention and treatment, and extended pre-trial detention that contributed to overcrowded conditions. Disparities both between prisons and among different categories of prisoners within prisons were noted, with juveniles, women, pre-trial detainees and immigration detainees significantly less likely to access health services. Conclusions Current conditions and the lack of available medical care in Zambia's prisons violate human rights protections and threaten prisoners' health. In order to protect the health of prisoners, prison-based health services, linkages to community-based health care, general prison conditions and failures of the criminal justice system that exacerbate overcrowding must be immediately improved. International donors should work with the Zambian government to support prison and justice system reform and ensure that their provision of funding in such areas as health services respect human rights standards, including non-discrimination. Human rights protections against torture and cruel, inhuman or degrading treatment, and criminal justice system rights, are

  7. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  8. Environmental Denial

    Directory of Open Access Journals (Sweden)

    Tomaž Grušovnik

    2013-03-01

    Full Text Available Even though today reliable information about the negative impact of humans on the environment is only two clicks away, a considerable number of people still deny it. Why? Research shows that what we might call 'environmental denial' is a consequence of specific social and psychological factors: if we were to admit the negative impact of our lifestyles on the environment, we would have to change our way of life founded on consumerism. However, consumerism is not simply a way of exchanging goods; it is also something around which we organize the meaning of our lives, as consumer research clearly shows. Therefore we deny the information on the negattive impact of human activity on the environment because admitting it would lead to a conflict between cognition (attitudes, beliefs and actions (behaviour around which we organize the meaning of our lives. Such an exposition points to wider sociopolitical effects. Firstly, it raises questions about education that have to take into account the non-rational nature of human beings, and secondly it raises questions about the directions and possible outcomes of social action.

  9. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  10. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  11. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  12. Remotely Accessible Management System (RAMS).

    Science.gov (United States)

    Wood, Rex

    Oakland Schools, an Intermediate School District for Administration, operates a Remotely Accessible Management System (RAMS). RAMS is composed of over 100 computer programs, each of which performs procedures on the files of the 28 local school districts comprising the constituency of Oakland Schools. This regional service agency covers 900 square…

  13. Denial: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  14. Construction of AHP-based information systems against denial of service attacks Performance Ev aluation System%基于层次分析法的抗拒绝服务攻击性能体系研究

    Institute of Scientific and Technical Information of China (English)

    梁祥波; 湛宁

    2012-01-01

    通过考察多种拒绝服务攻击的实际攻击效果,并按攻击效果对各种拒绝服务攻击方法进行了分类,并深入研究了信息系统抗拒绝服务攻击性能评价方法,构建了基于层次分析法的信息系统抗拒绝服务攻击性能指标体系,提出了抗拒绝服务攻击评价算法,考虑了指标数据归一化等问题。%This denial of service attacks by examining a variety of actual attack effect,according to results of a variety of denial of service attack attack methods are classified,and in-depth study of information systems against denial of service performance evaluation methods,to build the information based on AHP system performance against system denial of service attacks,denial of service attack against proposed evaluation algorithm,taking into account indicators such as data normalization problem.

  15. Radio access selection in multi-radio access systems

    NARCIS (Netherlands)

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  16. Head Access Piping System Desing

    OpenAIRE

    中大路 道彦; 一宮 正和; 向坊 隆一; 前田 清彦; 永田 敬

    1994-01-01

    PNC made design studies on loop type FBR plants:a 600 MWe class in '91, and a 1300 MWe class in '93 both with the "head access" primary piping system. This paper focuses on the features of the smaller plant at first and afterwards on the extension to the larger one. The contents of the paper consist of R/V wall protection mechanism, primary piping circuit, secondary piping circuit, plant layout and then, discusses the extension of the applicability of the wall protection mechanism, primary pi...

  17. Limited Denial of Participation

    Data.gov (United States)

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  18. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  19. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  20. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  1. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  2. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  3. Modelling Access Control For Healthcare Information Systems

    OpenAIRE

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  4. Threat to information security : the system vulnerability and denial of service attacks

    OpenAIRE

    Braathen, Kjetil Eiklid; Salte, Silje

    2004-01-01

    The use of the Internet has increased drastically the last few years. This trend has led to a constant increase in attacks toward computer systems and networks, and the methods for attacking are becoming more and more advanced. By this, we mean that new tools are developing in a way that makes it more difficult for people to protect themselves against, while the use of the tools is more user friendly than before, and the hackers do not need as much skills as they used to. In...

  5. Open Access and DSpace Institutional Repository System

    OpenAIRE

    Çelik, Sönmez; Gürdal, Gültekin; Keten, Burcu; Türkfidanı, Ata; Kutlutürk, Levent

    2013-01-01

    The Open Access movement is a social movement in academia, dedicated to the principle of open access - to information - sharing for the common good and is being supported by many scientists, publishers, and researchers in the world, today. The software that is used to operate the institutional archive systems which are the basis of the Open Access, are divided into two forms of some free open source software and paid package programs which were developed by some corporates. DSpace, whose firs...

  6. 47 CFR 1.1403 - Duty to provide access; modifications; notice of removal, increase or modification; petition for...

    Science.gov (United States)

    2010-10-01

    ... and information relate to a denial of access for reasons of lack of capacity, safety, reliability or... a cable television system or any telecommunications carrier with nondiscriminatory access to any... utility may deny a cable television system or any telecommunications carrier access to its poles,...

  7. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  8. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  9. 17 CFR 240.19d-3 - Applications for review of final disciplinary sanctions, denials of membership, participation or...

    Science.gov (United States)

    2010-04-01

    ... limitations of access to services imposed by self-regulatory organizations. 240.19d-3 Section 240.19d-3... sanctions, denials of membership, participation or association, or prohibitions or limitations of access to... disciplinary sanction, denial or conditioning of membership, participation, bar from association,...

  10. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  11. Performance estimates for personnel access control systems

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  12. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  13. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  14. Democracy and the Twin Challenges of Climate Denial

    Science.gov (United States)

    Norgaard, K. M.

    2012-12-01

    Climate change poses major challenges to the operation of "modern" political, economic and social systems, making visible assumptions and raising questions about how scientific information can and should operate in a modern globalized democracy. Alongside the serious threat to democracy posed by the phenomenon of "literal denial" (the e.g. so called skeptic challenges of scientific information for political reasons) is "implicatory denial" or the more pervasive and everyday problem of how and why people who believe climate change is occurring nevertheless manage to ignore it. Instead, disturbing information about climate change is normalized through a variety of everyday social practices from changing the subject, controlling exposure to information or the use of humor. The blatant and more readily identifiable processes of literal denial can work together with the less visible (and to date less studied) process of implicatory denial to hamper public response to climate change.

  15. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  16. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  17. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Directory of Open Access Journals (Sweden)

    João José Costa Gondim

    2016-11-01

    Full Text Available Concerns about security on Internet of Things (IoT cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests. After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  18. Nihilism: a benign denial.

    Science.gov (United States)

    Skandalakis, John E; Mirilas, Petros

    2003-06-01

    Nihilism is the belief that all possible knowledge on a given topic has been amassed and codified. Ranging from benign denial to deliberate attempts at excommunication, nihilism is often encountered in the history of medicine. Eustachius, Columbus, and Sylvius strongly criticized Vesalius and defended the authority of Galen. Riolan fervently rejected Harvey's monumental work on the circulation of blood. Gross stated that no honest and sensible surgeon would ever sanction thyroidectomy. Sandstrom's discovery of the parathyroids was met with silence. Transplantation of parathyroids by Mandl was not appreciated when announced. Aristotle's dictum that the heart cannot withstand serious injury led to Paget's statement that cardiac surgery had reached the limits set by nature, which no new techniques could overcome. The first Billroth I operation was welcomed as, "Hopefully, also the last." Pancreatic surgery was opposed because the organ was of no clinical interest and was impossible for surgeons to reach. Pancreatic transplantation was rejected for many years, despite good results. When Blundell used blood transfusion for postpartum hemorrhage, critics averred that his next exploit would be radical removal of the spleen. Bassini stated that it could be risky to publish more about radical treatment of inguinal hernias. Carcinomas of the lower sigmoid and upper rectum were deemed untreatable because of their inaccessibility. Colostomy during pediatric surgery was rejected many times. Although it is difficult for the human mind to move from a familiar point of view, this propensity should not infect science, thereby impeding advancement.

  19. 7 CFR 62.210 - Denial, suspension, or cancellation of service.

    Science.gov (United States)

    2010-01-01

    ...) Quality Systems Verification Programs Definitions Service § 62.210 Denial, suspension, or cancellation of... 7 Agriculture 3 2010-01-01 2010-01-01 false Denial, suspension, or cancellation of service. 62.210... SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED)...

  20. Science information systems: Archive, access, and retrieval

    Science.gov (United States)

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  1. Decentralized energy systems for clean electricity access

    Science.gov (United States)

    Alstone, Peter; Gershenson, Dimitry; Kammen, Daniel M.

    2015-04-01

    Innovative approaches are needed to address the needs of the 1.3 billion people lacking electricity, while simultaneously transitioning to a decarbonized energy system. With particular focus on the energy needs of the underserved, we present an analytic and conceptual framework that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. A historical analysis shows that the present day is a unique moment in the history of electrification where decentralized energy networks are rapidly spreading, based on super-efficient end-use appliances and low-cost photovoltaics. We document how this evolution is supported by critical and widely available information technologies, particularly mobile phones and virtual financial services. These disruptive technology systems can rapidly increase access to basic electricity services and directly inform the emerging Sustainable Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, inclusive energy systems.

  2. Defending Science Denial in Cyberspace

    Science.gov (United States)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  3. Denial Denied: Freedom of Speech

    OpenAIRE

    Glen Newey

    2009-01-01

    Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a propositio...

  4. Digital Autonomous Terminal Access Communication (DATAC) system

    Science.gov (United States)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  5. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  6. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  7. Case managers reorganize to challenge claims denials.

    Science.gov (United States)

    1999-08-01

    A combination of diminished reimbursement, decreased funding for residency programs, an epidemic of claims denials, and the skilled nursing crisis has imperiled teaching hospitals across the country. Increasingly, these hospitals are looking to case management departments as potential saviors. In the short term, that could mean more staff and a beefier budget, but if your department can't produce, cuts later on could be drastic. The University of Pennsylvania Health System in Philadelphia lost $90 million in FY1998 and responded by cutting 1,100 positions--9% of its work force. The case management department lost eight positions and is trying to take up the slack with a massive reorganization of its care delivery system and a rigorous education program designed to reduce claims denials. At Georgetown University Medical Center in Washington, DC, however, case management staff and resources have been increased for now. The department is using its new-found prosperity to thoroughly screen all incoming patients for appropriateness of admission, upgrade its discharge planning capabilities, and hire a full-time employee to appeal denied claims. PMID:10557727

  8. Denial Denied: Freedom of Speech

    Directory of Open Access Journals (Sweden)

    Glen Newey

    2009-12-01

    Full Text Available Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a proposition, or to a mode of expression. Underlying free speech is the principle of freedom of association, according to which speech is both a precondition of future association (e.g. as a medium for negotiation and a mode of association in its own right. I conclude by applying this account briefly to two contentious issues: hate speech and pornography.

  9. Denial of Death and Economic Behavior

    OpenAIRE

    Wojciech Kopczuk; Joel Slemrod

    2005-01-01

    We model denial of death and its effect on economic behavior. Attempts to reduce death anxiety and the possibility of denial of mortality-relevant information interact with intertemporal choices and may lead to time-inconsistent behavior and other "behavioral" phenomena. In the model, repression of signals of mortality leads to underconsumption for unsophisticated individuals, but forward-sophisticated individuals may over-consume in anticipation of future denial and may seek ways to commit t...

  10. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  11. Application Performance on the Direct Access File System

    OpenAIRE

    Fedorova, Alexandra; Seltzer, Margo I.; Magoutis, Kostas; Addetia, Salimah

    2003-01-01

    The Direct Access File System (DAFS) is a distributed file system built on top of direct-access transports (DAT). Direct-access transports are characterized by using remote direct memory access (RDMA) for data transfer and user-level networking. The motivation behind the DAT-enabled distributed file system architecture is the reduction of the CPU overhead on the I/O data path. In collaboration with Duke University we have created and made available an open-source implementation of DAFS for th...

  12. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  13. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  14. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  15. Paradox of Denials in All My Sons

    Institute of Scientific and Technical Information of China (English)

    雷慧慧

    2014-01-01

    Arthur Miller, who was one of the greatest American playwrights of the 20th century. In All My Sons, different sorts of denials lead to the family’s collapse and Keller’s death. Paradoxically, the very denial that is designed to protect him from prose-cution and incarceration is followed by a chain of events that lead to Keller’s own self-imprisonment and self-imposed execu-tion. Denial also exists in the history of some countries, such as Germany, Japan and America and so on. My paper aims to ex-plore the paradox of denial both in our history and in literature works. My paper will demonstrate that denial has some negative effects both on the outer-world and the inner-world through thorough analysis on the characters in All My Sons.

  16. ACCESS: Design and Sub-System Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; McCandliss, Stephan R.; Rasucher, Bernard J.; Kimble, Randy A.; Kruk, Jeffrey W.; Pelton, Russell; Mott, D. Brent; Wen, Hiting; Foltz, Roger; Quijada, Manuel A.; Gum, Jeffery S.; Gardner, Jonathan P.; Kahle, Duncan M.; Benford, Dominic J.; Woodgate, Bruce E.; Wright, Edward L.; Feldman, Paul D.; Hart, Murdock; Moos, H. Warren; Reiss, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, W. V.; Sahnow, David J.

    2012-01-01

    Establishing improved spectrophotometric standards is important for a broad range of missions and is relevant to many astrophysical problems. ACCESS, "Absolute Color Calibration Experiment for Standard Stars", is a series of rocket-borne sub-orbital missions and ground-based experiments designed to enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 -1.7 micrometer bandpass.

  17. Scheduling Heterogeneous Wireless Systems for Efficient Spectrum Access

    Directory of Open Access Journals (Sweden)

    Lichun Bao

    2010-01-01

    Full Text Available The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (radio frequency bands in the current state of wireless spectrum allocations. Spectrum access scheduling addresses challenges arising from spectrum sharing by interleaving the channel access among multiple wireless systems in a TDMA fashion. Different from cognitive radio approaches which are opportunistic and noncollaborative in general, spectrum access scheduling proactively structures and interleaves the channel access pattern of heterogeneous wireless systems, using collaborative designs by implementing a crucial architectural component—the base stations on software defined radios (SDRs. We discuss our system design choices for spectrum sharing from multiple perspectives and then present the mechanisms for spectrum sharing and coexistence of GPRS+WiMAX and GPRS+WiFi as use cases, respectively. Simulations were carried out to prove that spectrum access scheduling is an alternative, feasible, and promising approach to the spectrum scarcity problem.

  18. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  19. Disability standards and guidelines for learning management systems: Evaluating accessibility

    OpenAIRE

    Moreno, Lourdes; Iglesias, Ana; Calvo, Rocío; Delgado, Sandra; Zaragoza, Luis

    2012-01-01

    Currently, the great majority of institutions of higher education use Learning Content Management Systems (LCMSs) and Learning Management Systems (LMS) as pedagogical tools. In order to make these systems accessible to all students, it is important to take into account not only educational standards, but also standards of accessibility. It is essential to have with procedures and well-established method for evaluating these tools, so in this paper we propose a method for evaluatin...

  20. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Science.gov (United States)

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  1. Time division multiplexed orbital angular momentum access system

    Science.gov (United States)

    Shi, Jianyang; Fang, Yuan; Chi, Nan

    2016-03-01

    We propose and experimentally demonstrate time division multiplexed orbital angular momentum (OAM) access system to increase transmission capacity and spectral efficiency. In this system, data carried on different time tributaries share the same OAM mode. Multiple time division multiplexed OAM modes are multiplexed to realize two-dimensional (time dimension and OAM dimension) multiplexing. Therefore, the capacity and spectral efficiency of the access system will increase. The orthogonality between optical time division multiplexing (OTDM) and OAM techniques is also verified in our experiment. In a proof-of-concept experiment, 2×5-Gbps return-to-zero signal over OAM mode +4 is transmitted and investigated. The bit error ratio performance after transmission in this system can be smaller than 1×10-9. Results show that the proposed time division multiplexed OAM access system is suitable for future broadband access network.

  2. Denial of shipments - myth or reality

    International Nuclear Information System (INIS)

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care

  3. Denial of shipments - myth or reality

    Energy Technology Data Exchange (ETDEWEB)

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  4. MULTIAGENT SYSTEM BASED ON GENETIC ACCESS MATRIX ANALYSIS

    Directory of Open Access Journals (Sweden)

    Noto Masato

    2012-12-01

    Full Text Available How should an individual contribute to the public good? Conversely, how does the public help the individual? We should analyze and alleviate conflicts in community clouds. Covert channels in the access matrix are caused by conflicts between public values and a private sense of values. We cannot control the information leaks from the covert channels by using only access control. We believe that the community cloud system should emphasize harmony between public values and a private sense of values. We interpret the access matrix as follows: The acts of the individual are generalized and symbolized by an access matrix that describes the access operations of the subject. We propose a multiagent system embodying the concept of swarm intelligence to analyze the covert channels that arise. Each agent has a group target and an individual target. The group target and an individual target include targets for generation of access and restriction of access. The system does not have any principle of universal control. Instead, an agent’s interactions are guided by metaheuristics for achieving targets. The social order of the whole society is made from the agents’ interactions related to the group value target, group game target, an individual value target, and an individual game target. The conceptual framework and multiagent system presented here are intended to support people. If the covert channel problem can be solved, it will become possible for people to use community clouds safely.

  5. Rumor spreading models with random denials

    Science.gov (United States)

    Giorno, Virginia; Spina, Serena

    2016-11-01

    The concept of denial is introduced on rumor spreading processes. The denials occur with a certain rate and they reset to start the initial situation. A population of N individuals is subdivided into ignorants, spreaders and stiflers; at the initial time there is only one spreader and the rest of the population is ignorant. The denials are introduced in the classic DK model and in its generalization, in which a spreader can transmit the rumor at most to k ignorants. The steady state densities are analyzed for these models. Finally, a numerical analysis is performed to study the rule of the involved parameters and to compare the proposed models.

  6. The implementation of wireless access in EPON system

    Science.gov (United States)

    Chang, Yuguang; Liu, Deming; Wu, Guangsheng

    2008-11-01

    Ethernet Passive Optical Network(EPON) is one of the most promising fibre-based access techniques which has been more and more widely used in today's access networks. In this paper, we proposed to integrate WLAN technology with EPON to provide wireless service in EPON network. First of all, theoretical analysis is given to support the feasibility of integrating WLAN technology into EPON system. Then, the architecture of the integrated system is descried. The key point of the plan is that an integrated ONU and WLAN BS called ONU-WLAN AP is setup in the system instead of a standard ONU. This is also the main difference between proposed system and a normal EPON system. The ONU-WLAN AP can provide both wired access and wireless access to the end users. System design and implementation is discussed in the following paragraph. Transmission experiments and results of the proposed plan are also described in this paper. The experimental results show that the average traffic throughput of the system could reach to approximate 20Mbps. Finally, conclusions are drawn out: The proposed system can work properly. The integrated system could be a costeffective plan for broadband access network.

  7. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  8. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  9. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  10. Climate change denial, freedom of speech and global justice

    Directory of Open Access Journals (Sweden)

    Trygve Lavik

    2016-10-01

    Full Text Available In this paper I claim that there are moral reasons for making climate denialism illegal . First I define climate denialism, and then I discuss its impact on society and its reception in the media.  I build my philosophical arguments mainly on John Stuart Mill and Thomas M. Scanlon.  According to Mill’s utilitarian justification of free speech, even untrue opinions are valuable in society’s pursuit of more truth. Consequently one might think that Mill’s philosophy would justify climate denialists’ right to free speech.  A major section of the paper argues against that view. The main arguments are: Climate denialism is not beneficial because its main goal is to produce doubt, and not truth. Climate denialism is not sincerely meant, which is a necessary condition for Mill to accept utterances. Climate denialists bring harm, by blocking necessary action on climate change.  Primarily they harm future generations and people in developing countries. Hence the case can be made in terms of global justice: Would future generations and people in developing countries support my claim? I think so, or so I argue. My argument from global justice is built on Scanlon’s distinction between the interests of participants, the interests of audiences, and the interests of bystanders.  The climate denialists have participant interests ‘in being able to call something to the attention of a wide audience’. Audience interests consist in ‘having access to expressions that we wish to hear or read, and even in being exposed to some degree to expressions we have not chosen’. Future generations and people in poor countries are bystanders to the climate debate. If the debate postpones necessary actions, it is the bystanders who must pay the price. I argue that bystanders’ costs outweigh participants’ and audiences’ interests, and that this is an argument for a statutory ban on climate denialism.Article first published online: 21 DEC 2015 

  11. Immediate data access system for LHD experiments

    International Nuclear Information System (INIS)

    Several kinds of computer systems are used to perform large helical device (LHD) experiments, and each produces its own data format. Therefore, it has been difficult to deal with these data simultaneously. In order to solve this problem, the Kaiseki server was developed; it has been facilitating the unified retrieval of LHD data. The data acquired or analyzed by various computer systems are converted into the unified ASCII format, or Kaiseki format, and transferred to the Kaiseki server. With this method, the researchers can visualize and analyze the data produced by various kinds of computers in the same way. Because validations are needed before registering on the Kaiseki server, it takes time to make the validated data available. However, some researchers need data as soon as it is gathered in order to adjust their instruments during the experiments. To satisfy this requirement, a new visualization system has been under development. The new system has two ways to visualize the data as physical values from the raw data. If the conversion task is not complex, the NIFSscope, a visualization tool, converts the raw data into physics data by itself. If the task is too complex to handle, it asks the ANACalc server to make physics data. When the ANACalc server receives a request, it delegates calculation programs to convert the acquired data into physics data. Because the interfaces between the server and the calculation processes are independent of programming languages and operating systems, the calculation processes can be placed on different computers and the server load can be reduced. Therefore, the system can respond to changes in requirements by replacing the calculation programs, and can easily be expanded by increasing the number of calculation servers

  12. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  13. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  14. Access to fertility services by transgender persons: an Ethics Committee opinion.

    Science.gov (United States)

    2015-11-01

    This statement explores the ethical considerations surrounding the provision of fertility services to transgender individuals and concludes that denial of access to fertility services is not justified.

  15. The Romanian Banking System after EU Accession

    Directory of Open Access Journals (Sweden)

    Viorica IOAN

    2011-11-01

    Full Text Available Banks play an important role in the financial sector, in the proper functioning of economic entities and in the economy as a whole, therefore over time the establishment of a functioning banking system capable of delivering a wide range of products and services to meet the requirements of all potential customers has been a permanent concern. Considering the economic and financial reality, both internationally and domestically, each country and therefore, Romania is interested in creating a solid banking system, enabling the appropriate organizational framework in order to ensure a development of the financial mechanisms. The banking system as the basic element of the financial system, allows an efficient allocation of resources in the economy and, in order to function properly, we need to know the risks they face:a slow economic growth may cause losses due to difficulties in repaying bank loans, due to lower sales or lower wages, changes in asset prices may cause financial losses to investors, decreasing a sector of the economy which has monopolized the banks’ and investors’ attention.

  16. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  17. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  18. Einstein Critical-Slowing-Down is Siegel CyberWar Denial-of-Access Queuing/Pinning/ Jamming/Aikido Via Siegel DIGIT-Physics BEC ``Intersection''-BECOME-UNION Barabasi Network/GRAPH-Physics BEC: Strutt/Rayleigh-Siegel Percolation GLOBALITY-to-LOCALITY Phase-Transition Critical-Phenomenon

    Science.gov (United States)

    Buick, Otto; Falcon, Pat; Alexander, G.; Siegel, Edward Carl-Ludwig

    2013-03-01

    Einstein[Dover(03)] critical-slowing-down(CSD)[Pais, Subtle in The Lord; Life & Sci. of Albert Einstein(81)] is Siegel CyberWar denial-of-access(DOA) operations-research queuing theory/pinning/jamming/.../Read [Aikido, Aikibojitsu & Natural-Law(90)]/Aikido(!!!) phase-transition critical-phenomenon via Siegel DIGIT-Physics (Newcomb[Am.J.Math. 4,39(1881)]-{Planck[(1901)]-Einstein[(1905)])-Poincare[Calcul Probabilités(12)-p.313]-Weyl [Goett.Nachr.(14); Math.Ann.77,313 (16)]-{Bose[(24)-Einstein[(25)]-Fermi[(27)]-Dirac[(1927)]}-``Benford''[Proc.Am.Phil.Soc. 78,4,551 (38)]-Kac[Maths.Stat.-Reasoning(55)]-Raimi[Sci.Am. 221,109 (69)...]-Jech[preprint, PSU(95)]-Hill[Proc.AMS 123,3,887(95)]-Browne[NYT(8/98)]-Antonoff-Smith-Siegel[AMS Joint-Mtg.,S.-D.(02)] algebraic-inversion to yield ONLY BOSE-EINSTEIN QUANTUM-statistics (BEQS) with ZERO-digit Bose-Einstein CONDENSATION(BEC) ``INTERSECTION''-BECOME-UNION to Barabasi[PRL 876,5632(01); Rev.Mod.Phys.74,47(02)...] Network /Net/GRAPH(!!!)-physics BEC: Strutt/Rayleigh(1881)-Polya(21)-``Anderson''(58)-Siegel[J.Non-crystalline-Sol.40,453(80)

  19. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel’s synchrony hypothesis, or remotely along several of Esterel’s execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel’s facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs’ utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot’s controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse’s floor layout into account, both of which are stored in a MySQL database.

  20. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    White David

    2008-01-01

    Full Text Available Abstract A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel's synchrony hypothesis, or remotely along several of Esterel's execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel's facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs' utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot's controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse's floor layout into account, both of which are stored in a MySQL database.

  1. Organizational crisis-denial strategy: the effect of denial on public framing

    NARCIS (Netherlands)

    T.G.L.A. van der Meer

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames em

  2. Public key based uniform access framework in 3G systems

    Institute of Scientific and Technical Information of China (English)

    WANG Yi; GU Da-wu; BAI Ying-cai

    2006-01-01

    This paper compares two types of access methods in 3G telecommunication systems, registration based access method and alternative access method. Through analyzing their common ground, we establish a public-key based uniform access framework, which combines different access methods into one unified model and provides more scalability and flexibility. Then an improved wireless authentication protocol is introduced into the framework, which gives an example of how unification is obtained by using public key technology. Since original protocol has flaws, an improved one is proposed based on security investigation. Improved authentication protocol overcomes the weakness of the original one, and maintains all the security features owned by old protocol. Finally, the feasibility of this framework is analyzed with consideration of current development in mobile telecommunication fields and the future trend of 3G systems. The result shows that public key technology has a promising future in 3G and Beyond 3G systems. It points out a new way for key management in future telecommunication systems.

  3. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  4. Improving information access with an emergency department system.

    OpenAIRE

    Travers, D.; Parham, T.

    1997-01-01

    An emergency department (ED) clinical system was developed by in-house personnel, with ED physician, nursing, registration and clerical staff input. The utilization of existing hardware and customization of the hospital's mainframe hospital information system (HIS) facilitated the implementation of a cost-effective system that meets the information access needs of a busy, state-of-the-art academic ED. The transition to automation of the ED was facilitated through the use of a comprehensive tr...

  5. Accessibility and Radioactivity Calculations for Nuclear Reactor Shutdown System

    International Nuclear Information System (INIS)

    An important consideration in the design of power reactors is providing access to the reactor cooling system for the purposes of maintenance, repair and refuelling. The major sources of radiation which tend to prohibit such access are: induced activity of the reactor coolant, activated impurities in the reactor coolant and radiation originating in the reactor core both during reactor operation and after shut down. Impurities in the reactor coolant may be present in high enough concentrations so that their activation restricts accessibility for maintenance after shutdown. When water being used as a coolant, the activity of the water itself is very short- lived but their corrosive nature, resultant high impurity and induced activity of structural material are the major source of activity in the system after reactor shutdown. In this case, it may be necessary to chemically remove some of the impurity by a purification process to prevent a build up of long-lived induced activity in the system from restricting access to the plant, and to keep the radiation dose at the working places within the permissible limits. A mathematical modelling is developed. A system of coupled first-order linear differential equations describing adequately the activity behaviour has to be derived and solved. It treats the determination of equilibrium concentrations of impurities on system surface , and the effect of release of fission products from the reactor core

  6. Isomorphism between Sovereignty Theories'Innovation and National Personality Denial System%主权理论革新与国家人格否认制度之同构

    Institute of Scientific and Technical Information of China (English)

    刘学文; 朱京安

    2015-01-01

    The theory-building of National Personality Denial System gives rise to definition of sovereignty theory in the new era.If we insist on doctrine of absolute sovereignty,the institution denial of national per-sonality can be viewed as violation to sovereignty of a country,and it is inconsistent with “individual crimi-nal responsibility”established after WWⅡ;On the contrary,the theory of the out-of-date state sovereignty may cause new interventionism that advocating human rights prior to the sovereignty.Obviously,the sover-eignty theory should be reviewed and interpreted in the new era.Only Countries propel sovereignty deni-ability through consultation,can international law be put forth;therefore,the exercise of sovereign power has to be subject to the conditions of international power to protect state rights preferably.And the core con-notation of “Late-Modern Sovereignty”just proves that National Personality Denial System is legitimate and urgent,and the both gradually achieve the self-consistency in theory.%国家人格否认制度的理论构建引出新时期主权理论的界定问题。若坚持绝对主权论,则该制度对国家主权形成侵害,这与战后国际法倡导的“个人刑事责任原则”背道而驰;而主权过时论又有可能引起人权大于主权的“新干涉主义”弊端。所以,主权理论在新时期应作新的审视和解读,各国只有通过协商一致进行主权适当让渡才能使国际法有存留和发展之空间,从而使国家主权权力的行使亦受到国际权力的限制,以更好地保障各国的国家权利。“晚期现代主权论”的核心理念则正好证成了国家人格否认制度的正当性,同时也进一步反证了在国际社会中倡导“晚期现代主权论”的重要性和紧迫性,两者逐步实现了理论上的自洽。

  7. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  8. Overcoming Denial through the Group: A Test of Acceptance Theory.

    Science.gov (United States)

    Rugel, Robert P.; Barry, Denise

    1990-01-01

    Found participants (N=28) in alcohol treatment groups showed decreases in denial of drinking problems and decreases in psychopathology following 12 weeks of group counseling. Determined greater self-acceptance was associated with experiencing acceptance by group and with greater decreases in denial; decreases in denial and psychopathology were…

  9. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  10. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  11. A United Access Control Model for Systems in Collaborative Commerce

    Directory of Open Access Journals (Sweden)

    Ruo-Fei Han

    2009-06-01

    Full Text Available The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management of internal functions is of the same importance as external service management. It is very troublesome to control authorizations merely with attributes and composition of policies introduced from attribute-based access control (ABAC. So, we introduce a united access control model for systems in collaborative commerce, combining the advantages of conventional role-based access control (RBAC, task-based authentication control (TBAC and that of recent ABAC and automated trust negotiation (ATN. Innovational ideas in the model are analyzed, and the implement architecture is discussed. The paper concludes with a summary of the united model’s benefits and future work.

  12. A Scientist's Guide to Science Denial

    Science.gov (United States)

    Rosenau, J.

    2012-12-01

    Why are so many scientifically uncontroversial topics, from evolution and the age of the earth to climate change and vaccines, so contentious in society? The American public respects science and scientists, yet seems remarkably unaware of - or resistant to accepting - what scientists have learned about the world around us. This resistance holds back science education and undermines public policy discussions. Scientists and science communicators often react to science denial as if it were a question of scientific knowledge, and respond by trying to correct false scientific claims. Many independent lines of evidence show that science denial is not primarily about science. People reject scientific claims which seem to conflict with their personal identity - often because they believe that accepting those claims would threaten some deeply-valued cultural, political, or religious affiliation. Only by identifying, addressing, and defusing the underlying political and cultural concerns can educators, scientists, and science communicators undo the harm done by science denial.

  13. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan...

  14. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  15. Type-Based Access Control in Data-Centric Systems

    Science.gov (United States)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  16. A portable marine geophysical data access and management system

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.; Narvekar, P.

    information ? Reasonable execution speed for mana g ing/accessing high volume of data ? A flexible and multi - track querying system ? Facilities to save, open, e dit and resubmit the query ? Plotting the queried data on the map with zoom, pan.... Following are four major software modules: ? Data import module ? Query builder or search module ? Data visualization and download module ? Data management (administrative) module. On execution of the GPDAMS program, the main t i tle screen...

  17. DAISY Producer: An integrated production management system for accessible media

    OpenAIRE

    Egli, Christian

    2011-01-01

    Large scale production of accessible media above and beyond DAISY Talking Books requires management of the workflow from the initial scan to the output of the media production. DAISY Producer was created to help manage this process. It tracks the transformation of hard copy or electronic content to DTBook XML at any stage of the workflow and interfaces to existing order processing systems. Making use of DAISY Pipeline and Liblouis, DAISY Producer fully automates the generation of on-demand, u...

  18. Access control and interlock system at the Advanced Photon Source

    Energy Technology Data Exchange (ETDEWEB)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D. [Argonne National Lab., IL (United States). Advanced Photon Source

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  19. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  20. Formalized Description of Distributed Denial of Service Attack

    Institute of Scientific and Technical Information of China (English)

    杜彦辉; 马锐; 刘玉树

    2004-01-01

    The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.

  1. Input-to-State Stabilizing Control Under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2015-01-01

    The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service (DoS) attacks, namely attacks that prevent transmissions over the network. We characterize frequency an

  2. Detection of denial-of-service attacks based on computer vision techniques

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Hu, Jiankun

    2014-01-01

    Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed system treats traffic records as images and detec

  3. RFID Based Security Access Control System with GSM Technology

    Directory of Open Access Journals (Sweden)

    Peter Adole

    2016-08-01

    Full Text Available The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises. This is achieved mainly through the use of a Radio Frequency Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD and GSM/GPRS Modem.Once the RFID tag which contains the user’s unique information is scan by the RFID reader and confirmed match with the information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number” to security personnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”, buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid RFID card is used to access the security system” to the security personnel. The electronic circuit was implemented, the codes for microcontroller were written in assembly language, debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out using the Proteus Virtual System Modelling (VSM version 8.0.An importation implication of this paper is that the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock

  4. Denial among cancer patients. Tips and traps.

    OpenAIRE

    Brock, G.; Gurekas, V; Deom, P.

    1993-01-01

    The coping mechanisms used by patients diagnosed with cancer play a role in their well-being and, therefore, influence their quality of life and possibly even their survival. We review the characteristics of one of these mechanisms, denial, and suggest an approach to dealing with denying patients.

  5. ACCESS Earth: Promoting Accessibility to Earth System Science for Students with Disabilities

    Science.gov (United States)

    Locke, S. M.; Cohen, L.; Lightbody, N.

    2001-05-01

    ACCESS Earth is an intensive summer institute for high school students with disabilities and their teachers that is designed to encourage students with disabilities to consider careers in earth system science. Participants study earth system science concepts at a Maine coastal estuary, using Geographic Information Systems, remote sensing, and field observations to evaluate the impacts of climate change, sea level rise, and development on coastal systems. Teachers, students, and scientists work together to adapt field and laboratory activities for persons with disabilities, including those with mobility and visual impairments. Other sessions include demonstrations of assistive technology, career discussions, and opportunities for students to meet with successful scientists with disabilities from throughout the U.S. The summer institute is one of several programs in development at the University of Southern Maine to address the problem of underrepresentation of people with disabilities in the earth sciences. Other projects include a mentoring program for high school students, a web-based clearinghouse of resources for teaching earth sciences to students with disabilities, and guidebooks for adaptation of popular published earth system science curricula for disabled learners.

  6. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  7. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  8. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented. PMID:15066555

  9. Licensed Shared Access System Possibilities for Public Safety

    Directory of Open Access Journals (Sweden)

    Kalle Lähetkangas

    2016-01-01

    Full Text Available We investigate the licensed shared access (LSA concept based spectrum sharing ideas between public safety (PS and commercial radio systems. While the concept of LSA has been well developed, it has not been thoroughly investigated from the public safety (PS users’ point of view, who have special requirements and also should benefit from the concept. Herein, we discuss the alternatives for spectrum sharing between PS and commercial systems. In particular, we proceed to develop robust solutions for LSA use cases where connections to the LSA system may fail. We simulate the proposed system with different failure models. The results show that the method offers reliable LSA spectrum sharing in various conditions assuming that the system parameters are set properly. The paper gives guidelines to set these parameters.

  10. A Rewritable, Random-Access DNA-Based Storage System

    Science.gov (United States)

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  11. Bluetooth Navigation System Using WI-FI Access Points

    Directory of Open Access Journals (Sweden)

    Rohit Agrawal

    2012-04-01

    Full Text Available There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The systemthat has been introduced here uses bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and cheaper is that most of the localized areas today like college campus, offices are being provided withinternet connectivity using these access points.

  12. Towards Voluntary Interoperable Open Access Licenses for the Global Earth Observation System of Systems (GEOSS)

    NARCIS (Netherlands)

    Onsrud, H.; Campbell, J.; Van Loenen, B.

    2010-01-01

    Access to earth observation data has become critically important for the wellbeing of society. A major impediment to achieving widespread sharing of earth observation data is lack of an operational web-wide system that is transparent and consistent in allowing users to legally access and use the ear

  13. The Marley hypothesis: denial of racism reflects ignorance of history.

    Science.gov (United States)

    Nelson, Jessica C; Adams, Glenn; Salter, Phia S

    2013-02-01

    This study used a signal detection paradigm to explore the Marley hypothesis--that group differences in perception of racism reflect dominant-group denial of and ignorance about the extent of past racism. White American students from a midwestern university and Black American students from two historically Black universities completed surveys about their historical knowledge and perception of racism. Relative to Black participants, White participants perceived less racism in both isolated incidents and systemic manifestations of racism. They also performed worse on a measure of historical knowledge (i.e., they did not discriminate historical fact from fiction), and this group difference in historical knowledge mediated the differences in perception of racism. Racial identity relevance moderated group differences in perception of systemic manifestations of racism (but not isolated incidents), such that group differences were stronger among participants who scored higher on a measure of racial identity relevance. The results help illuminate the importance of epistemologies of ignorance: cultural-psychological tools that afford denial of and inaction about injustice.

  14. Vulcanus 2.0: A Recommender System for Accessibility

    Directory of Open Access Journals (Sweden)

    Ismael Gomes Cardoso

    2016-04-01

    Full Text Available Even though the use of recommender systems is already widely spread in several application areas, there is still a lack of studies for accessibility research field. One of these attempts to use recommender system benefits for accessibility needs is Vulcanus. The Vulcanus recommender system uses similarity analysis to compare user's trails. In this way, it is possible to take advantage of the user's past behavior and distribute personalized content and services. The Vulcanus combined concepts from ubiquitous computing, such as user profiles, context awareness, trails management, and similarity analysis. It uses two different approaches for trails similarity analysis: resources patterns and categories patterns. In this work we performed an asymptotic analysis, identifying Vulcanus' algorithm complexity. Furthermore we also propose improvements achieved by dynamic programming technique, so the ordinary case is improved by using a bottom-up approach. With that approach, many unnecessary comparisons can be skipped and now Vulcanus 2.0 is presented with improvements in its average case scenario.

  15. Postmodernism, historical denial, and history education:

    Directory of Open Access Journals (Sweden)

    Robert John Parkes

    2015-12-01

    Full Text Available History educators frequently ignore, or engage only reluctantly and cautiously with postmodernism. This is arguably because postmodernism is frequently accused of assaulting the epistemological foundations of history as an academic discipline, fostering a climate of cultural relativism, encouraging the proliferation of revisionist histories, and providing fertile ground for historical denial. In the Philosophy of History discipline, Frank Ankersmit has become one of those scholars most closely associated with ‘postmodern history’. This paper explores Ankersmit’s ‘postmodern’ philosophy of history, particularly his key notion of ‘narrative substances’; what it might do for our approach to a problem such as historical denial; and what possibilities it presents for history didactics.

  16. Accessibility of a Destination-Based Transportation System: A Large Airport Study

    Institute of Scientific and Technical Information of China (English)

    SHI Jing; YING Xiwen

    2008-01-01

    The accessibility of a destination-based transportation system is defined to quantify the perform-ance of transportation systems which access a distinct destination. The access cost is used to reflect the utility of the transportation system including the fatigue and inconvenience in the total cost. The cost is quan-tified by two coefficients which represent the different characteristics of various people. The average cost and the income-relative accessibility are used to describe various aspects of the accessibility and to evaluate the accessibility of a destination-based system. A case study uses data from the Kunming transpor-tation system to evaluate the accessibility of the present city airport. The calibrated coefficients are then used to evaluate the transportation system to the new Kunming international airport. The results show that this transportation accessibility evaluation can be combined with transportation planning to study transporta-tion sub-systems.

  17. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2011-09-29

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 68 FR 62011... Circumvention of Copyright Protection Systems for Access Control Technologies, 71 FR 68472, 68480, published in... Protection Systems for Access Control Technologies, 65 FR 64556, 64564, published in the Federal...

  18. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  19. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10 a.m.-4..., Airport Security Access Control Systems. The agenda will include the following: February 9, 2012...

  20. Bluetooth Navigation System using Wi-Fi Access Points

    CERN Document Server

    Agrawal, Rohit

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The system that has been introduced here uses Bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and ch...

  1. Administrative and clinical denials by a large dental insurance provider

    Directory of Open Access Journals (Sweden)

    Geraldo Elias MIRANDA

    2015-01-01

    Full Text Available The objective of this study was to assess the prevalence and the type of claim denials (administrative, clinical or both made by a large dental insurance plan. This was a cross-sectional, observational study, which retrospectively collected data from the claims and denial reports of a dental insurance company. The sample consisted of the payment claims submitted by network dentists, based on their procedure reports, reviewed in the third trimester of 2012. The denials were classified and grouped into ‘administrative’, ‘clinical’ or ‘both’. The data were tabulated and submitted to uni- and bivariate analyses. The confidence intervals were 95% and the level of significance was set at 5%. The overall frequency of denials was 8.2% of the total number of procedures performed. The frequency of administrative denials was 72.88%, whereas that of technical denials was 25.95% and that of both, 1.17% (p < 0.05. It was concluded that the overall prevalence of denials in the studied sample was low. Administrative denials were the most prevalent. This type of denial could be reduced if all dental insurance providers had unified clinical and administrative protocols, and if dentists submitted all of the required documentation in accordance with these protocols.

  2. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design. PMID:23629061

  3. 19 CFR 122.183 - Denial of access.

    Science.gov (United States)

    2010-04-01

    ...; (xxxiii) Illegal use or possession of firearms or explosives; (xxxiv) Any violation of a U.S. immigration... property; (H) Aggravated assault; (I) Bribery; or (J) Illegal possession of a controlled...

  4. LINEAR-DISPERSION DIVISION MULTIPLE-ACCESS FOR MIMO SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    Deng Dan; Lv Xingzai; Zhu Jinkang

    2008-01-01

    Comprehensive study on novel Linear-Dispersion Division Multiple-Access (LDDMA) for multi-user uplink Multiple-Input Multiple-Output (MIMO) systems is proposed. In the new multi- plexing scheme, each user's information symbol is dispersed by a User-Specific Matrix (USM) both in space and time domain and linearly combined at base-station side. And a simple random search al- gorithm, based on capacity maximization criteria, is developed to generate a bank of USMs. Simulation results are presented to demonstrate the advantages of LDDMA. When the Bit Error Rate (BER) reaches 10, the performance gains are 3dB and 5dB, compared with Time-Division Linear Dispersion Codes (TD-LDC) and BLAST, respectively.

  5. Enhanced Role Based Access Control Mechanism for Electronic Examination System

    Directory of Open Access Journals (Sweden)

    Adebukola Onashoga

    2014-02-01

    Full Text Available Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal and user management (user creation, user update and user removal. The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.

  6. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  7. Compact Wireless Access Nodes for WDM Bidirectional Radio-over-Fiber System Based on RSOA

    DEFF Research Database (Denmark)

    Yu, Xianbin; Gibbon, Timothy Braidwood; Tafur Monroy, Idelfonso

    2009-01-01

    We demonstrate a RSOA based WDM radio-over-fiber, bidirectional system for wireless access networks. The multi-functionalities of a RSOA, such as colorless operation, re-modulation and envelope detection, make wireless access nodes more compact.......We demonstrate a RSOA based WDM radio-over-fiber, bidirectional system for wireless access networks. The multi-functionalities of a RSOA, such as colorless operation, re-modulation and envelope detection, make wireless access nodes more compact....

  8. Critical Surfing: Holocaust Denial and Credibility on the Web.

    Science.gov (United States)

    Borrowman, Shane

    1999-01-01

    Discusses the nature of hate speech in general, and Holocaust denial in particular, on the World Wide Web, citing specific Web sources. Argues that, although discussion of Holocaust denial may be a difficult classroom discussion topic, and should be approached carefully, intelligent use of the Internet must be taught in the classroom. (MSE)

  9. Development of a Denial Scale for Male Incest Offenders.

    Science.gov (United States)

    Guthrie, James T.; Canada, Richard M.; Lim, Mee-Gaik; Jennings, Glen H.

    1998-01-01

    A scale to measure denial among sexual offenders was developed for male incest offenders (N=265). Validity and reliability were tested. Four subscales correspond to the domains of denial: facts, awareness, impact, and responsibility. Development strategy and psychometric analysis are reported. Recommendations for further research are included.…

  10. 30 CFR 47.87 - Review of denial.

    Science.gov (United States)

    2010-07-01

    ... Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR EDUCATION AND TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.87 Review of denial. (a) The health professional... chemical, (2) The confidentiality agreement, and (3) The operator's written denial. (b) If MSHA...

  11. 7 CFR 97.105 - Denial of an application.

    Science.gov (United States)

    2010-01-01

    ... certificates or rights are cited, as a reason for denial, their nationality or country, numbers and dates, and... to enable the applicant to identify the cited certificates or rights. (d) If printed publications are cited as a reason for denial, the author (if any), title, date, pages or plates, and places...

  12. "What Page, Miss?" Enhancing Text Accessibility with DAISY (Digital Accessible Information SYstem)

    Science.gov (United States)

    Spooner, Sue

    2014-01-01

    Introduction: The provision of specially formatted materials is a complex and increasingly difficult task, given the extensive and burgeoning range of texts and resources available for classroom use. The need to extend the provision of accessible formats to include digital resources (in addition to braille, audio, and large print) led to a study…

  13. Software interface system for Geophysical Data Access and Management System (GPDAMS-CD)

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.

    -friendly access to large volume of data and means to visualize and extract selected data as per need. The software requires a minimum of computing expertise as it is controlled by a system of `pull down' menus, backed up by a context-sensitive system...

  14. SINP space physics data storage and access system

    Science.gov (United States)

    Barinova, Vera; Kalegaev, Vladimir; Parunakian, David

    In this paper we present the system for automated data retrieval and processing developed in the the Skobeltsyn Institute of Nuclear Physics. Telemetry data files containing scientific information (e.g. charged particle fluxes) are auto-matically parsed and stored in our Oracle database immediately upon arrival. Parsed telemetry files, metadata, instrument technical information and orbital parameters are also stored. Most of the data can be accessed via our public FTP server. Users can preview the data available for time intervals and channels of interest using the web interface provided. The preview plot building software has also been developed in-house. This system has been successfully used in 2009 with the following spacecraft and instru-ments: Electron-M-Pesca at Coronas-Photon (Electrons 200KeV -4 MeV+; Protons : 4 MeV -80MeV+ ;α : 5 -24 MeV/nucleon; CNO : 6 -15MeV/nucleon), DUFIK at Tatiana-2 (electrons, infrared 600nm ¡ ¡ 700nm and ultraviolet 300nm ¡ ¡ 400nm), MSGI and SKL at Meteor-M (10 spectral channels: 0,5-12,5 µm ). The data collections are available at http://smdc.sinp.msu.ru for visual preview and download.

  15. A system for success: BMC Systems Biology, a new open access journal

    OpenAIRE

    Webb Penelope A; Hodgkinson Matt J

    2007-01-01

    Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  16. A system for success: BMC Systems Biology, a new open access journal

    Directory of Open Access Journals (Sweden)

    Webb Penelope A

    2007-09-01

    Full Text Available Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  17. Denial of Service Prevention for 5G

    DEFF Research Database (Denmark)

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology...

  18. The role of CRIS systems in measuring Open Access publications

    NARCIS (Netherlands)

    Scharnhorst, A.M.; Dijk, E.M.S.; Doorn, P.K.; van Berchum, M.

    2016-01-01

    Open Access to scientific results - from publications to data - is high on the agenda of science policy drivers. Since long there is no doubt that making your own research available on the web is the best way to gain visibility and impact (Lawrence 2001). The Open Access movement started with calls

  19. Single port access surgery with a novel Port Camera system.

    Science.gov (United States)

    Terry, Benjamin S; Schoen, Jonathan; Mills, Zachary; Rentschler, Mark E

    2012-06-01

    In this work, the authors designed, built, and tested a novel port camera system for single port access (SPA) laparoscopic surgery. This SPA Port Camera device integrates the monitor, laparoscopic camera, and light source into an inexpensive, portable cannula port. The device uses a 2-channel SPA port inserted through an umbilical incision, similar to traditional SPA. After insertion into a channel, the device deploys a small camera module and LED lamp in vivo. An integrated, on-patient LCD provides the view of the surgical site. The design intent of the port camera is to enhance SPA by (a) reducing the size of the SPA port through the elimination of the dedicated laparoscope channel; (b) reducing equipment cost by integrating an inexpensive CMOS sensor and LED lamp at the port tip; (c) eliminating the need for an assistant who operates the laparoscope; and (d) mechanically coupling the camera, tool port, and on-patient LCD screen. The effectiveness of the device was evaluated by comparing the video performance with a leading industry laparoscope and by performing a user evaluation study and live porcine surgery with the device. Effectiveness of the device was mixed. Overall video system performance of the device is better than an industry standard high-definition laparoscope, implying that significant cost savings over a traditional system are possible. Participant study results suggest that simulated laparoscopic tasks are as efficient with the SPA Port Camera as they are with a typical SPA configuration. However, live surgery revealed several shortcomings of the SPA Port Camera.

  20. Universal remote access infrastructure for embedded systems; Universelle Fernzugriff-Infrastruktur fuer eingebettete Systeme

    Energy Technology Data Exchange (ETDEWEB)

    Jazdi, N. [Stuttgart Univ. (Germany). Inst. fuer Automatisierungs- und Softwaretechnik

    2005-07-01

    This article describes a flexible and extensible infrastructure for applying Web-Technologies to embedded systems.The presented approach develops a Three-level-Architecture consisting of the embedded system, the universal Remote-Access-Server and the Remote-Access-Client. A system-spanning general interface allows the binding of embedded systems in order to access their process data. Additionally, this procedure facilitates a flexible processing of the device data, so that it is ready to be used by different control devices. To ensure flexibility - connecting different devices on the one side and providing information for different clients like PC, PDA or mobile phone on the other side - a new XML-based description language (Service Description Markup Language - SDML) is introduced. The SDML documents contain information about connected embedded systems, reusable device data and the presentation policies for different clients. These documents are specifically created for each device. Applying the suggested procedure, different embedded systems can be connected to the Internet with minimum hardware and software requirements/costs. Software components of the Remote-Access-Server, once developed, can be used and applied to various devices which lead to a reduction of the development costs. The user can use an ordinary web browser to communicate with the devices and does not need to install any additional software on his local computer. (orig.) (orig.)

  1. The Time Between: Continuously-defined accessibility functions for schedule-based transportation systems

    OpenAIRE

    Paul Anderson; Andrew Owen; David Levinson

    2012-01-01

    Accessibility is traditionally considered to be a property of a point or region in space, and to be invariant over time (or at least over some computationally convenient time interval). How- ever, a locations accessibility can vary over time on a wide range of scales. This temporal variation is especially significant for schedule-based transportation systems. Current measures of accessibility generally reflect the accessibility only at points in time corresponding to the departures of one or ...

  2. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  3. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  4. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  5. A United Access Control Model for Systems in Collaborative Commerce

    OpenAIRE

    Ruo-Fei Han; Hou-Xiang Wang; Qian Xiao; Xiao-Pei Jing; Hui Li

    2009-01-01

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance collaboration simultaneously, are the most concerned problems. However, for large commercial organizations, a fine management...

  6. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  7. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data System-Public access to data. 504.602-71 Section 504.602-71 Federal Acquisition Regulations System GENERAL SERVICES ADMINISTRATION GENERAL ADMINISTRATIVE MATTERS Contract Reporting 504.602-71 Federal Procurement Data System—Public access to data....

  8. From System Expansion to System Contraction: Access to Higher Education in Poland

    Science.gov (United States)

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  9. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    CERN Document Server

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  10. AMC Model for Denial of Sleep Attack Detection

    CERN Document Server

    Bhattasali, Tapalina

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sensor network is affected by denial of sleep attack or not can be decided by considering expected death time of sensor network under normal scenario.

  11. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  12. Evaluating the Accessibility of Three Open-Source Learning Content Management Systems: A Comparative Study

    OpenAIRE

    Iglesias, Ana; Moreno, Lourdes; Martínez, Paloma; Calvo, Rocío

    2011-01-01

    Learning content management systems (LCMSs) have become increasingly popular in the educational field over the past few years. However, problems in system design can create difficulties in the interactions between LCMSs and an important sector of the user population. The assessment and monitoring of LCMS accessibility are vital for the guarantee of universal accessibility in education. This article presents a comparative study of the accessibility of three web-based, open-source L...

  13. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  14. Accessibility od design documentation on mobile devices with Android Operating System

    OpenAIRE

    Lovše, Tilen

    2013-01-01

    In this graduation thesis the accessibility of design documentation on mobile devices with Android operating system is discussed. Mobile devices, used for accessing to design documentation, are tablet computers or simply tablets. Introduction presents benefits of accessing to design documentation on tablets and Slovenian history in this field, followed by the review of Android operating system, its history, upgrade and features. Practical part covers the review of five different tablets, whic...

  15. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  16. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13, 2012... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security...

  17. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security...

  18. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15, 2012... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security...

  19. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from 9... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security...

  20. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013... Federal Aviation Administration Twenty-Second Meeting: RTCA Special Committee 224, Airport Security...

  1. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21, 2013... Federal Aviation Administration Nineteenth Meeting: RTCA Special Committee 224, Airport Security...

  2. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28, 2012... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security...

  3. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10, 2013... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security...

  4. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  5. Upper Bound for Energy Efficiency in Multi-Cell Fibre-Wireless Access Systems

    DEFF Research Database (Denmark)

    Koonen, A. M. J.; Popov, M.; Wessing, Henrik

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  6. Study of LANs access technologies in wind power system

    DEFF Research Database (Denmark)

    Wei, Mu; Chen, Zhe

    2010-01-01

    techniques are addressed individually for each layer. Because of the particularity of the offshore wind farm, the communication network of the offshore wind farm may be treated as a LAN. Therefore the popular LANs access techniques, including Ethernet, at the Data Link Layer of the ISO seven-layers in wind...

  7. 7 CFR 205.405 - Denial of certification.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) ORGANIC FOODS PRODUCTION ACT PROVISIONS NATIONAL ORGANIC PROGRAM Certification § 205.405 Denial of certification. (a) When the...

  8. 7 CFR 205.507 - Denial of accreditation.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) ORGANIC FOODS PRODUCTION ACT PROVISIONS NATIONAL ORGANIC PROGRAM Accreditation of Certifying Agents § 205.507 Denial of accreditation....

  9. Physical protection of hardware and software. Linking access control systems with operational computer systems

    International Nuclear Information System (INIS)

    The existence and use of software and networks have generated another possibility for perpetrators to influence systems in nuclear facilities or to prepare malevolent acts. Data security has become an element of physical protection plans, not as an end in itself but as a means to achieve physical protection objectives. Physical protection measures are additional measures, which become necessary when other measures that have to be taken (e.g. in compliance with international standards) are insufficient to prevent a hazard to the protection goals through data manipulation by software and hardware. In planning or assessing data protection measures for the purpose of physical protection, it is necessary to differentiate between applications which can, if manipulated, directly endanger the protection goals. The importance of software protection is growing. In particular, because of ageing of components, the existing instrumentation and control systems with their fixed wiring and discrete elements will have to be updated. Computerized access control systems play an eminent role in the physical protection of a nuclear facility. Therefore, most systems are operated as islands. The paper shows that linking of certain systems with other computer systems is possible without inadmissible drawbacks for the physical protection level. It is shown by means of the example of linking together the computer networks of access control, health physics, the flexitime system, the key administration and the operational management system that such linking of systems in nuclear facilities had hidden advantages for all participants

  10. 19 CFR 192.12 - Criteria for denial of applications requesting AES post-departure (Option 4) filing status...

    Science.gov (United States)

    2010-04-01

    ... Regulations (15 CFR 30.7(d)); (2) The applicant has a history of non-compliance with export regulations (e.g... 19 Customs Duties 2 2010-04-01 2010-04-01 false Criteria for denial of applications requesting AES...) EXPORT CONTROL Filing of Export Information Through the Automated Export System (AES) § 192.12...

  11. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  12. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  13. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru Miyauchi; Yanjun Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirmlow optical loss and environmental stabilities.

  14. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru; Miyauchi; Yanjun; Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirm low optical loss and environmental stabilities.

  15. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    Science.gov (United States)

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand

  16. H1DS: A new web-based data access system

    International Nuclear Information System (INIS)

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  17. Improving Potable Water Accessibility And Sustainability Through Efficient Management Of Pipe Water Supply System

    OpenAIRE

    Nakabugo, Stella Mirembe

    2015-01-01

    This paper discusses how to improve potable water accessibility and sustainability through efficient management of pipe water supply system a case study of Uganda, Kampala region. Kampala the capital city of Uganda still faces a challenge to access clean potable water. Water supply coverage is 77.5 % showing at least 22.5 % of the total population has limited access to potable drinking water causing a gap between water supply and water demand. Hypotheses of the paper were that the city's popu...

  18. Providing access to a Public Transport Schedule system for Smart Phone Clients

    OpenAIRE

    Hameseder, Katrin

    2010-01-01

    This master thesis was conducted during an internship at HBT GmbH with the purpose of providing access to an existing public transport schedule system in Hamburg (Germany) for smart phone clients. A state-of-the-art literature review and an evaluation of an existing SOAP (Simple Object Access Protocol) based web service to access public transport schedule information were conducted to identify the drawbacks of the existing interface with respect to the limitations and characteristics of smart...

  19. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  20. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  1. Improving vascular access outcomes: a systems approach to eliminating structural barriers.

    Science.gov (United States)

    Sands, Jeffrey J; Perry, Michael A

    2003-01-01

    Maximizing AV fistula creation, regular access monitoring, prompt outpatient interventions and minimizing catheter use are well-accepted approaches for vascular access management. Systemic barriers impede the application of these strategies. A misaligned reimbursement system coupled with educational deficits and a lack of accountability has contributed to the institutionalization of substandard vascular access care. The hallmark of performance management is to create systems in which incentives are aligned to produce desired behaviors. Realigning reimbursement through a combination of pre-ESRD funding, enhancements to the composite rate to reward outcomes and cover vascular access monitoring and updated reimbursement for outpatient vascular access procedures would improve care and decrease unnecessary hospitalizations. This should be coupled with clearly defined outcome standards and accountability incorporated into hospital accreditation and credentialing. Capitation may provide alternative solutions. A two-phased approach including reimbursement reform while exploring capitation represents a prudent course with the best likelihood of success. PMID:12596756

  2. Evaluation on the Occupational Information Access System as Used at Churchill High School. A Project Report.

    Science.gov (United States)

    McKinlay, Bruce; Adams, Daniel

    The Occupational Information Access System (OIAS) improves the accessibility of occupational labor market information for career planning. Its operation at Churchill High School is evaluated from several angels: the likes and dislikes of users; the effect of OIAS on users' knowledge of occupational information and on their career plans; why other…

  3. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  4. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  5. A Unified Approach to Optimal Opportunistic Spectrum Access under Collision Probability Constraint in Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Jing Wang

    2010-01-01

    Full Text Available We consider a cognitive radio system with one primary channel and one secondary user, and then we introduce a channel-usage pattern model and a fundamental access scheme in this system. Based on this model and fundamental access scheme, we study optimal opportunistic spectrum access problem and formulate it as an optimization problem that the secondary user maximizes spectrum holes utilization under the constraint of collision tolerable level. And then we propose a unified approach to solve this optimization problem. According to the solution of the optimization problem, we analyze and present optimal opportunistic spectrum access algorithms in several cases that the idle period follows uniform distribution, exponential distribution, and Pareto or generalized Pareto distribution. Theoretical analysis and simulation results both show that the optimal opportunistic spectrum access algorithms can maximize spectrum holes utilization under the constraint that the collision probability is bounded below collision tolerable level. The impact of sensing error is also analyzed by simulation.

  6. 32 CFR 505.5 - Individual access to personal information.

    Science.gov (United States)

    2010-07-01

    ... child's rights of access under this part, unless the records were created or maintained pursuant to...— (i) Maintained and discarded solely at the discretion of the author; (ii) Created only for the author... subject to provisions of the Act. (f) Denial or limitation of individual's right to access. (1) Even...

  7. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... of Behavior and User Agreement AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice... (EIV) System User Access, Authorization Form and Rules Of Behavior and User Agreement. OMB...

  8. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  9. Climate Change Denial Books and Conservative Think Tanks

    Science.gov (United States)

    Jacques, Peter J.

    2013-01-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites. PMID:24098056

  10. [Denial of pregnancy and neonaticide: psychopathological and clinical features].

    Science.gov (United States)

    Seigneurie, A-S; Limosin, F

    2012-11-01

    Pregnancy denial and neonaticide have recently received media coverage following a series of French cases of neonatal killing. Although it has been known for a long time that some women deny their pregnancy and may kill their newborns, there is still no consensus on the etiopathogenic factors involved in the denial of pregnancy occurrence. Even though neonaticide is often committed by young, poor, unmarried women with little or no prenatal care, it appears that denial of pregnancy is a heterogeneous condition associated with different psychological features. Societies are ambivalent with regard to mothers who killed their children and tend to lay the entire blame on them. Furthermore, there is a widespread lack of understanding among the public on these affairs, when birth control techniques and methods are widely available. The purpose of this article is to describe the different types of pregnancy denial and neonaticide and to review the still debated etiopathogenic hypotheses. The absence of the physical changes of pregnancy at the time of the denial such as cessation of menstruation, abdominal swelling or perception of foetal movements is also discussed. PMID:22939654

  11. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  12. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.;

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  13. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  14. Bluetooth Navigation System using Wi-Fi Access Points

    OpenAIRE

    Rohit Agrawal; Ashesh Vasalya

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater ...

  15. "Show me a justice system that's open, transparent, accessible and inclusive" : barriers to access in the criminal justice system for people with disabilities as victims of crime

    OpenAIRE

    Edwards, Claire; Harold, Gill; Kilcommins, Shane

    2015-01-01

    peer-reviewed This paper considers the barriers that people with disabilities in Ireland face in accessing justice through the criminal justice system when they are victims of crime. It draws on qualitative research with key actors working within the agencies of the Irish criminal justice system, along with disability organisations, victim support organisations and health and social care providers. The research identifies a number of barriers which can be differentiated in terms of those o...

  16. 2 CFR 801.1105 - Cause for a limited denial of participation.

    Science.gov (United States)

    2010-01-01

    ... (Department of Veterans Affairs Optional Subpart for OMB Guidance at 2 CFR Part 180). § 801.1105 Cause for a limited denial of participation. (a) Causes. A limited denial of participation shall be based upon... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Cause for a limited denial of...

  17. Denial of impending death: a discourse analysis of the palliative care literature.

    Science.gov (United States)

    Zimmermann, Camilla

    2004-10-01

    Terminally ill patients and their families are often referred to as being "in denial" of impending death. This study uses the qualitative method of discourse analysis to investigate the usage of the term "denial" in the contemporary hospice and palliative care literature. A Medline search (1970-2001) was performed combining the text words "deny" and "denial" with the subject headings "terminal care", "palliative care" and "hospice care," and restricted to English articles discussing death denial in adults. The 30 articles were analysed using a constant comparison technique and emerging themes regarding the meaning and usage of the words "deny" and "denial" identified. This paper focusses on the theme of denial as an individual psychological process. Three dominant subthemes were distinguished: denial as an unconscious "defence mechanism", denial as "healthy" and denial as temporary. The analysis focusses on the intertextuality of these themes with each other and with previous texts on the denial of death. Elements of the psychoanalytic definition of denial as an unconscious defence mechanism are retained in the literature but are interwoven with new themes on patient choice. The result is an overall discourse that is conflictual and at times self-contradictory but overall consistent with the biomedical model of illness. I suggest that the representation of death denial elaborated in these articles may be related to a larger discourse on dying in contemporary Western society, which both invites patients to participate in the planning of their death and labels those who do not comply. PMID:15279932

  18. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    Directory of Open Access Journals (Sweden)

    Paola Di Maio

    2011-09-01

    Full Text Available The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are largely ignored. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research.

  19. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    CERN Document Server

    Di Maio, Paola

    2011-01-01

    The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are not widely adopted. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA) of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research

  20. Measuring the Gap Between Car and Transit Accessibility : Estimating Access Using a High-Resolution Transit Network Geographic Information System

    NARCIS (Netherlands)

    Benenson, I.; Martens, C.J.C.M.; Rofé, Y.

    2010-01-01

    Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,

  1. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth...

  2. A Secure Infrastructure For System Console and Reset Access

    CERN Document Server

    Horváth, A; Schulz, M; Horvath, Andras; Leonardi, Emanuele; Schulz, Markus

    2003-01-01

    During the last years large farms have been built using commodity hardware. This hardware lacks components for remote and automated administration. Products that can be retrofitted to these systems are either costly or inherently insecure. We present a system based on serial ports and simple machine controlled relays. We report on experience gained by setting up a 50-machine test environment as well as current work in progress in the area.

  3. Signal restoration in intensity-modulated optical OFDM access systems.

    Science.gov (United States)

    Vanin, Evgeny

    2011-11-15

    It is well known that deliberate signal clipping in an intensity-modulated (IM) laser transmitter helps to overcome the optical orthogonal frequency division multiplexing (OFDM) system performance limitation that is related to the signal high peak-to-average power ratio. The amplitude of a clipped OFDM signal has to be optimized in order to minimize the optical power that is required to achieve a specified system performance. However, the signal clipping introduces nonlinear distortion (so-called clipping noise) and leads to a system performance penalty. In this Letter, the performance of the IM optical OFDM system with digital baseband clipping distortion in the transmitter and clipping noise compensation by means of signal restoration in the digital signal processing unit of the system receiver is analytically evaluated. It is demonstrated that the system bit-error ratio can be reduced by more than an order of magnitude, from 10(-3) to 3.5×10(-5), by applying only the first iteration of the signal restoration algorithm proposed in this Letter. The results of the analytical analysis are verified with brute-force numerical simulations based on direct error counting. PMID:22089556

  4. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Science.gov (United States)

    2010-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical...

  5. A Comparitive Study of the Available Solutions to Minimize Denial of Service Attacks in Wireless LAN

    Directory of Open Access Journals (Sweden)

    Arockiam .L

    2011-05-01

    Full Text Available Denial of Service (DoS attack is a major attack in Wireless Local Area Network. This paper studies the available solutions for Denial of Service (DoS attacks and compares them with each other in a wireless infrastructure network. All these methods are used to minimize the DoS attacks. It discusses the Central Manager (CM, Medium Access Control Address Filtering (MAF and Traffic Pattern Filtering (TPF methods to avoid DoS attacks in Wireless Local Area Network (WLAN. Central Manager (CM provides the better solution to avoid DoS attacks and it improves the performance of WLAN with the help of tables and timer. In the case of Transmission Control Protocol (TCP, MAF and TPF methods are used to detect and resolve Authentication Request Flooding (AuthRF and Association Request Flooding (AssRF. This paper compares the performance of these two solutions based on throughput and the results are analyzed with the graphs.

  6. 28 CFR 25.6 - Accessing records in the system.

    Science.gov (United States)

    2010-07-01

    ... law enforcement and other relevant record systems, and may provide a unique State-Assigned Transaction... “Denied” response. (h) POC Determination Messages. POCs shall transmit electronic NICS transaction... FFL. For transactions where a determination has not been communicated to the FFL, the...

  7. Access Control for Monitoring System-Spanning Business Processes

    NARCIS (Netherlands)

    Bassil, S.; Reichert, M.U.; Bobrik, R.; Bauer, Th.

    2007-01-01

    Integrated process support is highly desirable in environ- ments where data related to a particular (business) process are scattered over distributed and heterogeneous information systems (IS). A process monitoring component is a much-needed module in order to provide an integrated view on all these

  8. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...... radio will be presented as well....

  9. Labeling and Rating Systems: Greater Access or Censorship?

    Science.gov (United States)

    Martin, Ann M.

    2015-01-01

    This article asks the question: How well versed are school librarians on issues related to labeling and rating systems? As school librarians continue to design and implement resource location schemes to assist patrons, they must recognize the difference between using labels to create interest in books or implementing labeling and rating systems…

  10. Massive M2M Access with Reliability Guarantees in LTE Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals...... approach, based on a standard operation of the cellular access. The access procedure is divided into two phases, an estimation phase and a serving phase. In the estimation phase the number of arrivals is estimated and this information is used to tune the amount of resources allocated in the serving phase...

  11. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Science.gov (United States)

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  12. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Eles, Petru; Doboli, Alex; Pop, Paul;

    2000-01-01

    In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow...... of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have...... have to be considered during scheduling but also the parameters of the communication protocol should be adapted to fit the particular embedded application. The optimization algorithm, which implies both process scheduling and optimization of the parameters related to the communication protocol...

  13. Multi-tag content access control in RFID system

    OpenAIRE

    Xue, Shun

    2010-01-01

    Radio Frequency Identification (RFID) makes great flexibility and high efficiency for data acquisition in industry and daily life. At the other side, it brings the privacy risks and multiple tags collision issue. Current research in RFID system focuses on the security and privacy issue which is based on authentication protocols between a tag and a Reader. There is a need to design a reasonable protocol which takes care of both multi-tag anti-collision and security issue. This thesis presen...

  14. Geoculture world system, access to Balkan and Albania

    Directory of Open Access Journals (Sweden)

    Ilirjan Çukaj

    2015-03-01

    Full Text Available If culture as a term covers a broad range of relations and social behavior, mutually implicated in influential and economic cycles of the global system, then it becomes wordy geoculture. Geoculture system is used as a term by Wallerstein (2004 who had treated it as a concept largely unused and under a theory of geoculture which plays an important role in the present world system. The theses that is presented in this article is that the global trajectory in the Balkan region is increasing from culture and that, it is imperative to establish a strategic culture direction and management, which, in turn, should be formed not only as a principal need, but also as an obligation of social state institutions to find the viable solutions of the global market policy, economy and culture. And in response to the challenging question the culture of integration becomes imperative now facing nationalism. Albania will have to manage perceptions, fears and realities arising from the above mentioned phenomenon, to establish a balance between the “inside” and “outside” views. In this sense main challenge of Albania is the management of cultural globalization to get the most of opportunities despite the risk of losing ground globally

  15. Using geographic information system tools to improve access to MS specialty care in Veterans Health Administration

    OpenAIRE

    William J. Culpepper, II, PhD, MA; Diane Cowper-Ripley, PhD; Eric R. Litt, BA; Tzu-Yun McDowell, MA; Paul M. Hoffman, MD

    2010-01-01

    Access to appropriate and timely healthcare is critical to the overall health and well-being of patients with chronic diseases. In this study, we used geographic information system (GIS) tools to map Veterans Health Administration (VHA) patients with multiple sclerosis (MS) and their access to MS specialty care. We created six travel-time bands around VHA facilities with MS specialty care and calculated the number of VHA patients with MS who resided in each time band and the number of patient...

  16. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  17. Systems requirements for cable modems in high-speed access networks

    Science.gov (United States)

    Campos, Luis A.; Su, Shing-Fong

    1996-11-01

    Cable modems play an important role in turning the hybrid fiber coax (HFC) networks from pure broadcast video service to high-speed access networks. Many CATV companies and telephone companies are experimenting with high-speed data services over HFC. With today's technology, cable modems can easily run at a data rate of 10 Mbps or above. They allow subscribers fast access to on-line services and the Internet. A variety of cable modems have been developed and marketed by cable modem vendors. Selection of right cable modems for deployment in HFC access networks has become a nontrivial matter. Different HFC systems may require different types of cable modems. In this paper, we review the development of HFC systems and discuss data networking using approaches that include connectionless data networking and connection-oriented data networking systems. The system requirements for cable modems in terms of throughput, robustness, ease of operation, protocol efficiency, reliability, network management, and cost are addressed.

  18. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  19. Rules and access rights of the Estonian integrated e-Health system.

    Science.gov (United States)

    Tiik, Madis

    2010-01-01

    There should be a clear understanding that when implementing an electronic health record system (EHR), one of the hardest problems we have to solve is the access rights. In Estonia this process lasted for three years and involved all stakeholders of the healthcare sector. Special ethical committee was established to advise the decision makers and doctors to help them understand the ethical dilemmas from the patient's and society's point of view. In this article you will find a short overview of the access rights of the system, roles of the healthcare systems' employees. Descriptions of some specific situations like underage patients and representation of patient with restricted active legal capacity.

  20. An Information System to Access Status Information of the LHCb Online

    International Nuclear Information System (INIS)

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  1. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  2. A Distributed Metadata Management, Data Discovery and Access System

    CERN Document Server

    Palanisamy, Giriprakash; Green, Jim; Wilson, Bruce

    2010-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, among other features. Mercury provides a single portal to information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fa...

  3. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    Energy Technology Data Exchange (ETDEWEB)

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  4. 28 CFR 16.73 - Exemption of Office of Legal Policy System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Office of Legal Policy System—limited access. (a) The following system of records is exempt from 5 U.S.C..., or legal obligations or duties. (4) From subsections (e)(4)(G) and (H) because this system is exempt... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of Legal...

  5. Experimental grid access for dynamic discovery and data transfer in distributed interactive simulation systems

    NARCIS (Netherlands)

    A. Tirado-Ramos; K. Zajac; Z. Zhao; P.M.A. Sloot; G.D. van Albada; M. Bubak

    2003-01-01

    Interactive Problem Solving Environments (PSEs) offer an integrated approach for constructing and running complex systems, such as distributed simulation systems. New distributed infrastructures, like the Grid, support the access to a large variety of core services and resources that can be used by

  6. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to b

  7. Environmental Information Management For Data Discovery and Access System

    Science.gov (United States)

    Giriprakash, P.

    2011-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source software and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007 and released in early 2008. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, and ready customization to meet the needs of the multiple projects which use Mercury. For the end users, Mercury provides a single portal to very quickly search for data and information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow ! the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fast search results to the user, while allowing data providers to advertise the availability of their data and maintain complete control and ownership of that data.

  8. A High Speed Mobile Courier Data Access System That Processes Database Queries in Real-Time

    Science.gov (United States)

    Gatsheni, Barnabas Ndlovu; Mabizela, Zwelakhe

    A secure high-speed query processing mobile courier data access (MCDA) system for a Courier Company has been developed. This system uses the wireless networks in combination with wired networks for updating a live database at the courier centre in real-time by an offsite worker (the Courier). The system is protected by VPN based on IPsec. There is no system that we know of to date that performs the task for the courier as proposed in this paper.

  9. Fast Transit Access to the Outer Solar System

    Science.gov (United States)

    Squire, Jared; Bering, Edgar; Giambusso, Matthew; Carter, Mark; Ilin, Andrew; Diaz, Franklin R. Chang

    2015-11-01

    We explore the capability of a VASIMR® reusable probe “catapult” concept to send a 4000-5000 kg spacecraft to Jupiter on a Hohmann-like transfer orbit, arriving in just 36 months elapsed time. The VASIMR® performs a slingshot pass close to the Sun and uses the high level of available solar energy to produce a sustained burst of high thrust. Enough kinetic energy is provided to the probe to reach Jupiter orbit within 0.7-1.4 AU. The Catapult release the probe with enough speed to reach Jupiter in three years, and returns to Earth for another mission. This study identifies the important parameters in the probe ejector operation (power level, propellant mass, payload release point, distance of closest approach to the Sun), and scan these parameters to understand and optimize the capabilities of the proposed system. We assume that the Catapult and its payload begin at the Earth’s sphere of influence (SOI), and are coasting in the Earth’s orbit about the Sun. The VASIMR® engine’s power rating must match the peak power available when the spacecraft is closest to the Sun. The solar array is assumed to be a planar array rather than a concentrator since it will have to operate near the Sun, where a concentrator would overheat photovoltaic cells. The feasibility of not releasing the payload and using the VASIMR® to provide thrust for the duration of the transfer orbit will also be examined. In this scenario, the VASIMR® RF generators could serve double duty as radar RF sources.

  10. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  11. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  12. 45 CFR 1701.6 - Form of denial.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Form of denial. 1701.6 Section 1701.6 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND... Libraries and Information Science, Suite 601, 1717 K Street NW., Washington, DC 20036, and (d) that...

  13. 33 CFR 151.08 - Denial of entry.

    Science.gov (United States)

    2010-07-01

    ... BALLAST WATER Implementation of MARPOL 73/78 and the Protocol on Environmental Protection to the Antarctic Treaty as it Pertains to Pollution from Ships General § 151.08 Denial of entry. (a) Unless a ship is... prewashed under 46 CFR part 153, may enter any port or terminal under § 158.110(a) of this chapter...

  14. Iran's Denial of Education to Baha'is

    Science.gov (United States)

    Clarken, Rodney H.

    2009-01-01

    This paper briefly describes the background of the persecution of the Baha'is in Iran, especially the denial of education, and explores what could be done to alleviate this injustice, including enlisting the support of nations, organizations, media and people around the world. Baha'is are the largest religious minority in Iran and have been…

  15. 7 CFR 400.47 - Denial of crop insurance.

    Science.gov (United States)

    2010-01-01

    ... policyholder share reduced in accordance with 7 CFR 400.681(b), when any person becomes ineligible for crop... 7 Agriculture 6 2010-01-01 2010-01-01 false Denial of crop insurance. 400.47 Section 400.47 Agriculture Regulations of the Department of Agriculture (Continued) FEDERAL CROP INSURANCE...

  16. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  17. 44 CFR 5.54 - Denial of request of records.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of request of records. 5.54 Section 5.54 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... within a specified number of days, when the search or examination is expected to be complete. The...

  18. 7 CFR 1400.5 - Denial of program benefits.

    Science.gov (United States)

    2010-01-01

    ... OF AGRICULTURE GENERAL REGULATIONS AND POLICIES PAYMENT LIMITATION AND PAYMENT ELIGIBILITY FOR 2009 AND SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS General Provisions § 1400.5 Denial of program benefits..., or that has the effect of evading this part. Such acts may include, but are not limited to:...

  19. The Child with Cancer: Patterns of Communication and Denial.

    Science.gov (United States)

    Spinetta, John J.; Maloney, Lorrie J.

    1978-01-01

    Examines the role of communication and denial in coping efforts of children with cancer. Results indicate level of family communication about cancer expressed by mother's communication is correlated with hypothesized responses in child. Usefulness of three instruments as effective tools in measuring child's reactions is demonstrated. (Author/BEF)

  20. 42 CFR 433.148 - Denial or termination of eligibility.

    Science.gov (United States)

    2010-10-01

    ... Assignment of Rights to Benefits § 433.148 Denial or termination of eligibility. In administering the assignment of rights provision, the agency must: (a) Deny or terminate eligibility for any applicant or recipient who— (1) Refuses to assign his own rights or those of any other individual for whom he can...

  1. 7 CFR 54.1032 - Denial or withdrawal of service.

    Science.gov (United States)

    2010-01-01

    ... Statutes set forth in 7 CFR §§ 1.130 through 1.151 and the Supplemental Rules of Practice in part 50, 7 CFR..., Processing, and Packaging of Livestock and Poultry Products § 54.1032 Denial or withdrawal of service. (a)(1... United States Department of Agriculture by stamp, or brand directly on any equipment or utensil, or...

  2. On climate change skepticism and denial in tourism

    NARCIS (Netherlands)

    Hall, C.M.; Amelung, B.; Cohen, S.; Eijgelaar, E.; Gössling, S.; Higham, J.; Leemans, R.; Peeters, P.; Ram, Y.; Scott, D.

    2015-01-01

    The period leading to and immediately after the release of the IPCC’s fifth series of climate change assessments saw substantial efforts by climate change denial interests to portray anthropogenic climate change (ACC) as either unproven theory or a negligible contribution to natural climate variabil

  3. 45 CFR 5.34 - Appeal of denials.

    Science.gov (United States)

    2010-10-01

    ... give any explanation. (c) Review process. Before making a decision on an appeal of a denial, the designated review official will consult with the General Counsel to ensure that the rights and interests of... reasons why you believe that the FOIA exemption(s) we cited do not apply to the records that you...

  4. AN ANALYSIS OF CURRENT COMPUTER NETWORK ATTACK PROCEDURES, THEIR MITIGATION MEASURES AND THE DEVELOPMENT OF AN IMPROVED DENIAL OF SERVICE (DoS ATTACK MODEL

    Directory of Open Access Journals (Sweden)

    IHEKWEABA OGECHI

    2013-04-01

    Full Text Available This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as a proof of concept, and then applied in the development of a model for an adaptive intelligent multi-agent for network protection, against denial of service attacks.

  5. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    Science.gov (United States)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  6. Accessing Multi-Source Geological Data through Network in MORPAS Software System

    Institute of Scientific and Technical Information of China (English)

    Mei Hongbo; Hu Guangdao; Chen Jianguo; Li Zhenhua

    2003-01-01

    MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.

  7. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  8. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  9. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway.

    Science.gov (United States)

    García, Carmelo R; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Pérez, Ricardo; Alayón, Francisco

    2015-08-18

    The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  10. Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS for Building Security

    Directory of Open Access Journals (Sweden)

    Wahyudi

    2007-01-01

    Full Text Available Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker verification, is an attractive and relatively unobtrusive means of providing security for admission into an important or secured place. An individual’s voice cannot be stolen, lost, forgotten, guessed, or impersonated with accuracy. Due to these advantages, this paper describes design and prototyping a voice-based door access control system for building security. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether to accept or reject the user’s identity claim or possibly to report insufficient confidence and request additional input before making the decision. Furthermore, intelligent system approach is used to develop authorized person models based on theirs voice. Particularly Adaptive-Network-based Fuzzy Inference Systems is used in the proposed system to identify the authorized and unauthorized people. Experimental result confirms the effectiveness of the proposed intelligent voice-based door access control system based on the false acceptance rate and false rejection rate.

  11. Quality Test Template toward Multi-user Access Control of Internet-Based System

    Directory of Open Access Journals (Sweden)

    Nan Nie

    2011-06-01

    Full Text Available Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

  12. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    OpenAIRE

    Zummo SalamA

    2008-01-01

    Abstract We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI) in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded...

  13. Transparent image access in a distributed picture archiving and communications system: The master database broker

    OpenAIRE

    Cox, R D; Henri, C. J.; Rubin, R. K.

    1999-01-01

    A distributed design is the most cost-effective system for small- to medium-scale picture archiving and communications systems (PACS) implementations. However, the design presents an interesting challenge to developers and implementers: to make stored image data, distributed throughout the PACS network, appear to be centralized with a single access point for users. A key component for the distributed system is a central or master database, containing all the studies that have been scanned int...

  14. Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    2000-01-01

    We present an approach to bus access optimization and schedulability analysis for the synthesis of hard real-time distribution embedded systems. The communication model is based on a time-triggered protocol. We have developed an analysis for the communication delays proposing four different messa...... scheduling policies over a time-triggered communication channel. Optimization strategies for the bus access scheme are developed, and the four approaches to message scheduling are compared using extensive experiments.......We present an approach to bus access optimization and schedulability analysis for the synthesis of hard real-time distribution embedded systems. The communication model is based on a time-triggered protocol. We have developed an analysis for the communication delays proposing four different message...

  15. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  16. 49 CFR 37.185 - Fleet accessibility requirement for OTRB fixed-route systems of large operators.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Fleet accessibility requirement for OTRB fixed....185 Fleet accessibility requirement for OTRB fixed-route systems of large operators. Each large... percent of the buses in its fleet with which it provides fixed-route service are readily accessible to...

  17. OASIS: A Data Fusion System Optimized for Access to Distributed Archives

    Science.gov (United States)

    Berriman, G. B.; Kong, M.; Good, J. C.

    2002-05-01

    The On-Line Archive Science Information Services (OASIS) is accessible as a java applet through the NASA/IPAC Infrared Science Archive home page. It uses Geographical Information System (GIS) technology to provide data fusion and interaction services for astronomers. These services include the ability to process and display arbitrarily large image files, and user-controlled contouring, overlay regeneration and multi-table/image interactions. OASIS has been optimized for access to distributed archives and data sets. Its second release (June 2002) provides a mechanism that enables access to OASIS from "third-party" services and data providers. That is, any data provider who creates a query form to an archive containing a collection of data (images, catalogs, spectra) can direct the result files from the query into OASIS. Similarly, data providers who serve links to datasets or remote services on a web page can access all of these data with one instance of OASIS. In this was any data or service provider is given access to the full suite of capabilites of OASIS. We illustrate the "third-party" access feature with two examples: queries to the high-energy image datasets accessible from GSFC SkyView, and links to data that are returned from a target-based query to the NASA Extragalactic Database (NED). The second release of OASIS also includes a file-transfer manager that reports the status of multiple data downloads from remote sources to the client machine. It is a prototype for a request management system that will ultimately control and manage compute-intensive jobs submitted through OASIS to computing grids, such as request for large scale image mosaics and bulk statistical analysis.

  18. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  19. The upgrade of the J-TEXT experimental data access and management system

    International Nuclear Information System (INIS)

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  20. 28 CFR 16.92 - Exemption of Environment and Natural Resources Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Environment and Natural....92 Exemption of Environment and Natural Resources Division Systems—limited access. (a)(1) The...) Environment and Natural Resources Division Case and Related Files System, JUSTICE/ENRD-003. (ii) (2)...

  1. Accessibility Evaluation of Online Learning Management System for Persons with Visual Impairment

    Science.gov (United States)

    Suwannawut, Nantanoot

    2014-01-01

    Many academic institutions around the world are utilizing and investing in online learning management systems (LMS). While several research studies have examined the functionality of this type of technology, little attention has been paid to accessibility issues, in particular to the complex web-based interfaces for learners with disabilities,…

  2. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose;

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services...

  3. Crop Status Monitoring using Multispectral and Thermal Imaging systems for Accessible Aerial Platforms

    Science.gov (United States)

    Agricultural aircraft and unmanned aerial systems (UAS) are easily scheduled and accessible remote sensing platforms. Canopy temperature data were taken with an Electrophysics PV-320T thermal imaging camera mounted in agricultural aircraft. Weather data and soil water potential were monitored and th...

  4. 28 CFR 16.93 - Exemption of Tax Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Tax Division Systems-limited access. 16.93 Section 16.93 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE OF... concerning the nature of that investigation and the information obtained, and to determine the identity...

  5. 28 CFR 16.77 - Exemption of U.S. Trustee Program System-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of U.S. Trustee Program System-limited access. 16.77 Section 16.77 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE... existence of a confidential investigation or reveal the identity of witnesses or confidential informants....

  6. 28 CFR 16.80 - Exemption of Office of Professional Responsibility System-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of Professional Responsibility System-limited access. 16.80 Section 16.80 Judicial Administration DEPARTMENT OF JUSTICE... obtained as to his activities; of the identity of confidential sources, witnesses, and law...

  7. 28 CFR 16.88 - Exemption of Antitrust Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Antitrust Division Systems-limited access. 16.88 Section 16.88 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR DISCLOSURE... and compiled for law enforcement purposes could result in the premature disclosure of the identity...

  8. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final Rule; correction. SUMMARY: The Copyright Office makes a nonsubstantial correction to its regulation announcing...

  9. An API-based search system for one click access to information

    NARCIS (Netherlands)

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    2013-01-01

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  10. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    Science.gov (United States)

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  11. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  12. Design and Implementation of File Access and Control System Based on Dynamic Web

    Institute of Scientific and Technical Information of China (English)

    GAO Fuxiang; YAO Lan; BAO Shengfei; YU Ge

    2006-01-01

    A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained.

  13. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-15

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4.

  14. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    International Nuclear Information System (INIS)

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4

  15. Combinatory Spread—Spectrum Multiple—Access Based on Residue Number System:System and Performance

    Institute of Scientific and Technical Information of China (English)

    YangLieliang; LiChengshu

    1995-01-01

    A combinatory direct-sequence based on residue number system(RNS),spread spec-trum multiple-access communication system model is presented.Under this communication envi-ronment,each user is assigned a set of∑i=1lmi(when i≠j,gcd(mi,mj)=1)othogonal sequences;Each receiver has ∑i=1l micorrelators used for despread,log2(пi=1lmi) information bits can be trans-mitted in a symbol period.We obtain approximations for the multiuser probability of error when the channel noise is a combination of additive white Gaussian noise (AWGN)and multiple-access interference .In section4,we compare the performance such as transmission capability,system structure,and the probability of error with the system proposed by P.K.Enge.

  16. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...

  17. A Novel Memory Structure for Embedded Systems: Flexible Sequential and Random Access Memory

    Institute of Scientific and Technical Information of China (English)

    Ying Chen; Karthik Ranganathan; Vasudev V. Pai; David J. Lilja; Kia Bazargan

    2005-01-01

    The on-chip memory performance of embedded systems directly affects the system designers' decision about how to allocate expensive silicon area. A novel memory architecture, flexible sequential and random access memory (FSRAM),is investigated for embedded systems. To realize sequential accesses, small "links" are added to each row in the RAM array to point to the next row to be prefetched. The potential cache pollution is ameliorated by a small sequential access buffer (SAB). To evaluate the architecture-level performance of FSRAM, we ran the Mediabench benchmark programs on a modified version of the SimpleScalar simulator. Our results show that the FSRAM improves the performance of a baseline processor with a 16KB data cache up to 55%, with an average of 9%; furthermore, the FSRAM reduces 53.1% of the data cache miss count on average due to its prefetching effect. We also designed RTL and SPICE models of the FSRAM, which show that the FSRAM significantly improves memory access time, while reducing power consumption, with negligible area overhead.

  18. Difficulties experienced by trans people in accessing the Unified Health System.

    Science.gov (United States)

    Rocon, Pablo Cardozo; Rodrigues, Alexsandro; Zamboni, Jésio; Pedrini, Mateus Dias

    2016-08-01

    The objective of this study was to discuss the difficulties of trans people living in the metropolitan region of Greater Vitória, Espírito Santo, Brazil, in accessing the health services of the Unified Health System (Sistema Único de Saúde - SUS). We used a qualitative approach through semi-structured interviews with 15 trans people. The results point to disrespect toward the adopted name, discrimination, and the diagnosis required for the gender reassignment process as major limitations to accessing the healthcare system. The diagnosis helps hide the responsibility of heteronormativity and gender binarism in the social marginalization of trans people. It is concluded that it is necessary to review the issue of diagnosis, given that the existence of a prior pathology is not required to access the SUS. It is important to develop educational programmes and permanent campaigns concerning the right to access the healthcare system free from discrimination and to use the adopted name. PMID:27557024

  19. Design and Implementation of a Web-based Monitoring System by using EPICS Channel Access Protocol

    International Nuclear Information System (INIS)

    Proton Engineering Frontier Project (PEFP) has developed a 20MeV proton accelerator, and established a distributed control system based on EPICS for sub-system components such as vacuum unit, beam diagnostics, and power supply system. The control system includes a real-time monitoring and alarm functions. From the aspect of a efficient maintenance of a control system and a additional extension of subsystems, EPICS software framework was adopted. In addition, a control system should be capable of providing an easy access for users and a real-time monitoring on a user screen. Therefore, we have implemented a new web-based monitoring server with several libraries. By adding DB module, the new IOC web monitoring system makes it possible to monitor the system through the web. By integrating EPICS Channel Access (CA) and Database libraries into a Database module, the web-based monitoring system makes it possible to monitor the sub-system status through user's internet browser. In this study, we developed a web based monitoring system by using EPICS IOC (Input Output Controller) with IBM server

  20. The web of hate: An exploratory study of holocaust denial on the net

    OpenAIRE

    Di Giacomo, Daniela

    2005-01-01

    Holocaust denial is one manifestation of racist and antisemitic thought, the scope of which has increased dramatically over the last decade, especially on the Internet. This thesis applies an anti-racism framework to the study of Holocaust denial on the Internet with the objectives of identifying the key claims made by Holocaust deniers, the themes emerging from these claims, and how practitioners working in the fight against hate understand and identify the phenomenon of Holocaust denial. Qu...

  1. Open Access Intellectual Property Systems: A Comparison to Commercial Solutions in Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    Jan Cerny

    2016-07-01

    Full Text Available ICT/IS management plays an important role within the framework of innovation management, and one of the key elements of this role is the support of Competitive Intelligence in the context of innovation processes. The strategic information needs of innovation management are also directed towards different kinds of intellectual property (IP information entities and commercialization. The purpose of this paper is to define these entities and IP information systems as an important part of a company’s Competitive Intelligence Unit for competitor analysis and technology trends. The open access IP information systems will be analysed together with commercial solutions.. The aim of this paper is to underline the importance of open access IP systems compared to added value commercial solutions for competitive intelligence purposes for SMEs. The comparison will be carried out using examples of patent searches within a concrete dataset.

  2. Discovery of abundant, accessible hydrocarbons nearly everywhere in the solar system

    Energy Technology Data Exchange (ETDEWEB)

    Zuppero, A.

    1996-05-01

    analysis of the data gathered during the Comet Halley encounter during 1987 resulted in a body of literature asserting that all comets contain substantial percentages of hydrocarbon solids. These solids appear to have a strong similarity to petrochemicals. Arguments are made that the amount of hydrocarbon material in the accessible comets of the inner Solar system can substantially exceed the known reserves of hydrocarbons on Earth. An example is given of at least one conceptually simple method to use comet material as feedstock for space transportation schemes that can move masses through the solar system comparable to the mass carried by oil supertankers. The presentation concludes we need to send prospecting and assay probes to a sampling of the accessible comets to determine the amount of hydrocarbons and the form and location of materials needed for space transportation systems.

  3. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    Science.gov (United States)

    Ha, Tri T.; Pratt, Timothy

    1989-05-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  4. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Directory of Open Access Journals (Sweden)

    Line Neerup Handlos

    2016-09-01

    Full Text Available Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  5. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    International Nuclear Information System (INIS)

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report

  6. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-01-01

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption. PMID:27657096

  7. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  8. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, C.L.; O' Rourke, J.E.; Allirot, D.; O' Connor, K.

    1980-09-01

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report.

  9. Welcome to Systems - A New Interdisciplinary Open Access Journal for Systems Science and Engineering

    OpenAIRE

    Huynh, Thomas

    2013-01-01

    The article of record as published may be found at http://dx.doi.org/10.3390/systems1010001 Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies.

  10. Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features

    Directory of Open Access Journals (Sweden)

    Prathamesh Timse

    2014-04-01

    Full Text Available This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition system when an unknown person is being detected, wherein the system will send an email to the owner of the system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a Dropbox [8] account.

  11. Urban air quality management and information systems in Europe: legal framework and information access

    International Nuclear Information System (INIS)

    The European Union (EU) legislative framework related to air quality, together with national legislation and relevant declarations of the United Nations (UN), requires an integrated approach concerning air quality management (AQM), and accessibility of related information for the citizens. In the present paper, the main requirements of this legislative framework are discussed and main air quality management and information system characteristics are drawn. The use of information technologies is recommended for the construction of such systems. The World Wide Web (WWW) is considered a suitable platform for system development and integration and at the same time as a medium for communication and information dissemination. (author)

  12. Security Camera System can be access into mobile with internet from remote place

    Directory of Open Access Journals (Sweden)

    Dr. Khanna SamratVivekanand Omprakash

    2012-01-01

    Full Text Available This paper represents how camera can captured the images and video into the database and then it may transformed to the mobile with help of Internet. Developing mobile applications how the data can be viewed on the mobile from the remote place. By assigning real IP to the storage device from ISP and connected to the internet . Developing mobile applications on windows mobile which runs only on the windows mobile . Wireless camera in terms of 4 , 8, 12, 16 are connected with the system. Windows based application develop for 4 , 8 , 12,16 channels to see at a time on desktop computer . The PC is connected with internet and having Client server application which is connected to the Windows Web hosting Server through the internet. With the help of ISP server we can assign IP to the Window Web Server with domain name . Domain name will be access from the world. By developing mobile applications on web we can access it on mobile . Separate setup of windows .exe develop for the Windows Mobile phone to access the information from the server. Client setup can be installed on the mobile and it fetches the data from server and server is based on real IP with domain name and connected with Internet . Digital Wireless cameras are connected & data is stored in Digital Video Recorder having 1 Terabyte of hard disk with different channel like 4, 8, 12,16. We can see Video output in mobile by installing the client setup or by accessing directly from web browser which supports the application for mobile. The beauty of this software is that we can access security camera system into the mobile with internet from remote place.

  13. S-band multiple-access interference study for advanced tracking and data relay satellite systems

    Science.gov (United States)

    Peng, Wei-Chung; Yang, Chau-Chin

    1990-01-01

    The results of a study on the effect of mutual interference among S-band multiple access (SMA) system users of advanced tracking and data relay satellite system (ATDRSS) are presented. In the ATDRSS era, the SMA system is required to support data rates ranging from 10 kb/s to 3 Mb/s. The system will consist of four advanced tracking and data relay satellites (ATDRS) each supporting up to five telemetry links. All users have 10 MHz bandwidth with their carrier frequency equal to 2.2875 GHz. A hybrid SDMA/CDMA scheme is used to mitigate the effect of the interference among system users. SMA system interference probability is evaluated with CLASS software. User link margin degradation due to mutual interference between two users is evaluated. System interference probability is evaluated for the projected 1996 mission model, a reference mission model, and a modified reference mission model.

  14. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  15. A METHOD OF AND A SYSTEM FOR CONTROLLING ACCESS TO A SHARED RESOURCE

    DEFF Research Database (Denmark)

    2006-01-01

    A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority will be awa...... will be awaiting, i.e. no further data items are transmitted with that priority, until all lower, non-awaiting priorities have had one or more data items transmitted to the shared resource. In this manner, guarantees services may be obtained for all priorities.......A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority...

  16. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  17. Exploring the drivers of health and healthcare access in Zambian prisons: a health systems approach

    Science.gov (United States)

    Topp, Stephanie M.; Moonga, Clement N.; Luo, Nkandu; Kaingu, Michael; Chileshe, Chisela; Magwende, George; Heymann, S. Jody; Henostroza, German

    2016-01-01

    Background Prison populations in sub-Saharan Africa (SSA) experience a high burden of disease and poor access to health care. Although it is generally understood that environmental conditions are dire and contribute to disease spread, evidence of how environmental conditions interact with facility-level social and institutional factors is lacking. This study aimed to unpack the nature of interactions and their influence on health and healthcare access in the Zambian prison setting. Methods We conducted in-depth interviews of a clustered random sample of 79 male prisoners across four prisons, as well as 32 prison officers, policy makers and health care workers. Largely inductive thematic analysis was guided by the concepts of dynamic interaction and emergent behaviour, drawn from the theory of complex adaptive systems. Results A majority of inmates, as well as facility-based officers reported anxiety linked to overcrowding, sanitation, infectious disease transmission, nutrition and coercion. Due in part to differential wealth of inmates and their support networks on entering prison, and in part to the accumulation of authority and material wealth within prison, we found enormous inequity in the standard of living among prisoners at each site. In the context of such inequities, failure of the Zambian prison system to provide basic necessities (including adequate and appropriate forms of nutrition, or access to quality health care) contributed to high rates of inmate-led and officer-led coercion with direct implications for health and access to healthcare. Conclusions This systems-oriented analysis provides a more comprehensive picture of the way resource shortages and human interactions within Zambian prisons interact and affect inmate and officer health. While not a panacea, our findings highlight some strategic entry-points for important upstream and downstream reforms including urgent improvement in the availability of human resources for health; strengthening of

  18. An Acquisition Performance Analysis of DS-MC-CDMA System under Multiple Access Interference Conditions

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Multi-Access Interference's (MAI's) effect on parallel acquisition performance of DS-Multi-carrier CDMA system under the typical indoor radio channel is discussed in the paper. Moreover, a comparison of acquisition performance impairment produced by the MAI in DS-MC-CDMA and DS-Single-carrier CDMA is also made. Results are given in terms of average acquisition time obtained by means of simulations and theory analysis.

  19. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    OpenAIRE

    Olusegun Folorunso; Olusegun Afeez Mustapha

    2015-01-01

    Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC) strategy and fuzzy-expert systems was used to enhance the qu...

  20. Multiagent Q-Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    OpenAIRE

    Husheng Li

    2010-01-01

    An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL) is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of Q-learning is extended from single user case to multiagent case by considering o...

  1. Evaluation and Improvement of Web Information System Accessibility with Markup Language Possibilities

    OpenAIRE

    Vitols, G; Arhipova, I

    2010-01-01

    Markup languages are used to describe the content published in the World Wide Web. Aim of this article is to analyze hypertext markup language versions and identify possibilities of improvement accessibility for the web information systems with markup language elements appropriate application. Analysis of the document structure is performed. Document structure and text description elements are selected. Selected elements are practically evaluated with screen readers. From the evaluation resul...

  2. A High-Throughput Random Access Protocol for Multiuser MIMO Systems

    Directory of Open Access Journals (Sweden)

    Yan Zhang

    2008-05-01

    Full Text Available We propose a high-throughput random access protocol for 2×2 multiuser multiple-input multiple-output (MIMO systems. The cross-layer mechanism utilizes the packets combining technique to exploit the advantages of both spatial multiplexing and multipacket reception. Analytical result indicates that the proposed scheme achieves 0.669 per spatial degree of freedom in stable throughput, which is much higher than those in the existed studies.

  3. Design of Nutrition Catering System for Athletes Based on Access Database

    OpenAIRE

    Hongjiang Wu,; Haiyan Zhao; Xugang Liu; Mingshun Xing

    2015-01-01

    In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO) and Structure Query Language (SQL) were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring n...

  4. What’s blocking sustainability? Human nature, cognition, and denial

    Directory of Open Access Journals (Sweden)

    William Rees

    2010-10-01

    Full Text Available In 1992, 1,700 of the world’s top scientists issued a public statement titled The World Scientists’ Warning to Humanity. They reported that “a great change in our stewardship of the Earth and the life on it is required if vast human misery is to be avoided and our global home on this planet is not to be irretrievably mutilated.” More than a decade later, the authors of the Millennium Ecosystem Assessment were moved to echo the scientists’ warning asserting that “[h]uman activity is putting such a strain on the natural functions of the Earth that the ability of the planet’s ecosystems to sustain future generations can no longer be taken for granted.” Ours is allegedly a science-based culture. For decades, our best science has suggested that staying on our present growth-based path to global development implies catastrophe for billions of people and undermines the possibility of maintaining a complex global civilization. Yet there is scant evidence that national governments, the United Nations, or other official international organizations have begun seriously to contemplate the implications for humanity of the scientists’ warnings, let alone articulate the kind of policy responses the science evokes. The modern world remains mired in a swamp of cognitive dissonance and collective denial seemingly dedicated to maintaining the status quo. We appear, in philosopher Martin Heidegger’s words, to be “in flight from thinking.” Just what is going on here? I attempt to answer this question by exploring the distal, biosocial causes of human economic behavior. My working hypothesis is that modern H. sapiens is unsustainable by nature—unsustainability is an inevitable emergent property of the systemic interaction between contemporary technoindustrial society and the ecosphere. I trace this conundrum to humanity’s once-adaptive, subconscious, genetic predisposition to expand (shared with all other species, a tendency reinforced by

  5. Access To Land And The System Of Land Ownership In Northern Cameroon

    Directory of Open Access Journals (Sweden)

    Paul AHIDJO

    2012-06-01

    Full Text Available Northern Cameroon is a vast geographical region made up of a population with diverse customs, religion and migration process. The entire population is made up of paleo-nigritics, neo-Sudanese and pastoral nomads who practice activities such as agriculture, livestock and fisheries. This ethnic heterogeneity, complex historical events and cultural diversity has made the customary systemof land tenure to vary both in their ancient aspects as well as contemporary manifestations. Therefore, based on verbal assertion and written data, this article examines the methods of land access as well as the traditional and modern land tenure system. For the population of Northern Cameroon and elsewhere, land represents a natural resource of prime importance. Access to land and its control constitutes a major economic challenge and it is equally a source ofdiverse conflicts. The system of land ownership has been influenced by external unforeseen events. From the pre-colonial period to the so called post colonial period, access to land and land ownership vary between the conservation of a traditional system which land owners are trying to preserve and the weight of modernity which has economic implications.

  6. New capabilities in the HENP grand challenge storage access system and its application at RHIC

    International Nuclear Information System (INIS)

    The High Energy and Nuclear Physics Data Access Grand Challenge project has developed an optimizing storage access software system that was prototyped at RHIC. It is currently undergoing integration with the STAR experiment in preparation for data taking that starts in mid-2000. The behavior and lessons learned in the RHIC Mock Data Challenge exercises are described as well as the observed performance under conditions designed to characterize scalability. Up to 250 simultaneous queries were tested and up to 10 million events across 7 event components were involved in these queries. The system coordinates the staging of ''bundles'' of files from the HPSS tape system, so that all the needed components of each event are in disk cache when accessed by the application software. The caching policy algorithm for the coordinated bundle staging is described in the paper. The initial prototype implementation interfaced to the Objectivity/DB. In this latest version, it evolved to work with arbitrary files and use CORBA interfaces to the tag database and file catalog services. The interface to the tag database and the MySQL-based file catalog services used by STAR are described along with the planned usage scenarios

  7. Access Denied

    Science.gov (United States)

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  8. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Directory of Open Access Journals (Sweden)

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  9. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  10. Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization Along With Password Authentication And Billing System

    Directory of Open Access Journals (Sweden)

    Asst.Prof.T.A.More

    2015-03-01

    Full Text Available In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.

  11. The optimal access system for future far-offshore wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  12. Experimental demonstration of 2.5 Gbit/S incoherent two-dimensional optical code division multiple access system

    International Nuclear Information System (INIS)

    We demonstrated error-free operation of 4 simultaneous users in a fast frequency-hopping time-spreading optical code division multiple access system operating at 2.5 Gbit/s a Star architecture. Effective power penalty was ≤0.5dB. Novel optical code division multiple access receiver based on Terahertz Optical Asymmetric Demultiplexer was demonstrated to eliminate multiple access interference (Authors)

  13. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  14. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    OpenAIRE

    Maxim DOBRINOIU

    2016-01-01

    Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slight...

  15. Adaptive radio resource allocation for multiple traffic OFDMA broadband wireless access system

    Institute of Scientific and Technical Information of China (English)

    LU Yan-hui; LUO Tao; YIN Chang-chuan; YUE Guang-xin

    2006-01-01

    In this article, an adaptive radio resource allocation algorithm applied to multiple traffic orthogonal frequency division multiple access (OFDMA) system is proposed, which distributes subcarriers and bits among users according to their different quality of service requirements and traffic type. By classifying and prioritizing the users based on their traffic characteristic and ensuring resource for higher priority users, the new scheme decreases tremendously the outage probability of the users requiting a real-time transmission without impact on the spectrum efficiency of system, as well as the outage probability of data users is not increased compared with the radio resource allocation methods published.

  16. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  17. Using geographic information system tools to improve access to MS specialty care in Veterans Health Administration

    Directory of Open Access Journals (Sweden)

    William J. Culpepper, II, PhD, MA

    2010-08-01

    Full Text Available Access to appropriate and timely healthcare is critical to the overall health and well-being of patients with chronic diseases. In this study, we used geographic information system (GIS tools to map Veterans Health Administration (VHA patients with multiple sclerosis (MS and their access to MS specialty care. We created six travel-time bands around VHA facilities with MS specialty care and calculated the number of VHA patients with MS who resided in each time band and the number of patients who lived more than 2 hours from the nearest specialty clinic in fiscal year 2007. We demonstrate the utility of using GIS tools in decision-making by providing three examples of how patients' access to care is affected when additional specialty clinics are added. The mapping technique used in this study provides a powerful and valuable tool for policy and planning personnel who are evaluating how to address underserved populations and areas within the VHA healthcare system.

  18. Towards the Adoption of Open Source and Open Access Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Ilias Maglogiannis

    2012-01-01

    Full Text Available As the Electronic Health Record (EHR systems constantly expand to support more clinical activities and their implementations in healthcare organizations become more widespread, several communities have been working intensively for several years to develop open access and open source EHR software, aiming at reducing the costs of EHR deployment and maintenance. In this paper, we describe and evaluate the most popular open source electronic medical records such as openEMR, openMRS and patientOS, providing their technical features and potentials. These systems are considered quite important due to their prevalence. The article presents the key features of each system and outlines the advantages and problems of Open Source Software (OSS Systems through a review of the literature, in order to demonstrate the possibility of their adoption in modern electronic healthcare systems. Also discussed are the future trends of OS EHRs in the context of the Personal Health Records and mobile computing paradigm.

  19. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.;

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  20. Reduce Threats in Competitive Intelligence System: A Generic Information Fusion Access Control Model

    Directory of Open Access Journals (Sweden)

    Anass El haddadi

    2011-03-01

    Full Text Available Information fusion is a cornerstone of competitive intelligence activity that aims at supporting decisionmaking by collecting, analyzing and disseminating information. This information comes fromheterogeneous data sources. In this paper we present an approach of access control. This approach isfocused both on the information that must be bring to decision-makers and the privacy of individuals whosedata is used to extract this information. This model is based on the standard “Role Based Access Control”(RBAC and is implemented within the entire life cycle of Xplor Every Where (Web service of Tetralogie,it follows methodologies tailored to design privacy-aware systems to be compliant with data protectionregulations.

  1. Hate in the Classroom: Free Expression, Holocaust Denial, and Liberal Education

    Science.gov (United States)

    Cohen-Almagor, Raphael

    2008-01-01

    This article is concerned with a specific type of hate speech: Holocaust denial. It is concerned with the expression of this idea by educators. Should we allow Holocaust deniers to teach in schools? This article attempts to answer this question through a close look at the Canadian experience. First, I will establish that Holocaust denial is a…

  2. 12 CFR 303.223 - Applicant's right to hearing following denial.

    Science.gov (United States)

    2010-01-01

    ... Criminal Offenses) § 303.223 Applicant's right to hearing following denial. An applicant may request a... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Applicant's right to hearing following denial. 303.223 Section 303.223 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION PROCEDURE AND RULES...

  3. Cognitive dissonance as an explanation of the genesis, evolution and persistence of Thabo Mbeki's HIV denialism.

    Science.gov (United States)

    Kenyon, Chris

    2008-05-01

    The ongoing damage that the newer forms of HIV denialism are visiting upon our country is evidenced by the recent firing of Nozizwe Madlala-Routledge, the South African Deputy Minister of Health. It is widely believed that the underlying reason for her dismissal was her support of orthodox HIV treatment and prevention strategies and her disdain for HIV denialism. This paper seeks to understand the origins, spread and metamorphosis of President Thabo Mbeki's HIV denialism in South Africa. Using the theory of cognitive dissonance, I argue that, given the structural beliefs of the African National Congress (ANC) and the pattern of emergence of HIV in the 1980s, a degree of scepticism around the putative science of HIV was probable in ANC circles. On assuming the Presidency in 1999, Mbeki tapped into this scepticism to formulate his initial biological version of HIV denialism, which claimed that 'a virus can't cause a syndrome.' The steady erosion of support for this flagrant HIV denialism, together with the rise of neoliberal thinking in the ANC, would lead to the evolution of this biological denialism into a form of treatment denialism. This ideology argued against the widespread provision and use of antiretroviral treatment. Empirical evidence is presented to demonstrate the extent to which ongoing HIV denial in the general population is continuing to fuel the spread of HIV.

  4. Rocking the Racism Boat: School-Based Activists Speak Out on Denial and Avoidance

    Science.gov (United States)

    Lund, Darren E.

    2006-01-01

    The present study seeks insights from current school activists on the tendency of educators and others to engage in denial and avoidance when discussing issues surrounding racism, and how that affects the daily work on social justice projects in schools. The author outlines contemporary and historical aspects of the denial of racism in Canada, and…

  5. 30 CFR 47.86 - Denial of a written request for disclosure.

    Science.gov (United States)

    2010-07-01

    ... EDUCATION AND TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.86 Denial of a... chemical, the operator must— (a) Put the denial in writing, (1) Including evidence to substantiate the claim that the chemical's identity is a trade secret, (2) Stating the specific reasons why the...

  6. 42 CFR 505.19 - Approval or denial of loan forgiveness.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Approval or denial of loan forgiveness. 505.19... INFRASTRUCTURE IMPROVEMENT PROGRAM Forgiveness of Indebtedness § 505.19 Approval or denial of loan forgiveness. (a) Approval of loan forgiveness. If CMS determines that a qualifying hospital has met the...

  7. 44 CFR 204.26 - Appeal of fire management assistance declaration denial.

    Science.gov (United States)

    2010-10-01

    ... PROGRAM Declaration Process § 204.26 Appeal of fire management assistance declaration denial. (a... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Appeal of fire management assistance declaration denial. 204.26 Section 204.26 Emergency Management and Assistance FEDERAL...

  8. Open-Access, Low-Magnetic-Field MRI System for Lung Research

    Science.gov (United States)

    Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William

    2009-01-01

    An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.

  9. The denial of death thesis: sociological critique and implications for palliative care.

    Science.gov (United States)

    Zimmermann, Camilla; Rodin, Gary

    2004-03-01

    It has become commonplace to say that contemporary western society is 'death-denying'. This characterization, which sociologists have termed the 'denial of death thesis', first arose in the social science, psychological and clinical medical literature in the period between 1955 and 1985. During the same time period, the hospice and palliative care movements were developing and in part directed themselves against the perceived cultural denial of death in western society. While the denial of death has been taken for granted by the lay public as well as by clinicians, in the sociological literature it has been increasingly questioned. In this paper we use sociological critiques of the denial of death thesis to raise critical questions about the theory and practice of contemporary palliative care. In particular, we argue that the emphasis of palliative care should not be on extinguishing the denial of death but on the relief of suffering.

  10. The denial of death thesis: sociological critique and implications for palliative care.

    Science.gov (United States)

    Zimmermann, Camilla; Rodin, Gary

    2004-03-01

    It has become commonplace to say that contemporary western society is 'death-denying'. This characterization, which sociologists have termed the 'denial of death thesis', first arose in the social science, psychological and clinical medical literature in the period between 1955 and 1985. During the same time period, the hospice and palliative care movements were developing and in part directed themselves against the perceived cultural denial of death in western society. While the denial of death has been taken for granted by the lay public as well as by clinicians, in the sociological literature it has been increasingly questioned. In this paper we use sociological critiques of the denial of death thesis to raise critical questions about the theory and practice of contemporary palliative care. In particular, we argue that the emphasis of palliative care should not be on extinguishing the denial of death but on the relief of suffering. PMID:15046408

  11. ICIS 2008 panel report: open access publishing to nurture the sprouts of knowledge and the future of information systems research

    NARCIS (Netherlands)

    M. Avital; B-C. Björk; R.J. Boland; K. Crowston; K. Lyytinen; A. Majchrzak

    2009-01-01

    The advent of the Internet and the subsequent adoption of Open Access schemata are changing the nature of the scholarly discourse. In response, we seek to stimulate a debate about the role and desired forms of Open Access publishing in the context of the Information System (IS) discipline. We explor

  12. Performance analysis on data access patterns in layered Information Systems, an Architectural Perspective

    Directory of Open Access Journals (Sweden)

    Gholamali Nejad Hajali Irani

    2012-05-01

    Full Text Available Layered architectures are the main architectures that are used in architecture of Information Systems. Data Access Layer (DAL is a common layer in all layered architecture of Information Systems. One of the most important steps in architectural design of information systems is designing the DAL. More than 20 Data Access Patterns (DAP have been developed for DALs. So providing a DAL based on existing DAPs is major activity in architectural design. Therefore an architect should be familiar to all existing DAPs and their evaluation parameters. Performance is one of most important parameter in architecture evaluation. In this paper, different aspects of performance of existing DAPs have been investigated and analyzed. To obtain this aim, firstly, a new classification has been provided for categorizing all DAPs based on architectures difference of them. Secondly, a simulation program as named DALSim has been developed for measuring performance of all DAPs. Finally, some comparisons of DAPs have been provided based on DALSim results. Based on provided classification for DAPs and performance comparison results of them, architects of information systems can easily compare and evaluate existing DAPs. With fully development of provided results in other aspect such as modifiability, extensibility, security etc., a complete framework for all DAPs can be provided.

  13. Wideband Wireless Access Systems Interference Robustness: Its Effect on Quality of Video Streaming

    Directory of Open Access Journals (Sweden)

    Aderemi A. Atayero

    2012-01-01

    Full Text Available A necessary requirement incumbent on any information communication system and/or network is the capacity to transmit information with a predefined degree of accuracy in the presence of inevitable interference. The transmission of audio and video streaming services over different conduits (wireless access systems, Internet, etc. is becoming ever more popular. As should be expected, this widespread increase is accompanied by the attendant new and difficult task of maintaining the quality of service of streaming video. The use of very accurate coding techniques for transmissions over wireless networks alone cannot guarantee a complete eradication of distortions characteristic of the video signal. A software-hardware composite system has been developed for investigating the effect of single bit error and bit packet errors in wideband wireless access systems on the quality of H.264/AVC standard bursty video streams. Numerical results of the modeling and analysis of the effect of interference robustness on quality of video streaming are presented and discussed.

  14. A Frequency—Diversity Spread—Spectrum Multiple Access System with Random Signature Sequences

    Institute of Scientific and Technical Information of China (English)

    CaoYewen; XiangHaige

    1995-01-01

    A new scheme for the spread-spectrum multiple access system named Frequency-Diver-sity Spread-Spectrum Multiple Access(FD-DDMA)system,is proposed.In this FD-SSMA sys-tem,the same information will be modulated on a group of mutually orthogonal frequency compo-nents(carriers)with a random signature sequence at the same time,and it will be demodulated by a coherent receiver for every component and then incorporated (ad if using frequency diversity)on the basis of this random sequence.The spectrum of the modulated signal is very close to that of a white-noise in a wider frequency band due to orthogonality for all frequency components and prop-erty of the random sequence,the system becomes a spread-spectrum one.The (Inverse)Fast Froier Transform(IFFT,FFT)can be applied in the system ,which provides additional flexibility.The performance in an asynchronous mode,such as ability of multiusers,anti-interferences ,is an-alyzed.

  15. Distributed denial of service attacks : Protection, Mitigation, and Economic Consequences

    OpenAIRE

    Eklund, Martin; Ståhlberg, Patrik

    2015-01-01

    Distributed Denial of Service attacks is a problem that constantly threatens companies that rely on the internet for major parts of their business. A successful DDoS attack that manages to penetrate a company’s network can lead to devastating damages in the form of lost income, reduced productivity, increase in costs, and damage to the company’s image and reputation. The different DDoS attacks are many and of different character and often Offer different parts of the network, which makes it v...

  16. Holocaust Denial is a Form of Hate Speech

    OpenAIRE

    Raphael Cohen-Almagor

    2009-01-01

    In this short piece I wish to take issue with the assertion that Holocaust denial is not hateful per se. My aim is to show that it is, and...

  17. Accessibility patterns and community integration among previously homeless adults: a Geographic Information Systems (GIS) approach.

    Science.gov (United States)

    Chan, Dara V; Gopal, Sucharita; Helfrich, Christine A

    2014-11-01

    Although a desired rehabilitation goal, research continues to document that community integration significantly lags behind housing stability success rates for people of a variety of ages who used to be homeless. While accessibility to resources is an environmental factor that may promote or impede integration activity, there has been little empirical investigation into the impact of proximity of community features on resource use and integration. Using a Geographic Information Systems (GIS) approach, the current study examines how accessibility or proximity to community features in Boston, United States related to the types of locations used and the size of an individual's "activity space," or spatial presence in the community. Significant findings include an inverse relationship between activity space size and proximity to the number and type of community features in one's immediate area. Specifically, larger activity spaces were associated with neighborhoods with less community features, and smaller activity spaces corresponded with greater availability of resources within one's immediate area. Activity space size also varied, however, based on proximity to different types of resources, namely transportation and health care. Greater community function, or the ability to navigate and use community resources, was associated with better accessibility and feeling part of the community. Finally, proximity to a greater number of individual identified preferred community features was associated with better social integration. The current study suggests the ongoing challenges of successful integration may vary not just based on accessibility to, but relative importance of, specific community features and affinity with one's surroundings. Community integration researchers and housing providers may need to attend to the meaning attached to resources, not just presence or use in the community.

  18. National Geothermal Data System (USA): an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. Lee; Richard, Stephen; Blackman, Harold; Anderson, Arlene; Patten, Kim

    2014-05-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in April, 2014 will provide open access to millions of data records, sharing -relevant geoscience and longer term to land use data to propel geothermal development and production. NGDS serves information from all of the U.S. Department of Energy's sponsored development and research projects and geologic data from all 50 states, using free and open source software. This interactive online system is opening new exploration opportunities and potentially shortening project development by making data easily discoverable, accessible, and interoperable. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 6 million records online, including 1.72 million well headers (oil and gas, water, geothermal), 670,000 well logs, and 497,000 borehole temperatures and is growing rapidly. There are over 312 interoperable Web services and another 106 WMS (Web Map Services) registered in the system as of January, 2014. Companion projects run by Southern Methodist University and U.S. Geological Survey (USGS) are adding millions of additional data records. The DOE Geothermal Data Repository, currently hosted on OpenEI, is a system node and clearinghouse for data from hundreds of U.S. DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS complies with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with support from the US

  19. Sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems

    Science.gov (United States)

    Otsuji, Taiichi; Sugawara, Kenta; Tamamushi, Gen; Dobroiu, Adrian; Suemitsu, Tetsuya; Ryzhii, Victor; Iwatsuki, Katsumi; Kuwano, Shigeru; Kani, Jun-ichi; Terada, Jun

    2016-02-01

    This paper reviews advances in sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems. Graphene-channel field effect transistors (G-FETs) and InP-based high electron mobility transistors (inP-HEMT) are experimentally examined as photonic frequency converters. Optoelectronic properties and three-terminal functionalities of the G-FETs and InP-HEMTs are exploited to perform single-chip photonic double-mixing operation over the 120 GHz wireless communication band. A single transistor can photomix the optical subcarriers to generate LO and mix down the RF data on the sub-THz carrier to the IF band.

  20. Measuring access to primary medical care: some examples of the use of geographical information systems.

    Science.gov (United States)

    Parker, E B; Campbell, J L

    1998-06-01

    This paper explores the potential for geographical information system technology in defining some variables influencing the use of primary care medical services. Eighteen general practices in Scotland contributed to a study examining the accessibility of their services and their patients' use of the local Accident and Emergency Department. Geo-referencing of information was carried out through analysis of postcode data relating to practices and patients. This information was analyzed using ARC/INFO GIS software in conjunction with the ORACLE relational database and 1991 census information. The results demonstrate that GIS technology has an important role in defining and analyzing the use of health services by the population. PMID:10671022

  1. The integration of open access journals in the scholarly communication system: Three science fields

    DEFF Research Database (Denmark)

    Faber Frandsen, Tove

    2009-01-01

    The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences...... across disciplines. This study is an analysis of the citing behaviour in journals within three science fields: biology, mathematics, and pharmacy and pharmacology. It is a statistical analysis of OAJs as well as non-OAJs including both the citing and cited side of the journal to journal citations...

  2. Web Accessibility Evaluation of Massive Open Online Courses on Geographical Information Systems

    OpenAIRE

    Calle Jiménez, Tania; Sánchez Gordón, Sandra; Luján Mora, Sergio

    2014-01-01

    This paper describes some of the challenges that exist to make accessible massive open online courses (MOOCs) on Geographical Information Systems (GIS). These courses are known by the generic name of Geo-MOOCs. A MOOC is an online course that is open to the general public for free, which causes a massive registration. A GIS is a computer application that acquire, manipulate, manage, model and visualize geo-referenced data. The goal of a Geo-MOOC is to expand the culture of spatial thinking an...

  3. Enabling worldwide access to climate simulation data: the earth system grid (ESG)

    International Nuclear Information System (INIS)

    With support from the U.S. Department of Energy's Scientific Discover Through Advanced Computing (SciDAC) program, we have developed and deployed the Earth System Grid (ESG) to make climate simulation data easily accessible to the global climate modelling and analysis community. ESG currently has 2500 registered users and manages 160 TB of data in archives distributed around the nation. From this past year alone, more than 200 scientific journal articles have been published from analyses of data delivered by the ESG

  4. Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization

    Directory of Open Access Journals (Sweden)

    Laurent Segers

    2014-02-01

    Full Text Available Indoor localization of persons and objects poses a great engineering challenge. Previously developed localization systems demonstrate the use of wideband techniques in ultrasound ranging systems. Direct sequence and frequency hopping spread spectrum ultrasound signals have been proven to achieve a high level of accuracy. A novel ranging method using the frequency hopping spread spectrum with finite impulse response filtering will be investigated and compared against the direct sequence spread spectrum. In the first setup, distances are estimated in a single-access environment, while in the second setup, two senders and one receiver are used. During the experiments, the micro-electromechanical systems are used as ultrasonic sensors, while the senders were implemented using field programmable gate arrays. Results show that in a single-access environment, the direct sequence spread spectrum method offers slightly better accuracy and precision performance compared to the frequency hopping spread spectrum. When two senders are used, measurements point out that the frequency hopping spread spectrum is more robust to near-far effects than the direct sequence spread spectrum.

  5. The development of access control system in Fukushima No.2 nuclear power station

    Energy Technology Data Exchange (ETDEWEB)

    Ookubo, S.; Nakai, Y.; Oohira, N.; Kishishita, S. [Tokyo Electric power Co., Tokyo (Japan); Kobayashi, H.; Sano, F. [Fuji Electric Co., Tokyo (Japan); Masuda, M.; Tajima, T.; Oohira, K. [Toshiba Corporation, Tokyo (Japan)

    2002-07-01

    A new radiation work control system has been developed for controlling the entrance and exit of workers from the radiation controlled area in a nuclear power station and has been run in the Fukushima No. 2 Nuclear Power Station of Tokyo Electric Power Co., Inc. since October, 1999. The system is designed to reduce workers burden by simplifying the operation of each equipment that controls access to radiation controlled areas, and to minimize radiation exposure by automatically acquiring dose data during each access and each task. The new system adopted electronic personal dosimeters (gamma radiation EPD) which permit data collection by radio communication, thus improving the conventional alarm-equipped personal dosimeter (EPD) and increasing reliability as primary dosimeters. Furthermore, additional electronic personal dosimeters capable of measuring beta radiation (gamma and beta radiations EPD) were also utilized in specific tasks in October 2001. After a six-month test run of these EPDs, the film badges were discontinued in April 2002 and replaced solely with the EPDs. EPDs are now used as the primary dosimetry for radiation workers.

  6. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Zummo SalamA

    2008-01-01

    Full Text Available Abstract We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  7. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  8. [Accession to the PIC/S and pharmaceutical quality system in Japan].

    Science.gov (United States)

    Katori, Noriko

    2014-01-01

    In March, 2012, Japan made the application for membership of the Pharmaceutical Inspection convention and Pharmaceutical Inspection Co-operation scheme (PIC/S) which is an international body of a GMP inspection. The globalization of pharmaceutical manufacturing and sales has been a driving force behind the decision to become a PIC/S member. For the application for membership, Japan's GMP inspectorate needs to fulfill PIC/S requirements, for example, the inspection organization has to have a quality system as a global standard. One of the other requirements is that the GMP inspectorate can access Official Medicines Control Laboratories (OMCL) having high analytical skills and also have a quality system based on ISO 17025. I would like to describe the process to make up a quality system in the National Institute of Health Sciences and also the circumstances around the PIC/S application in Japan. PMID:25707200

  9. National Geothermal Data System: an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.

    2013-12-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational

  10. NATIONAL GEOTHERMAL DATA SYSTEM: AN EXEMPLAR OF OPEN ACCESS TO DATA

    Energy Technology Data Exchange (ETDEWEB)

    Blackman, Harold [Arizona Geological Survey; Blackman, Harold M. [Arizona Geological Survey; Blackman, Harold M. [Arizona Geological Survey; Blackman, Harold [Boise State University; Blackman, Harold [United States Department of Energy; Blackman, Harold

    2013-10-01

    The formal launch of National Geothermal Data System (NGDS – www.geothermaldata.org) in 2014 will provide open access to technical geothermal-relevant data from all of the Department of Energy- sponsored geothermal development and research projects and geologic data from all 50 states. By making data easily discoverable and accessible this system will open new exploration opportunities and shorten project development. The prototype data system currently includes multiple data nodes, and nationwide data online and available to the public, indexed through a single catalog under construction at http://search.geothermaldata.org. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Additional data record is being added by companion projects run by Boise State University, Southern Methodist University, and the USGS. The National Renewable Energy Laboratory is managing the Geothermal Data Repository, an NGDS node that will be a clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational system sustainable after the original implementation will

  11. Use of the tools of an operating system kernel to control access to the entities of application servers

    International Nuclear Information System (INIS)

    A method has been proposed for using the tools of kernel of an operating system to control access to the entities of application servers. The possibility of using an information protection system incorporated into the operating system to store and implement security policy has been demonstrated for a database management system

  12. Smartphone-based system to improve transportation access for the cognitively impaired.

    Science.gov (United States)

    Anderson, Shane M; Riehle, Timothy H; Lichter, Patrick A; Brown, Allen W; Panescu, Dorin

    2015-08-01

    This project developed and evaluated a smartphone-based system to improve mobility and transportation access for the cognitively impaired. The proposed system is intended to allow the cognitively impaired to use public transportation systems, community transportation and dedicated transportation services for the disabled with greater ease and safety. Individuals with cognitive disabilities are often unable to operate an automobile, or may require a prolonged recovery period before resuming driving. Public transportation systems represent a significant means to allow these individuals to maintain independence. Yet public transportation systems can pose significant challenges to individuals with cognitive impairment. The goal of this project is to develop a system to reduce these barriers via a technological solution consisting of components developed both for the cognitively impaired user and their caregiver or family member. The first component consists of a cognitive prosthetic device featuring traditional memory cueing and reminders as well as custom location-based transportation specific functions. This cognitive mobility assistant will leverage the computing power and GPS location determination capabilities of inexpensive, powerful smart phones. The second component consists of a management application which offers caregivers the ability to configure and program the reminder and transit functions remotely via the Internet. Following completion of the prototype system a pilot human test was performed with cognitively disabled individuals and family members or caregivers to assess the usability and acceptability of both system components. PMID:26738091

  13. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  14. Ocean Surface Topography Mission (OSTM) /Jason-2: Near Real-Time Altimetry Validation System (NRTAVS) QA Reports (NODC Accession 0044984)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains the descriptions for the OSTM/Jason-2 Near Real-Time Altimetry Validation System Quality Reports, which are served through the NOAA/NESDIS...

  15. Holocaust Denial is a Form of Hate Speech

    Directory of Open Access Journals (Sweden)

    Raphael Cohen-Almagor

    2009-12-01

    Full Text Available

    In this short piece I wish to take issue with the assertion that Holocaust denial is not hateful per se. My aim is to show that it is, and therefore that Facebook should reconsider its position. All Internet providers and web-hosting companies whose terms of service disallow hateful messages on their servers should not host or provide forums for such hate-mongering. This is of urgent need as Holocaust denial is prevalent in Europe, the United States (USA and across the Arab and Muslim parts of the world. 

  16. Denial of shipments of radioactive materials in Paraguay

    International Nuclear Information System (INIS)

    The Denials, Delays and Abandonment of the Radioactive Materials is a problem at world level that has been increased in the last times with more emphasis starting from the attack of September 11 the 2001 in the USA. From then radioactive materials have been denial or delayed and until abandoned. The materials of short periods used mainly in nuclear medicine as the 99mTc or the 131I, when they are rejected, delayed it usually causes the lost of the material because it has surpassed their useful life and in many cases they are abandoned. The rejections, delays and later abandonment of the materials in special of Medical use have originated serious damages for the nuclear medicine patients as much of diagnoses as of treatments, in Teleterapia for many patients of cancer who could not be treated. In the petroliferous prospecting and Industry has originated numerous economic damages due to the delays since most of the used sources they are of long period but the delay causes an important increase in the cost. (author)

  17. Lung cancer survival among black and white patients in an equal access health system

    Science.gov (United States)

    Zheng, Li; Enewold, Lindsey; Zahm, Shelia H.; Shriver, Craig D.; Zhou, Jing; Marrogi, Aizen; McGlynn, Katherine A.; Zhu, Kangmin

    2014-01-01

    Background Racial disparities in lung cancer outcomes have been observed in the general population. However, it is unclear whether survival differences persist when patients have equal access to healthcare. Our objective was to determine if lung cancer survival differed among black and white patients in the U.S. Military Health System (MHS), an equal access healthcare system. Methods The study subjects were 10,181 black and white patients identified through the Department of Defense’s Automated Central Tumor Registry, who were ≥20 years old and diagnosed with lung cancer between 1990 and 2003. Racial differences in all-cause survival were examined using the Kaplan–Meier method and Cox proportional hazards regression models stratified by histology. For comparison, survival rates in the general population were calculated using Surveillance, Epidemiology and End Results (SEER)-9 data. Results Analyses included 9,154 white and 1,027 black patients: 1,834 small cell lung cancers, 3,876 adenocarcinomas, 2,741 squamous cell carcinomas, and 1,730 large cell carcinomas. Although more favorable crude survival was observed among black patients than white patients with small cell lung cancer (p=0.04), survival was similar between the two groups after covariate adjustment. Racial differences in survival were non-significant for adenocarcinomas, squamous cell carcinomas and large cell carcinomas. Survival rates appeared to be better in the MHS than in the general population. Conclusions and Impact All-cause survival was similar among black and white lung cancer patients in the MHS. Providing equal access to healthcare may eliminate racial disparities in lung cancer survival while improving the outcome of all cases. PMID:22899731

  18. FLOSYS--a web-accessible workflow system for protocol-driven biomolecular sequence analysis.

    Science.gov (United States)

    Badidi, E; Lang, B F; Burger, G

    2004-11-01

    FLOSYS is an interactive web-accessible bioinformatics workflow system designed to assist biologists in multi-step data analyses. FLOSYS allows the user to create complex analysis pathways (protocols) graphically, similar to drawing a flowchart: icons representing particular bioinformatics tools are dragged and dropped onto a canvas and lines connecting those icons are drawn to specify the relationships between the tools. In addition, FLOSYS permits to select input-data, execute the protocol and store the results in a personal workspace. The three-tier architecture of FLOSYS has been implemented in Java and uses a relational database system together with new technologies for distributed and web computing such as CORBA, RMI, JSP and JDBC. The prototype of FLOSYS, which is part of the bioinformatics workbench AnaBench, is accessible on-line at http://malawimonas.bcm.umontreal.ca: 8091/anabench. The entire package is available on request to academic groups who wish to have a customized local analysis environment for research or teaching.

  19. Enhancing Access to NASA Data via Seamless Integration Into Decision Support Systems: two Examples

    Science.gov (United States)

    Teng, W.; Rui, H.; Rishe, N.; Tetrault, R.

    2005-12-01

    The amount and variety of information that can be extracted from NASA satellite data form a rich resource that is largely untapped by the applications user community. In part, this is because of the complexity and cost of using such data. Many approaches, such as subsetting, have been taken to ameliorate this situation. Mostly, however, they have not sufficiently addressed the core needs of the applications community. The latter is generally not interested in the data per se (e.g., how they are processed), but rather in the specific measurements (e.g., surface rain) from the data, which can be infused in some decision support system. These measurements should ideally be seamlessly accessible. To rapidly bridge the gap between NASA information systems and services and the practical needs of the applications (and research) community, the Goddard Earth Sciences Data and Information Services Center (GES DISC) has collaborated with the Florida International University High Performance Database Research Center (FIU HPDRC) and the U.S. Department of Agriculture Foreign Agricultural Service (USDA FAS) to demonstrate the feasibility of making NASA data more easily and seamlessly accessible via the Web, from within the FIU's TerraFly and the FAS' Crop Explorer environments, respectively. TerraFly currently serves a broad segment of the research and applications community (some 10,000 unique users per day), by facilitating the access to various textual, remotely sensed, and vector data. Crop Explorer is the primary decision support tool used by the FAS analysts to monitor the production, supply, and demand of agricultural commodities worldwide. The key NASA information system providing the data integrated into TerraFly and Crop Explorer is the GES DISC Interactive Online Visualization and Analysis Infrastructure (Giovanni), which enables users to easily and quickly obtain science information from the data, without having to download and handle large amounts of data. The

  20. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  1. Widened Participation and Unequal Access to the System of Higher Education in Denmark

    DEFF Research Database (Denmark)

    Munk, Martin D.; Thomsen, Jens Peter

    This paper deals with access to Higher Education (HE), more specifically with social differentiation within Danish university field of studies and institutions. We use Danish register data and investigate choice of field of study and choice of university institution while controlling for a range...... of student background variables. Theoretically we draw on notions of forms of capital and of channelling, diversion and effectively maintained inequality in the educational system. We find that it is important to differentiate not only between fields of studies, but also between university institutions......, in explaining the processes of inequality and differentiation in the Danish University system. Here two dimensions are important: the university institutions degree of social selectivity and whether it is has a ‘classic’ university profile (liberal arts) or a more ‘modern’ applied-oriented profile....

  2. Results of an Iridium-Based Data Communication System Providing Internet Access to Polar Expeditions

    Science.gov (United States)

    Mohammad, A.; Frost, V.; Braaten, D.

    2003-12-01

    ' W) from June 23-July 17, 2003. We measured the reliability, throughput and general performance of this system over periods of up to 24 hours. This included delay, loss, throughput, call drops/up-time, relative signal strengths, connection time and number of connection retries. The system was also successfully tested while moving across the ice sheet at speeds of up to 30 km/h. We were successful in uploading and downloading large files (.2MB to 7.2MB) to the Internet. In combination with a modified Wi-Fi deployment, wireless Internet access was also provided to the entire NorthGRIP camp for a few days. The field experiments have shown that standard Internet protocols combined with MLPPP and Iridium modems can provide Internet access for polar expeditions at useful data rates. The 4-modem configuration we tested was observed to be >90 % efficient, e.g., a 2.5 MB video file was transferred in 35 min. at 9.524 Kb/s. The system had an average up-time of over 90 % and thus is stable and suitable for autonomous operation. Mobile performance results were very similar to that of stationary systems. While the end-to-end network architecture developed to provide Internet access worked well, the system round trip time is significant ( ˜ 1.8 seconds), which can impair real time interactions.

  3. A Hybrid System for Acquisition of and Access to the Data from Foundry Technical Standards

    Directory of Open Access Journals (Sweden)

    A. Macioł

    2007-07-01

    Full Text Available The growing importance of automatized systems for interchange of commercial and technical information prompts searching for new forms of knowledge modelling. One of the possible solutions presented in this article is the use of relational databases for acquisition of information comprised in technical standards and of a rule-based reasoning system providing access to these bases. The study describes the structure of a database created under the assumption that concepts describing knowledge will be recorded in data collecting system and not in relational schema. The user is free to define by himself the structure of the knowledge without the need of introducing any changes to the relational schema. At the same time, the reasoning system enables very efficient knowledge searching. At present, tests are carried out on a software operating on a MS SQL Server. The project work and test performance of the system confirm that the adopted assumptions have been right and correct. The development of a new interface is anticipated using internet techniques. As a next step, the information resources collected in the system will be successively expanded using also information sources other than the technical standards.

  4. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  5. Incident and Trafficking Database: New Systems for Reporting and Accessing State Information

    International Nuclear Information System (INIS)

    The IAEA's Incident and Trafficking Database (ITDB) is the Agency's authoritative source for information on incidents in which nuclear and other radioactive material is out of national regulatory control. It was established in 1995 and, as of June 2014, 126 States participate in the ITDB programme. Currently, the database contains over 2500 confirmed incidents, out of which 21% involve nuclear material, 62% radioactive source and 17% radioactively contaminated material. In recent years, the system for States to report incidents to the ITDB has been evolving — moving from fax-based to secure email and most recently to secure on-line reporting. A Beta version of the on-line system was rolled out this June, offering a simple, yet secure, communication channel for member states to provide information. In addition the system serves as a central hub for information related to official communication of the IAEA with Member States so some communication that is traditionally shared by e-mail does not get lost when ITDB counterparts change. In addition the new reporting system incorporates optional features that allow multiple Member State users to collaboratively contribute toward an INF. States are also being given secure on-line access to a streamlined version of the ITDB. This improves States' capabilities to retrieve and analyze information for their own purposes. In addition, on-line access to ITDB statistical information on incidents is available to States through an ITDB Dashboard. The dashboard contains aggregate information on number and types of incidents, material involved, as well some other statistics related to the ITDB that is typically provided in the ITDB Quarterly reports. (author)

  6. The need for a greater commitment to america region to prevent denials of shipments of radioactive materials

    International Nuclear Information System (INIS)

    Radioactive sources are used worldwide in a wide range of applications in industry health care, industrial applications, manufacturing materials, exploration and technological development, as well as basic scientific research. The ability to use such radioactive material in these sectors depends on both its safe transport within a country and between different countries, for developed and developing countries can have access to this technology, in a timely manner and in conditions economically acceptable. In this paper the issue of denials and restraints of shipment of radioactive material and the need for greater commitment that Member States of the International Atomic Energy Agency (IAEA) must assume to facilitate the transport of radioactive materials for the benefit of society is analyzed

  7. A Survey On Various Defense Mechanisms Against Application Layer Distributed Denial Of Service Attack

    Directory of Open Access Journals (Sweden)

    Ms. Anuja R. Zade

    2011-11-01

    Full Text Available The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, revenue loss, and customer churns etc and is one of the most difficult problems to defend against in the internet. The goal of paper is to understand various techniquesproposed recently to defend against specifically application layer Distributed Denial of Service attack. The next step in the path would be to come up with a better solution to solve this problem. Undoubtedly the following discussed techniques are extremely good. A collaborative approach using few of them can be a better solution.

  8. Difficulties in accessing and availing of public health care systems among rural population in Chittoor District, Andhra Pradesh

    Directory of Open Access Journals (Sweden)

    Geetha Lakshmi Sreerama

    2015-01-01

    Full Text Available Context: Despite policies to make health care accessible to all, it is not universally accessible. Frequent evaluation of barriers to accessibility of health care services paves path for improvement. Hence, present study is undertaken to evaluate the factors and public health policies influencing health care access to rural people in Chittoor District, Andhra Pradesh, which can be interpolated for other regions. Aims: To assess knowledge, perceptions, availing of public health care services, barriers to health care access in Chittoor District, Andhra Pradesh. Settings and Design: Cross-sectional, hospital-based survey in the Government Maternity Hospital (GMH, Tirupati, a tertiary care center. Materials and Methods: Fifty women delivered normally in GMH through convenient sampling technique. Data collected on standardized pro forma as per IMS Institute of Healthcare Informatics. Statistical Analysis Used: Is done through MS Excel 2007, Epi Info 7 (of Centres for Disease Control and Prevention, Atlanta, USA and frequencies were described. Results: Distance, waiting hours, societal responsibility, nature of the illness, presumed commercialization of Medicare system, attitudes of health care providers, and loss of wages were not barriers for accessing health care. Accredited Social Health Activist (ASHA and availability of ambulance services made great improvements in health care accessibility. Absenteeism of health care providers is a problem. Conclusions: Expanding the ambulance services and ASHA network will be an effective measure for further accessibility to health care. Absenteeism of health care providers needs correction.

  9. An approach to assessing multicity implementation of healthful food access policy, systems, and environmental changes.

    Science.gov (United States)

    Silberfarb, Laura Oliven; Savre, Sonja; Geber, Gayle

    2014-01-01

    Local governments play an increasingly important role in improving residents' access to healthful food and beverages to reduce obesity and chronic disease. Cities can use multiple strategies to improve community health through, for example, land use and zoning policies, city contracting and procurement practices, sponsorship of farmers markets and community gardens, and vending and concession practices in parks and recreation facilities. With 41 cities in the Hennepin County Human Services and Public Health Department jurisdiction, the county undertook to measure the extent to which cities were engaged in making policy, systems, and environmental (PSE) changes to increase residents' access to healthful food. The results revealed that some cities, particularly those with higher resident demand for healthful food, are making nationally recommended PSE changes, such as sponsoring farmers markets and community gardens. Cities have moved more slowly to make changes in areas with perceived negative cost consequences or lesser public demand, such as parks and recreation vending and concessions. This article describes the assessment process, survey tools, findings, and implications for other health departments seeking to undertake a similar assessment. PMID:24762528

  10. AGRICULTURAL COOPERATIVE FIRMS: BUDGETARY ADJUSTMENTS AND ANALYSIS OF CREDIT ACCESS APPLYING SCORING SYSTEMS

    Directory of Open Access Journals (Sweden)

    Giuseppe Bonazzi

    2014-01-01

    Full Text Available Cooperatives are one of the most important types of companies in the agricultural sector. Cooperatives allow overcoming the limitations of the fragmentation of agricultural property, increasing the level of production of small-sized farms and selling the product so that it reaches a sufficient critical mass. Moreover, cooperatives are often characterized by undercapitalization and even difficult credit access because banks conduct their analysis applying rating systems that do not take into account the typicality of the cooperative budget. To assess this topic, in this article, an analysis has been conducted on a sample of 100 cooperatives, making adjustments to the annual budget in order to consider the typicality of their annual accounts. The results of the analysis show that suggested adjustments allow a more correct expression of the economic results and capital adequacy of the cooperative and that the results, expressed in terms of scoring, are higher than that achieved by a traditional analysis. This methodology could improve the credit access capacity for agricultural cooperatives and then reduce financial constraints, particularly in developing countries.

  11. System architecture and information model for integrated access to distributed biomedical information

    Science.gov (United States)

    Kim, Dongkyu; Alaoui, Adil; Levine, Betty; Leondaridis, Leonidas; Shields, Peter; Byers, Steve; Cleary, Kevin

    2009-02-01

    The current trend towards systems medicine will rely heavily on computational and bioinformatics capabilities to collect, integrate, and analyze massive amounts of data from disparate sources. The objective is to use this information to make medical decisions that improve patient care. At Georgetown University Medical Center, we are developing an informatics capability to integrate several research and clinical databases. Our long term goal is to provide researchers at Georgetown's Lombardi Comprehensive Cancer Center better access to aggregated molecular and clinical information facilitating the investigation of new hypotheses that impact patient care. We also recognize the need for data mining tools and intelligent agents to help researchers in these efforts. This paper describes our initial work to create a flexible platform for researchers and physicians that provides access to information sources including clinical records, medical images, genomic, epigenomic, proteomic and metabolomic data. This paper describes the data sources selected for this pilot project and possible approaches to integrating these databases. We present the different database integration models that we considered. We conclude by outlining the proposed Information Model for the project.

  12. New System For Tokamak T-10 Experimental Data Acquisition, Data Handling And Remote Access

    International Nuclear Information System (INIS)

    For carrying out the experiments on nuclear fusion devices in the Institute of Nuclear Fusion, Moscow, a system for experimental data acquisition, data handling and remote access (further 'DAS-T10') was developed and has been used in the Institute since the year 2000. The DAS-T10 maintains the whole cycle of experimental data handling: from configuration of data measuring equipment and acquisition of raw data from the fusion device (the Device), to presentation of math-processed data and support of the experiment data archive. The DAS-T10 provides facilities for the researchers to access the data both at early stages of an experiment and well afterwards, locally from within the experiment network and remotely over the Internet.The DAS-T10 is undergoing a modernization since the year 2007. The new version of the DAS-T10 will accommodate to modern data measuring equipment and will implement improved architectural solutions. The innovations will allow the DAS-T10 to produce and handle larger amounts of experimental data, thus providing the opportunities to intensify and extend the fusion researches. The new features of the DAS-T10 along with the existing design principles are reviewed in this paper

  13. Effects of interaction of an early experience of reward through maternal contact or its denial with social stress during adolescence on the serotonergic system and the stress responsiveness of adult female rats.

    Science.gov (United States)

    Raftogianni, A; Diamantopoulou, A; Alikaridis, F; Stamatakis, A; Stylianopoulou, F

    2012-05-01

    Experiences during critical periods, such as the neonatal and adolescence, play a critical role in determining adult stress-coping behavior. Based on the aforementioned we developed an experimental protocol, which included a neonatal experience and a social stress during adolescence. The serotonergic system is known as an important modulator of coping ability and, in general, emotional balance in both normal and pathological states, such as depression and anxiety, for which females are more vulnerable. Thus in the present work we used female rats and determined 5-HT, 5-hydroxyindoleacetic acid (5-HIAA), and 5-hydroxytryptamine receptor type 1A (5-HT(1A)) receptor levels in the prefrontal cortex (PFC) and the amygdala (AMY). During postnatal days 10-13 (PND 10-13) rat pups were exposed to a T-maze, one arm of which lead to the mother. One group of animals was allowed contact with the mother (rewarded-receiving expected reward (RER)), whereas the other was denied the expected reward (DER). High performance liquid chromatography (HPLC) analysis revealed that in both the PFC and in AMY, adult RER animals had higher basal 5-HT levels. Furthermore, in the AMY of this group of animals, higher levels of 5-HT(1A) receptors were detected by Western blot analysis. In adulthood rats were exposed to the Forced Swimming Test/Stress (FST/S). RER animals not exposed to the adolescent stress exhibited longer immobility time during both the first and second day of FST. Corticosterone levels following the FST fell faster in the DER animals. Adolescent stress affected the responses to the adult FSS only in the DER animals, which had decreased 5-HT in the AMY and increased immobility time on both days of the FST, compared with the DER, not stressed in adolescence. The phenotype of the DER animals is in line with the "match-mismatch" hypothesis, which states that if two events during critical periods of life "match" in being mildly stressful, their interaction can be adaptive. PMID

  14. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  15. Single-port-access surgery with a novel magnet camera system.

    Science.gov (United States)

    Terry, Benjamin S; Mills, Zachary C; Schoen, Jonathan A; Rentschler, Mark E

    2012-04-01

    In this paper, we designed, built, and tested a novel single-port access laparoscopic surgery (SPA) specific camera system. This device (magnet camera) integrates a light source and video camera into a small, inexpensive, portable package that does not compete for space with the surgical tools during SPA. The device is inserted through a 26-mm incision in the umbilicus, followed by the SPA port, which is used to maintain an insufflation seal and support the insertion of additional tools. The camera, now in vivo, remains separate from the SPA port, thereby removing the need for a dedicated laparoscope, and, thus, allowing for an overall reduction in SPA port size or the use of a third tool through the insertion port regularly reserved for the traditional laparoscope. The SPA camera is mounted to the abdominal ceiling using one of the two methods: fixation to the SPA port through the use of a rigid ring and cantilever bar, or by an external magnetic handle. The purpose of the magnet camera system is to improve SPA by: 1) eliminating the laparoscope SPA channel; 2) increasing the field of view through enhanced camera system mobility; and 3) reducing interference between the camera system and the surgical tools at the port, both in vivo and ex vivo.

  16. Implementing funding modalities for free access: The case for a "purchasing fund system" to cover medical care

    OpenAIRE

    Philippe, Vinard; Karim, Diop; Taverne, Bernard

    2008-01-01

    The principle of free access to ARVs was recognized in Senegal in 2003. Debate now focuses on its expansion to cover all therapeutic care (consultations, exams, treatment for opportunistic infections). Expenditures incurred by this complementary packet often impede access to care. The main difficulty does not really arise from the need for funding but rather from how this treatment is managed and its impact on the current financing systems. In fact, four types of possible funding exist: (1) p...

  17. Design and analysis of a biometric access control system using an electronic olfactory device to identify human odour characteristics

    OpenAIRE

    McMillan, Stephen

    2000-01-01

    The use of an electronic olfactory device, termed an electronic 'nose', was investigated for the detection of unique human odour characteristics. The detection of these unique odours was applied to the field of biometrics for access control, where a human's unique characteristics were used to authenticate a user of an access control system. An electronic odour sensing device was designed and constructed using an array of conducting polymer gas sensors in order to facilitate the regular screen...

  18. An exploration of the enablers and barriers in access to the Dutch healthcare system among Ghanaians in Amsterdam

    Directory of Open Access Journals (Sweden)

    Boateng Linda

    2012-03-01

    Full Text Available Abstract Background Sub-Saharan African populations are growing in many European countries. Data on the health of these populations are rare. Additionally, many sub-Saharan African migrants are confronted with issues of low socio-economic status, acculturation and language difficulties, which may hamper their access to health care. Despite the identification of some of those barriers, little is known about the enabling factors. Knowledge about the enablers and barriers in access to healthcare experienced is important in addressing their health needs and promoting healthcare access. This study aimed to investigate the enabling factors as well as barriers in access to the Dutch healthcare system among the largest sub-Saharan African migrant group (Ghanaians living in Amsterdam, the Netherlands. Methods Six focus groups were conducted from November 2009 to February 2010. A semi-structured interview guideline was used. Discussions were conducted in English or Twi (Ghanaian dialect, recorded and transcribed verbatim. Analysis was based on the Andersen model of healthcare utilisation using MAXQDA software. Results Knowledge and perceived quality of the health system, awareness of diseases, family and community support, community initiatives and availability of social support were the main enablers to the healthcare system. Difficulties with the Dutch language and mistrust in health care providers were major barriers in access to healthcare. Conclusions Access to healthcare is facilitated mainly by knowledge of and the perceived efficiency and quality of the Dutch healthcare system. However, poor Dutch language proficiency and mistrust in health care providers appear to be important barriers in accessing healthcare. The enablers and barriers identified by this study provide useful information for promoting healthcare access among this and similar Sub-Saharan African communities.

  19. Access Management Processes in Cargotec’s Financial Reporting Systems : An approach to improve throughput time and increase quality

    OpenAIRE

    Magnusson, Johan

    2013-01-01

    This study investigates the access management process for a globally implemented financial reporting system. Through this research the goal is to find inefficiencies and bottlenecks in the process which prohibit the access management process from running at optimal speed. Best practices from the fields of operations management and business process design are synthesized to create a conceptual framework which incorporates the concepts at the heart of well-designed and well-implemented bus...

  20. RFID card based access control system with counter for Indus Complex

    International Nuclear Information System (INIS)

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  1. Joint robustness security in optical OFDM access system with Turbo-coded subcarrier rotation.

    Science.gov (United States)

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun; Wang, Yongjun

    2015-01-12

    This paper proposes a novel robust physical secure method for optical orthogonal frequency division multiplexing (OFDM) access system based on Turbo-coded subcarrier rotation. It can realize a secure communication while keep robustness to channel noise. The subcarrier rotation is controlled by the interleaver module of Turbo coding, which is under the charge of Logistic map. The random puncturing can further enhance the security. The channel feedback can ensure the puncturing module working at a suitable coding rate. A 72.28 Gb/s encrypted 16QAM-OFDM signal is successfully demonstrated in the experiment. The results show robust performance under different channel noise conditions and good resistance to illegal optical network unit (ONU).

  2. Multiagent Q-Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Husheng Li

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of Q-learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the Q-learning are illustrated using a Metrick-Polak plot, which shows the traces of Q-values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent Q-learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  3. Multiagent -Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Li Husheng

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of -learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the -learning are illustrated using a Metrick-Polak plot, which shows the traces of -values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent -learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  4. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Science.gov (United States)

    Musick, Charles R.; Critchlow, Terence; Ganesh, Madhaven; Slezak, Tom; Fidelis, Krzysztof

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  5. Posture-Dependent Human 3He Lung Imaging in an Open Access MRI System: Initial Results

    CERN Document Server

    Tsai, L L; Li, C -H; Rosen, M S; Patz, S; Walsworth, R L

    2007-01-01

    The human lung and its functions are extremely sensitive to orientation and posture, and debate continues as to the role of gravity and the surrounding anatomy in determining lung function and heterogeneity of perfusion and ventilation. However, study of these effects is difficult. The conventional high-field magnets used for most hyperpolarized 3He MRI of the human lung, and most other common radiological imaging modalities including PET and CT, restrict subjects to lying horizontally, minimizing most gravitational effects. In this paper, we briefly review the motivation for posture-dependent studies of human lung function, and present initial imaging results of human lungs in the supine and vertical body orientations using inhaled hyperpolarized 3He gas and an open-access MRI instrument. The open geometry of this MRI system features a "walk-in" capability that permits subjects to be imaged in vertical and horizontal positions, and potentially allows for complete rotation of the orientation of the imaging su...

  6. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  7. A Mechanism Denial Study on the Madden-Julian Oscillation

    Directory of Open Access Journals (Sweden)

    In-Sik Kang

    2011-12-01

    Full Text Available A series of Madden-Julian oscillation (MJO mechanism-denial experiments is performed using an atmospheric general circulation model (AGCM. Daily climatological seasonal cycles of i surface latent heat flux, ii net radiative heating rate, and iii surface wind stress are obtained from a control simulation and prescribed in place of the normal interactive computations of these fields in order to turn off the i wind-induced surface heat exchange (WISHE, ii cloud-radiation interaction (CRI, and iii frictional wave-CISK (FWC mechanisms, respectively. Dual and triple mechanism denial experiments are also conducted by switching off multiple mechanisms together. The influence of each mechanism is assessed by comparing experiments with that mechanism turned off to those in which it is not. CRI and WISHE are both found to be important to the simulated MJO amplitude and propagation speed, while FWC has weaker and less systematic effects. The MJO is weakened when CRI is turned off, but strengthened when WISHE is turned off, indicating that CRI amplifies the MJO in the control simulation while WISHE weakens it. The negative influence of WISHE is shown to result from simulated phase relationships between surface winds, surface fluxes and convection which differ significantly from those found in observations, and thus is not interpreted as evidence against a positive role for WISHE in the development and maintenance of the observed MJO. The positive influence of CRI in the model is consistent with a strong simulated relationship between daily grid-point column-integrated radiative and convective heating; the mean ratio of the latter to the former exceeds 0.2 for rain rates less than 14 mm d-1. CRI is also shown to suppress an excessive excitation of the convectively coupled Kelvin wave so that the amplitude and frequency of the MJO is maintained.

  8. Wòch nan Soley: the denial of the right to water in Haiti.

    Science.gov (United States)

    Varma, Monika Kalra; Satterthwaite, Margaret L; Klasing, Amanda M; Shoranick, Tammy; Jean, Jude; Barry, Donna; Fawzi, Mary C Smith; McKeever, James; Lyon, Evan

    2008-01-01

    This article combines health and water research results, evidence from confidential documents released under the Freedom of Information Act, legal analysis, and discussion of historical context to demonstrate that actions taken by the international community through the Inter-American Development Bank are directly related to a lack of access to clean water in Haiti. The article demonstrates that these actions constitute a clear violation of Haitians' right to water under both domestic and international law. The article exposes the United States governments role in blocking the disbursal of millions of dollars in international bank loans that would have had life-saving consequences for the Haitian people. The loans were derailed in 2001 by politically-motivated interventions on behalf of the US and other members of the international community in direct violation of the Inter-American Development Bank charter. To demonstrate the impact of these interventions, the article presents data gathered in a study that employed human rights and public health methodologies to assess the right to water in Haiti. The data reveal that Haitians experience obstacles concerning every aspect of the right to water: diffculties with water availability, limited physical and economic accessibility, and poor water quality. The article provides a framework of concrete duties and obligations that should be followed by all actors involved in Haiti in order to realize Haitians' human right to water. In response to the undeniable link between the international community's political interference and the intolerably poor state of potable water in Haiti, the article concludes with a recommendation that all actors in Haiti follow a rights-based approach to the development and implementation of water projects in Haiti. The full report of Wòch nan Soley: The Denial of the Right to Water in Haiti is available online at http://www.pih.org/inforesources/Reports/Hait_Report_FINAL.pdf.

  9. Implement Instructions Access Files Directly in Operating Systems%在操作系统实现指令对文件的直接寻址

    Institute of Scientific and Technical Information of China (English)

    刘福岩; 尤晋元

    2000-01-01

    In this paper, the concept and implementation of Instructions Directly Access File are discussed,its advantage and profit are analysed. The author belives Instructions Directly Access File should be adopted in operating system.

  10. A web product data management system based on Simple Object Access Protocol

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the serverside technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture,a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.

  11. System for accessing a collection of histology images using content-based strategies

    International Nuclear Information System (INIS)

    Histology images are an important resource for research, education and medical practice. The availability of image collections with reference purposes is limited to printed formats such as books and specialized journals. When histology image sets are published in digital formats, they are composed of some tens of images that do not represent the wide diversity of biological structures that can be found in fundamental tissues; making a complete histology image collection available to the general public having a great impact on research and education in different areas such as medicine, biology and natural sciences. This work presents the acquisition process of a histology image collection with 20,000 samples in digital format, from tissue processing to digital image capturing. The main purpose of collecting these images is to make them available as reference material to the academic community. In addition, this paper presents the design and architecture of a system to query and explore the image collection, using content-based image retrieval tools and text-based search on the annotations provided by experts. The system also offers novel image visualization methods to allow easy identification of interesting images among hundreds of possible pictures. The system has been developed using a service-oriented architecture and allows web-based access in http://www.informed.unal.edu.co

  12. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  13. The Colombian health insurance system and its effect on access to health care.

    Science.gov (United States)

    Alvarez, Luz Stella; Salmon, J Warren; Swartzman, Dan

    2011-01-01

    In 1993, the Colombian government sought to reform its health care system under the guidance of international financial institutions (the World Bank and International Monetary Fund). These institutions maintain that individual private health insurance systems are more appropriate than previously established national public health structures for overcoming inequities in health care in developing countries. The reforms carried out following international financial institution guidelines are known as "neoliberal reforms." This qualitative study explores consumer health choices and associated factors, based on interviews with citizens living in Medellin, Colombia, in 2005-2006. The results show that most study participants belonging to low-income and middle-income strata, even with medical expense subsidies, faced significant barriers to accessing health care. Only upper-income participants reported a selection of different options without barriers, such as complementary and alternative medicines, along with private Western biomedicine. This study is unique in that the informal health system is linked to overall neo-liberal policy change. PMID:21563628

  14. Implementation the NASA Planetary Data System PDS4 Providing Access to LADEE Data

    Science.gov (United States)

    Beebe, Reta F.; Huber , Lyle; Neakrase, Lynn; Reese, Shannon; Crichton, Daniel; Hardman, Sean; Delory, Gregory; Neese, Carol

    2014-11-01

    The NASA Planetary Data System (PDS) is responsible for archiving all planetary data acquired by robotic missions, and observational campaigns with ground/space-based observatories. PDS has moved to version 4 of its archive system. PDS4 uses XML to enhance search and retrieval capabilities. Although the efforts are system wide, the Atmospheres Node has acted as the lead node and is presenting a preliminary users interface for retrieval of LADEE data. LADEE provides the first opportunity to test out the end-to-end process of archiving data from an active mission into the new PDS4 architecture. The limited number of instruments, with simple data structures, is an ideal test of PDS4. XML uses schema (analogous to blueprints) to control the structure of the corresponding XML labels. In the case of PDS4, these schemas allow management of the labels and their content by forcing validation dictated by the underlying Information Model (IM). The use of a central IM is a vast improvement over PDS3 because of the uniformity it provides across all nodes. PDS4 has implemented a product-centric approach for archiving data and supplemental documentation. Another major change involves the Central Registry, where all products are registered and accessible to search engines. Under PDS4, documents, data, and other ancillary data are all products that are registered in the system. Together with the XML implementation, the Registry allows the search routines to be more complex and inclusive than they have been in the past. For LADEE, the PDS nodes and LADEE instrument teams worked together to identify data products that LADEE would produce. Documentation describing instruments and data products were produced by the teams and peer reviewed by PDS. XML label templates were developed by the PDS and provided to the instrument teams to integrate into their pipelines. Data from the primary mission (100 days) have been certified and harvested into the registry and are accessible through the

  15. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    Science.gov (United States)

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being...

  16. National Geothermal Data System: Transforming the Discovery, Access, and Analytics of Data for Geothermal Exploration

    Energy Technology Data Exchange (ETDEWEB)

    Patten, Kim [Arizona Geological Survey

    2013-05-01

    Compendium of Papers from the 38th Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California February 11-13, 2013 The National Geothermal Data System (NGDS) is a distributed, interoperable network of data collected from state geological surveys across all fifty states and the nation’s leading academic geothermal centers. The system serves as a platform for sharing consistent, reliable, geothermal-relevant technical data with users of all types, while supplying tools relevant for their work. As aggregated data supports new scientific findings, this content-rich linked data ultimately broadens the pool of knowledge available to promote discovery and development of commercial-scale geothermal energy production. Most of the up-front risks associated with geothermal development stem from exploration and characterization of subsurface resources. Wider access to distributed data will, therefore, result in lower costs for geothermal development. NGDS is on track to become fully operational by 2014 and will provide a platform for custom applications for accessing geothermal relevant data in the U.S. and abroad. It is being built on the U.S. Geoscience Information Network (USGIN) data integration framework to promote interoperability across the Earth sciences community. The basic structure of the NGDS employs state-of-the art informatics to advance geothermal knowledge. The following four papers comprising this Open-File Report are a compendium of presentations, from the 38th Annual Workshop on Geothermal Reservoir Engineering, taking place February 11-13, 2013 at Stanford University, Stanford, California. “NGDS Geothermal Data Domain: Assessment of Geothermal Community Data Needs,” outlines the efforts of a set of nationwide data providers to supply data for the NGDS. In particular, data acquisition, delivery, and methodology are discussed. The paper addresses the various types of data and metadata required and why simple links to existing

  17. The alternative for access to electric power transmission systems; Wahl des Netzzugangs

    Energy Technology Data Exchange (ETDEWEB)

    Homberg, B.; Paulat, D. [Energieversorgung Oberhausen AG (Germany)

    1998-07-01

    After the entry into force of the act amending the German Energy Industry Act (EnWG), the electric utilities are given a period of time for choosing the regime of access to transmission networks not owned by them for power supply in their districts, on the basis of existing franchise agreements which remain in force. The options allowed by the law are either negotiated third-party access or the single-buyer regime. According to section 6 of the EnWG, the electric utilities are obliged under the deregulated system to make available their own transmission systems for power wheeling by other suppliers in compliance with section 7 EnWG, which stipulates that only the negotiated third-party regime is applicable for this purpose, with one exception: Utilities using the power distribution system in their capacity as suppliers to end users in their district have the alternative of opting for the single-buyer regime and apply for a corresponding licence with the regulatory authority. The article here discusses the two options from the angle of an electricity trader and distributing electric utility that needs criteria for decision-making and information relating to aspects such as accounting, invoicing and pricing, and business management and organisation. (orig./CB) [Deutsch] Mit dem Inkrafttreten des Gesetzes zur Neuregelung des Energiewirtschaftsrechts (EnWG) haben die Energieversorgungsunternehmen (EVU) fuer die von ihnen - auf der Grundlage der weiterhin gueltigen Konzessionsvertraege - versorgten Gebiete kurzfristig eine Wahl zwischen verhandeltem Netzzugang (NTPA) und der Netzzugangsalternative (Single-Buyer) zu treffen. Nach Paragraph 5 des neuen EnWG hat ein EVU sein Elektrizitaetsversorgungsnetz nach dem Zugangssystem des NTPA (Paragraph 6 EnWG) zur Verfuegung zu stellen, mit folgender Ausnahme: Das Letztverbraucher versorgende EVU erhaelt die Bewilligung, nach Paragraph 7 EnWG (Single-Buyer) zu verfahren. Ziel der folgenden Ausfuehrungen ist vorrangig, aus der

  18. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems

    Directory of Open Access Journals (Sweden)

    Danish Shehzad

    2016-01-01

    Full Text Available Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.

  19. Model Aspects of Open Access to Multimedia Broadcast Services in the Evolved Packet System

    Directory of Open Access Journals (Sweden)

    Ivaylo Atanasov

    2016-01-01

    Full Text Available Multimedia broadcast is the most efficient method to distribute identical content to multiple users in the Evolved Packet System (EPS. EPS enables efficient usage of network resources and provisioning of quality of service for every user. Third-party control allows applications in an enterprise domain to invoke network functions like multimedia broadcast. In this paper, an approach to modeling the behavior of Service Capability Server (SCS for multimedia broadcast in EPS is presented. Third-party applications can access multimedia broadcasting capabilities by using Parlay X Web Service interfaces. The SCS for multimedia broadcast exposes Parlay X interfaces toward 3rd-party applications and control protocols toward the network. The SCS functional behavior has to be synchronized with the application view on message broadcast and the state of the network resources intended for the broadcast session. Models of multicast session, IP connectivity session, and bearers’ and charging session are proposed and formally described using the notation of Label Transition Systems. The concept of weak bisimilarity is used to prove that models expose equivalent behavior; that is, they are synchronized.

  20. A multi-agent conversational system with heterogeneous data sources access

    KAUST Repository

    Eisman, Eduardo M.

    2016-01-28

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  1. The Earth System Grid Federation : an Open Infrastructure for Access to Distributed Geospatial Data

    Science.gov (United States)

    Cinquini, Luca; Crichton, Daniel; Mattmann, Chris; Harney, John; Shipman, Galen; Wang, Feiyi; Ananthakrishnan, Rachana; Miller, Neill; Denvil, Sebastian; Morgan, Mark; Pobre, Zed; Bell, Gavin M.; Drach, Bob; Williams, Dean; Kershaw, Philip; Pascoe, Stephen; Gonzalez, Estanislao; Fiore, Sandro; Schweitzer, Roland

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  2. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems

    Science.gov (United States)

    Bozkuş, Zeki

    2016-01-01

    Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models. PMID:27413363

  3. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems.

    Science.gov (United States)

    Shehzad, Danish; Bozkuş, Zeki

    2016-01-01

    Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models. PMID:27413363

  4. PHOTO ENCODING OF ANALOG WATER METER FOR USER ACCESS AND PAYMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    GODFREY A. MILLS

    2012-07-01

    Full Text Available This paper presents design reconfiguration of analog water meter to provide remote access to user water consumption and billing records, payments, and meter device monitoring using photo-encoding as the detecting method for water consumption, a PIC18F2423 microcontroller for data processing, and SMS (short message service technology for data transportation. To validate the system design, an analog water meter was converted into a digital equivalent and interfaced to the cellular network to transmit parameters of the meter to-and-from aconsolidation server (CS. The prototype was tested for operations such as user consumption and billing records, payments, device control, and tamper notification. Test results conducted within a 12km radius gave an average response time of 16 seconds spanning from time of SMS request to the CS to read data from meter through dataprocessing and submission to user. To manage system congestion from multi-users, a multi-threaded algorithm was implemented with each SMS request handling a single thread.

  5. Public information: control, secret and right of access

    OpenAIRE

    Carmem Lúcia Batista

    2012-01-01

    Recently, in November 2011, it was published the law on access to public information, legal and historic mark in the struggle for human rights in Brazil. This achievement is the result of a process marked by denial of access to public archives, as it was the case of the Araguaia Guerrilla, valuing the culture of secrecy, abuse of power and relations between public and private in Brazil. Thus, the aim of this paper is to present a brief history about the control of access to public information...

  6. Detection of Denial of Service Attack in Wireless Network using Dominance based Rough Set

    Directory of Open Access Journals (Sweden)

    N. Syed Siraj Ahmed

    2015-12-01

    Full Text Available Denial-of-service (DoS attack is aim to block the services of victim system either temporarily or permanently by sending huge amount of garbage traffic data in various types of protocols such as transmission control protocol, user datagram protocol, internet connecting message protocol, and hypertext transfer protocol using single or multiple attacker nodes. Maintenance of uninterrupted service system is technically difficult as well as economically costly. With the invention of new vulnerabilities to system new techniques for determining these vulnerabilities have been implemented. In general, probabilistic packet marking (PPM and deterministic packet marking (DPM is used to identify DoS attacks. Later, intelligent decision proto-type was proposed. The main advantage is that it can be used with both PPM and DPM. But it is observed that, data available in the wireless network information system contains uncertainties. Therefore, an effort has been made to detect DoS attack using dominance based rough set. The accuracy of the proposed model obtained over the KDD cup dataset is 99.76 and it is higher than the accuracy achieved by resilient back propagation (RBP model.

  7. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  8. EMODnet Physics: One-stop Portal to access Multiplatform Observing Systems

    Science.gov (United States)

    Novellino, Antonio; Benedetti, Giacomo; D'Angelo, Paolo; Gorringe, Patrick; Thjisse, Peter; Schaap, Dick; Pouliquen, Sylvie; Manzella, Giuseppe

    2016-04-01

    The EMODnet Physics is being developed through a stepwise approach in three major stages and is currently in its second phase of development (2013 - 2016). It is a one-stop portal to access to near real time and historical achieved data sets. It provides a combined array of services and functionalities (such as dynamic map facility for viewing and downloading, dashboard reporting and machine-to-machine communication services) to users for obtaining free of charge data, meta-data and data products on the physical conditions of European sea basins and oceans. Moreover, the system provides full interoperability with third-party software through WMS service, Web Service and Web catalogues in order to exchange data and products according to the most recent standards. In particular, interoperability is assured with the IODE Ocean Data Portal with which EMODnet Physics is collaborating. EMODnet Physics is built on and it is working in coordination and cooperation EuroGOOS-ROOSs, CMEMS and the SeaDataNet network of NODCs. By means of joint activities with its three pillars and with the most relevant Organizations and associations within the sector, EMODnet is undergoing significant improvements and expansion. In the last year, EMODnet Physics has steadily enhanced the number and type of platforms covered providing high quality data integrating sources from a growing network. In particular, a major step forward sees the integration of emerging measuring systems such as HF radars, which are able to provide the resolution of surface current speeds and directions covering large regions of the coastal oceans, and that now do populate the EMODnet Platform. Nowadays the system does integrate information by more than 7.300 stations, among which 2915 moorings, 2728 drifting buoys and around 1200 ARGO floats. EMODnet Physics was also updated with two ready-to-use data products: the Ice (Copernicus CMEMS - SEAICE_GLO_SEAICE_L4_NRT_OBSERVATIONS_011_001) and Sea Level Trends (produced

  9. Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures

    OpenAIRE

    Pau, L. -F.

    2013-01-01

    This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild capabilities, and of the usability level of the capabilities after an attack. A simple illustrative example is provided for a denial of service on a corporate data centre. The needed data collection me...

  10. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  11. Electronic access to care system: improving patient's access to clinical information through an Interactive Voice Response (IVR) system and Web portal.

    Science.gov (United States)

    Do, Nhan; Marinkovich, Andre; Koisch, John; Wheeler, Gary

    2003-01-01

    Our clinical providers spend an estimated four hours weekly answering phone messages from patients. Our nurses spend five to ten hours weekly on returning phone calls. Most of this time is spent conveying recent clinical results, reviewing with patients the discharge instructions such as consults or studies ordered during the office visits, and handling patients' requests for medication renewals. Over time this will lead to greater patients' dissatisfaction because of lengthy waiting time and lack of timely access to their medical information. This would also lead to greater nursing and providers' dissatisfaction because of unreasonable work load. PMID:14728335

  12. Access to planetary science for the broad public: a more familiar planetary nomenclature and terminology system

    Science.gov (United States)

    Hargitai, H.

    The Planetary Sciences in the last decades has accumulated an amount of knowledge that is comparable to other Earth Sciences. The study of planets is not any more a computation of orbital data, but the investigation and description of surface features of dozens of planetary bodies, including our own Earth. This way, it is only an extention of the present Earth sciences like geography, geology, geophisics, meteorolgy etc. In Hungary, Planetary Science studies has been made for decades, but especially today, numerous popular scientific works are published, and the subject of planetology (and also exobiology linked to it) is taught in more and more secondary schools and universities. This ma kes a demand for a Hungarian language terminology and nomenclature in the relatively new discipline of Planetology. It is needed because the present terminology of geosciences is not adequeate for the description of the surface conditions and structures in other planetary bodies. In the mean time it has to be in accord with the Earth-based system. Since this is areal discipline in its subject, it is of high importance that the areas studied be identifiable easily, unambiguously and descriptively. This make s the translation/transcription of IAU's nomenclature our second goal. This is not a simple transliteration of the proper names used in planetary body nomenclatures, but the task is also the setting of the basic rules used in the making of Hungarian nomenclature system. It would be useful, if the system would be useable for any body of the solar system. It has to fit into the system of both the IAU's nomenlcature and the Hungarian geographic name system [1]. This makes a double task: to make a system that is appropriate both linguistically and scientifically. At the same time, in popular science and elementary education, the planetary features' common names and some basic terms should be in the mother languages of the readers, and not in latin or English (outside the anglophone

  13. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    Science.gov (United States)

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  14. Overview of Radio Resource Management (RRM) issues in multi-radio access systems

    NARCIS (Netherlands)

    Jorguseski, L.; Prasad, R.

    2004-01-01

    The concept of multi-radio access networks is currently considered as a strong candidate for the next generation wireless access networks. This concept incorporates conventional cellular networks such as GERAN or UTRAN for wide area coverage while local-area networks such as IEEE 802.11, HIPERLAN/2,

  15. Remote Access to Wireless Communications Systems Laboratory--New Technology Approach

    Science.gov (United States)

    Kafadarova, Nadezhda; Sotirov, Sotir; Milev, Mihail

    2012-01-01

    Technology nowadays enables the remote access to laboratory equipment and instruments via Internet. This is especially useful in engineering education, where students can conduct laboratory experiment remotely. Such remote laboratory access can enable students to use expensive laboratory equipment, which is not usually available to students. In…

  16. Big Brother Is Helping You: Supporting Self-Access Language Learning with a Student Monitoring System

    Science.gov (United States)

    Reinders, Hayo

    2007-01-01

    Self-access and language advising are relatively recent and increasingly common types of language support offered in schools and tertiary institutions around the world. There is a great deal of anecdotal support for the positive contribution of such support to student learning. Self-access and language advising hold strong potential as…

  17. Examining How Web Designers' Activity Systems Address Accessibility: Activity Theory as a Guide

    Science.gov (United States)

    Russell, Kyle

    2014-01-01

    While accessibility of information technologies is often acknowledged as important, it is frequently not well addressed in practice. The purpose of this study was to examine the work of web developers and content managers to explore why and how accessibility is or is not addressed as an objective as websites are planned, built and maintained.…

  18. Medical necessity: is current documentation practice and payment denial limiting access to inpatient rehabilitation?

    Science.gov (United States)

    Granger, Carl V; Carlin, Marsha; Diaz, Pedro; Dorval, Jane; Forer, Steve; Kessler, Corby; Melvin, John L; Miller, Lawrence S; Riggs, Richard V; Roberts, Pamela

    2009-09-01

    Medical necessity is a legal, not medical, term. Depending on the stakeholder's point of view, it may seem less about human need and dispensing medical care and more about a web of rules, rulings, regulations, and manuals, especially for Medicare patients, who use the lion's share of rehabilitation services. In other words, the term medical necessity seems, to some stakeholders, to refer more to what determines payment by Medicare instead of what should be done to determine optimal patient health. Such a perspective on medical necessity has major implications, considering that Medicare pays for most of the rehabilitation treatment in some 1200 inpatient rehabilitation facilities and that its policies determine which patients qualify for admission to an inpatient rehabilitation facility. Medicare's medical necessity policies are often described by inpatient rehabilitation facility administrators and physiatrists as complicated and unfair, as well as being demeaning to the standing of physicians. Ask some physiatrists about their patients meeting Medicare guidelines for medical necessity, and they might bark, "Medical necessity?! That's what I was taught to know!" PMID:19487918

  19. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Science.gov (United States)

    2010-10-01

    ... status, the aircraft operator must request from the individual a verifying identity document pursuant to... B. The individual must present a verifying identity document to the covered aircraft operator at the... identity document, the covered aircraft operator must transmit the SFPD elements from the...

  20. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  1. Asymmetric hollow POF coupler design for portable optical access card system

    Science.gov (United States)

    Ehsan, Abang Annuar; Shaari, Sahbudin; Abd Rahman, Mohd Kamil

    2009-05-01

    An optical code generating device using plastic optical fiber (POF) coupler for portable optical access card system is presented. The code generating device constructed using asymmetric hollow POF coupler design provides a unique series of output light intensities which are successively used as an optical code. Each coupler will be assigned with a unique optical code based on the asymmetrical waveguide design. Non-sequential ray tracing simulation of various coupler designs showed a linear relationship between the tap-off ratio (TOFR) and the waveguide tap width. The results for the simulated and fabricated 1x2 asymmetric couplers show the same linear characteristics between the TOFR and the tap width. The simulated devices show a TOFR variation from 18.6% to 49.9% whereas the TOFR for the fabricated metal-based devices varies from 10.7% up to 47.7%, for a tap width of 500 μm to 1 mm. The insertion loss for the 1x2 asymmetric coupler at the tap line varies from 12.7 dB to 21.2 dB whereas for the bus line, the average insertion loss is about 12 dB.

  2. Trauma in elderly people: access to the health system through pre-hospital care1

    Science.gov (United States)

    da Silva, Hilderjane Carla; Pessoa, Renata de Lima; de Menezes, Rejane Maria Paiva

    2016-01-01

    Objective: to identify the prevalence of trauma in elderly people and how they accessed the health system through pre-hospital care. Method: documentary and retrospective study at a mobile emergency care service, using a sample of 400 elderly trauma victims selected through systematic random sampling. A form validated by experts was used to collect the data. Descriptive statistical analysis was applied. The chi-square test was used to analyze the association between the variables. Results: Trauma was predominant among women (52.25%) and in the age range between 60 and 69 years (38.25%), average age 74.19 years (standard deviation±10.25). Among the mechanisms, falls (56.75%) and traffic accidents (31.25%) stood out, showing a significant relation with the pre-hospital care services (p<0.001). Circulation, airway opening, cervical control and immobilization actions were the most frequent and Basic Life Support Services (87.8%) were the most used, with trauma referral hospitals as the main destination (56.7%). Conclusion: trauma prevailed among women, victims of falls, who received pre-hospital care through basic life support services and actions and were transported to the trauma referral hospital. It is important to reorganize pre-hospital care, avoiding overcrowded hospitals and delivering better care to elderly trauma victims. PMID:27143543

  3. [Female migrants in the health care system. Health care utilisation, access barriers and health promotion strategies].

    Science.gov (United States)

    Wimmer-Puchinger, B; Wolf, H; Engleder, A

    2006-09-01

    Due to the evident interaction between social factors and health, migrants are exposed to specific risk factors and access barriers to health services. Some examples are the lower education level, the low social position and/or the insufficient language skills. This concept is further elaborated in the multi-factorial impacts of health literacy. Female migrants often experience additional discrimination because of their gender. Despite the lack of representative data, consistent studies show that female migrants do not regularly take advantage of health care prevention and present themselves with higher degrees of stress. The current "inadequate health care" manifests itself in a lack of care in the areas of prevention and health education and an abundance in the context of medication and diagnostic procedures. To meet these demands and to further reduce barriers, in particular language barriers, specific strategies for this target group involving both politics and the health care system have to be developed. Besides the employment of interpreters with a native cultural background and the distribution of information booklets, it is an important strategy to reduce structural obstacles such as cultural diversity. To contact these women in their living environment should help to increase their self-determined health promotion. Selected models of good practice in Austria with regard to the themes of FGM (female genital mutilation), violence, heart disease and breast cancer are presented to highlight the specific health situation and risk factors of female migrants as well as successful strategies to confront them. PMID:16927035

  4. An evaluation of the Cortrak Enteral access system in our intensive care.

    LENUS (Irish Health Repository)

    Dolan, A M

    2012-05-01

    Appropriate nutrition is considered a cornerstone of Intensive care; however its successful initiation is frequently impeded by decreased gastric emptying secondary to opiates, sepsis, or ileus. The presence of a postpyloric tube will guarantee delivery of calories while reducing the incidence of reflux and aspiration. Enteral nutrition is approximately 100 fold cheaper than parenteral nutrition. A nasojejunal tube may be placed blindly (success 15%), by direct vision with a gastroscope, or under fluoroscopic guidance in the X-ray department. This study examines the use of the Cortrak Enteral access system (CEAS) in placement of nasojejunal tubes, a method facilitated by the use of an electromagnet. A retrospective review was conducted to evaluate the effectiveness of the CEAS for establishing nasojejunal feeding in the Intensive Care Unit (ICU) between January and December 2010. Our results found that the CEAS was successful in positioning a nasojejunal tube in ten out of twelve patients (83% success rate). Successful placement was confirmed by portable abdominal \\/ chest x-ray. Placement took an average of 30 minutes, and prokinetic agents were used to facilitate two placements. The duration of successful enteral nutrition varied from 2 to 15 days post placement. The CEAS is a simple bedside tool for placing postpyloric tubes. While there is a learning curve associated with its use, it may confer significant benefits to individual patients and also to those responsible for ever shrinking budgets.

  5. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    Science.gov (United States)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  6. Effects of high-frequency electromagnetic fields emitted from card readers of access control systems on electronic pocket dosimeters

    Energy Technology Data Exchange (ETDEWEB)

    Deji, Shizuhiko [Graduate School of Environmental Studies, Nagoya University, Furo-cho, Chikusa-ku, Nagoya 464-8602 (Japan); Nishizawa, Kunihide [Radioisotope Research Center, Nagoya University, Furo-cho, Chlkusa-ku, Nagoya 464-8602 (Japan)]. E-mail: j45616a@nucc.cc.nagoya-u.ac.jp

    2005-06-01

    High-frequency electromagnetic fields in the 120 kHz band emitted from card readers for access control systems caused abnormally high doses on electronic pocket dosimeters (EPDs). All EPDs recovered their normal performance by resetting after the exposure ceased. The electric and magnetic immunity levels of the EPDs were estimated by using the distances needed to prevent electromagnetic interference.

  7. Teaching Poverty with Geographic Visualization and Geographic Information Systems (GIS): A Case Study of East Buffalo and Food Access

    Science.gov (United States)

    Gjesfjeld, Christopher D.; Jung, Jin-Kyu

    2014-01-01

    Although various methods have been used to teach about poverty in the social work classroom (e.g., quantitative, historical, and qualitative), the use of geographic visualization and geographic information systems (GIS) has become a relatively new method. In our analysis of food access on the East Side of Buffalo, New York, we demonstrate the…

  8. 28 CFR 16.72 - Exemption of Office of the Associate Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of the Associate Attorney General System-limited access. 16.72 Section 16.72 Judicial Administration DEPARTMENT OF JUSTICE... subject the accounting of disclosures could reveal the identity of a confidential source. In...

  9. 28 CFR 16.75 - Exemption of the Office of the Inspector General Systems/Limited Access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Office of the Inspector General Systems/Limited Access. 16.75 Section 16.75 Judicial Administration DEPARTMENT OF JUSTICE... activities; of the identity of confidential sources, witnesses, and law enforcement personnel, and...

  10. 28 CFR 16.83 - Exemption of the Executive Office for Immigration Review System-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Executive Office for Immigration Review System-limited access. 16.83 Section 16.83 Judicial Administration DEPARTMENT OF JUSTICE... identity of confidential informants; or constitute unwarranted invasions of the personal privacy of...

  11. 23 CFR Appendix C to Subpart B of... - Additional Required Contract Provisions, Appalachian Development Highway System and Local Access...

    Science.gov (United States)

    2010-04-01

    ... Development Highway System and Local Access Roads Contracts Other Than Construction Contracts C Appendix C to.... 633, Subpt. B, App. C Appendix C to Subpart B of Part 633—Additional Required Contract Provisions.... Compliance with regulations. The contractor will comply with the provisions of 23 U.S.C. 324 and with...

  12. 8 CFR 214.4 - Denial of certification, denial of recertification or withdrawal of SEVP certification.

    Science.gov (United States)

    2010-01-01

    ... to comply with 8 CFR 214.3(g)(2). (iii) Failure of a DSO to notify SEVP of the attendance of an F-1 transfer student as required by 8 CFR 214.2(f)(8)(ii). (iv) Failure of a DSO to identify on the Form I-20... certification of a school or school system for the attendance of nonimmigrant students, pursuant to sections...

  13. FUZZY MODELLING OF A NETWORK DENIAL OF SERVICE (DOS ATTACK PHENOMENON.

    Directory of Open Access Journals (Sweden)

    IHEKWEABA. OGECHI

    2013-04-01

    Full Text Available This paper presents the fuzzy modeling of a network Denial of Service (DoS attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic approach as well as an improved mechanism for generating the fuzzy inference rules were outlined. Further, the paper discusses the basic concept of fuzzy logic, fuzzy systems and reasons for their adoption in modern control operations. DoS attack detection, using some basic traffic characteristics: bitrates, entropy and Hurst experiment as it’s inputs, was x-rayed. Here, an attack trace file collected atthe edge router of the Computer Science Department, University of California Los Angeles was used to develop the fuzzy inference model.The data set was partitioned into a training dataset and a testing dataset. The fuzzy concept learning system (FCLS algorithm was used for constructing the fuzzy decision tree, using the trace files.Inference rules were then generated from the constructed decision tree. The simulation and evaluation of the fuzzy model was performed with the testing dataset.

  14. Systems and Services for Real-Time Web Access to NPP Data Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Global Science & Technology, Inc. (GST) proposes to investigate information processing and delivery technologies to provide near-real-time Web-based access to...

  15. MVSDAP: a new extensible, modifiable and secure data access pattern for layered Information Systems

    Directory of Open Access Journals (Sweden)

    Gholamali Nejad Hajali Irani

    2012-03-01

    Full Text Available Nowadays, in software architecture especially in agile methodologies dynamicity, extendibility and modifiability are important challenges. In three layered architecture, plenty of patterns are provided for data access layer. In this paper additional to secure access to data and dynamic validation controls, emphasis is on extendibility and modifiability of data access pattern. We tried newly provided pattern not to lose performance. In this new pattern, respecting to object oriented heuristics, a module along with a tool has been provided that is able to be attached to every project and perform all data access tasks. This pattern has maximum reusability so it can be used in different kinds of projects of any size regardless to the methodology used.

  16. Planetary data in education: tool development for access to the Planetary Data System

    Science.gov (United States)

    Atkinson, C. H.; Andres, P. M.; Liggett, P. K.; Lowes, L. L.; Sword, B. J.

    2003-01-01

    In this session we will describe and demonstrate the interface to the PDS access tools and functions developed for the scientific community, and discuss the potential for its utilization in K-14 formal and informal settings.

  17. DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

    Directory of Open Access Journals (Sweden)

    S.R. Kodituwakku

    2010-11-01

    Full Text Available Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework is that it allows intranet users to access only authorized resources. It consists of two kinds of role hierarchies: global role hierarchy and local role hierarchy, and two levels of permissions: server permission and object permission. They simplify the way of structuring authority and responsibility in the whole intranet and the allocation of privileges for different objects within a particular server. The proposed framework is implemented over Windows platform and tested for the validity. The test results indicated that it can successfully be used to control accessing network objects.

  18. Distributed Denial of Service (DDoS) Attacks Detection Mechanism

    CERN Document Server

    Kumarasamy, Saravanan

    2012-01-01

    Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers. Functionality is added to each router to detect and preferentially drop packets that probably belong to an attack. Upstream routers are also notified to drop such packets in order that the router's resources be used to route legitimate traffic hence term pushback. Client puzzles have been advocated as a promising countermeasure to DoS attacks in the recent years. In order to identify the attackers, the victim server issues a puzzle to the client that sent the traffic. When the client is able to solve the puzzle, it is assumed to be authentic and the traffic from it is allowed into the server. If the victim suspects that the puzzles are solved by most of the clients, it increases the complexity of the puz...

  19. Packet track and traceback mechanism against denial of service attacks

    Institute of Scientific and Technical Information of China (English)

    LI Li; SHEN Su-bin

    2008-01-01

    The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and traceback mechanism is proposed, which features rapid response and high accuracy. In this scheme, routers apply packet marking scheme and send traceback messages, which enables the victim to design the path tree in peace time. During attack times the victim can trace attackers back within the path tree and perform rapid packet filtering using the marking in each packet. Traceback messages overcome Pi's limitation, wherein too much path information is lost in path identifiers; whereas path identifiers can be used to expedite the design of the path-tree, which reduces the high overhead in iTrace. Therefore, our scheme not only synthesizes the advantages but also compromises the disadvantages of the above two methods. Simulation results with NS-2 show the validity of our scheme.

  20. National Geothermal Data System: Transforming the Discovery, Access, and Analytics of Data for Geothermal Exploration

    Energy Technology Data Exchange (ETDEWEB)

    Patten, Kim [Arizona Geological Survey

    2013-05-01

    Compendium of Papers from the 38th Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California February 11-13, 2013 The National Geothermal Data System (NGDS) is a distributed, interoperable network of data collected from state geological surveys across all fifty states and the nation’s leading academic geothermal centers. The system serves as a platform for sharing consistent, reliable, geothermal-relevant technical data with users of all types, while supplying tools relevant for their work. As aggregated data supports new scientific findings, this content-rich linked data ultimately broadens the pool of knowledge available to promote discovery and development of commercial-scale geothermal energy production. Most of the up-front risks associated with geothermal development stem from exploration and characterization of subsurface resources. Wider access to distributed data will, therefore, result in lower costs for geothermal development. NGDS is on track to become fully operational by 2014 and will provide a platform for custom applications for accessing geothermal relevant data in the U.S. and abroad. It is being built on the U.S. Geoscience Information Network (USGIN) data integration framework to promote interoperability across the Earth sciences community. The basic structure of the NGDS employs state-of-the art informatics to advance geothermal knowledge. The following four papers comprising this Open-File Report are a compendium of presentations, from the 38th Annual Workshop on Geothermal Reservoir Engineering, taking place February 11-13, 2013 at Stanford University, Stanford, California. “NGDS Geothermal Data Domain: Assessment of Geothermal Community Data Needs,” outlines the efforts of a set of nationwide data providers to supply data for the NGDS. In particular, data acquisition, delivery, and methodology are discussed. The paper addresses the various types of data and metadata required and why simple links to existing

  1. A Random Access Protocol for Pilot Allocation in Crowded Massive MIMO Systems

    OpenAIRE

    Björnson, Emil; de Carvalho, Elisabeth; Sørensen, Jesper H.; Larsson, Erik G.; Popovski, Petar

    2016-01-01

    The Massive MIMO (multiple-input multiple-output) technology has a great potential to manage the rapid growth of wireless data traffic. Massive MIMO achieve tremendous spectral efficiency by spatial multiplexing of many tens of user equipments (UEs). These gains are only achieved in practice if many more UEs can connect efficiently to the network than today. As the number of UEs increases, while each UE intermittently accesses the network, the random access functionality becomes essential to ...

  2. An Effective Security Mechanism for M-Commerce Applications Exploiting Ontology Based Access Control Model for Healthcare System

    Directory of Open Access Journals (Sweden)

    S.M. Roychoudri

    2016-09-01

    Full Text Available Health organizations are beginning to move mobile commerce services in recent years to enhance services and quality without spending much investment for IT infrastructure. Medical records are very sensitive and private to any individuals. Hence effective security mechanism is required. The challenges of our research work are to maintain privacy for the users and provide smart and secure environment for accessing the application. It is achieved with the help of personalization. Internet has provided the way for personalization. Personalization is a term which refers to the delivery of information that is relevant to individual or group of individuals in the format, layout specified and in time interval. In this paper we propose an Ontology Based Access Control (OBAC Model that can address the permitted access control among the service providers and users. Personal Health Records sharing is highly expected by the users for the acceptance in mobile commerce applications in health care systems.

  3. Silence and Denial in Everyday Life—The Case of Animal Suffering

    Directory of Open Access Journals (Sweden)

    Deidre Wicks

    2011-02-01

    Full Text Available How can we make sense of the fact that we live in a world where good people co-exist in silence about widespread animal suffering. How is it that sites of suffering such as laboratories, factory farms, abattoirs and animal transportation are all around us and yet we ‘do not, in a certain sense, know about them’ [1]. This ‘not knowing’ is one of the most difficult barriers for animal activists who must constantly develop new strategies in an attempt to catch public attention and translate it into action. Recent contributions from the ‘sociology of denial’ have elucidated many of the mechanisms involved in ‘not knowing’ in relation to human atrocities and genocide. In this context, ‘denial’ refers to the maintenance of social worlds in which an undesirable situation is unrecognized, ignored or made to seem normal [2]. These include different types of denial: personal, official and cultural, as well as the process of normalization whereby suffering becomes invisible through routinization, tolerance, accommodation, collusion and cover up. Denial and normalization reflect both personal and collective states where suffering is not acknowledged [3]. In this paper, I will examine insights from the sociology of denial and apply them to human denial and normalization of animal suffering. This will include an examination of denial which is both individual and social and the implications of these insights for theory and practice in the human/animal relationship.

  4. Integrating in Silico and in Vitro Approaches To Predict Drug Accessibility to the Central Nervous System.

    Science.gov (United States)

    Zhang, Yan-Yan; Liu, Houfu; Summerfield, Scott G; Luscombe, Christopher N; Sahi, Jasminder

    2016-05-01

    Estimation of uptake across the blood-brain barrier (BBB) is key to designing central nervous system (CNS) therapeutics. In silico approaches ranging from physicochemical rules to quantitative structure-activity relationship (QSAR) models are utilized to predict potential for CNS penetration of new chemical entities. However, there are still gaps in our knowledge of (1) the relationship between marketed human drug derived CNS-accessible chemical space and preclinical neuropharmacokinetic (neuroPK) data, (2) interpretability of the selected physicochemical descriptors, and (3) correlation of the in vitro human P-glycoprotein (P-gp) efflux ratio (ER) and in vivo rodent unbound brain-to-blood ratio (Kp,uu), as these are assays routinely used to predict clinical CNS exposure, during drug discovery. To close these gaps, we explored the CNS druglike property boundaries of 920 market oral drugs (315 CNS and 605 non-CNS) and 846 compounds (54 CNS drugs and 792 proprietary GlaxoSmithKline compounds) with available rat Kp,uu data. The exact permeability coefficient (Pexact) and P-gp ER were determined for 176 compounds from the rat Kp,uu data set. Receiver operating characteristic curves were performed to evaluate the predictive power of human P-gp ER for rat Kp,uu. Our data demonstrates that simple physicochemical rules (most acidic pKa ≥ 9.5 and TPSA methods were investigated using multiple sets of in silico molecular descriptors. We present a random forest model with excellent predictive power (∼0.75 overall accuracy) using the rat neuroPK data set. We also observed good concordance between the structural interpretation results and physicochemical descriptor importance from the Kp,uu classification QSAR model. In summary, we propose a novel, hybrid in silico/in vitro approach and an in silico screening model for the effective development of chemical series with the potential to achieve optimal CNS exposure.

  5. Development of measurement system for radiation effect on static random access memory based field programmable gate array

    International Nuclear Information System (INIS)

    Based on the detailed investigation in field programmable gate array(FPGA) radiation effects theory, a measurement system for radiation effects on static random access memory(SRAM)-based FPGA was developed. The testing principle of internal memory, function and power current was introduced. The hardware and software implement means of system were presented. Some important parameters for radiation effects on SRAM-based FPGA, such as configuration RAM upset section, block RAM upset section, function fault section and single event latchup section can be gained with this system. The transmission distance of the system can be over 50 m and the maximum number of tested gates can reach one million. (authors)

  6. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    CERN Document Server

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  7. Distributed Denial of Service Attacks Detection Method Based on Conditional Random Fields

    Directory of Open Access Journals (Sweden)

    Shi-wen CHEN

    2013-04-01

    Full Text Available In order to detect distributed denial of service (DDoS attacks accurately and efficiently, a new detection model based on conditional random fields (CRF was proposed. The CRF based model incorporates the signature-based and anomaly-based detection methods to a hybrid system. The selected features include source IP entropy, destination IP entropy, source port entropy, destination port entropy, protocol number and etc. The CRF based model combines these IP flow entropies and other fingerprints into a normalize entropy as the feature vectors to depict the states of the monitoring traffic. The training method of the detection model uses the L-BFGS algorithm. And the model only needs to inspect the IP header fields of each packet, which makes it possible for real-time implementation even on real time network traffic. The CRF based model may have the ability to detect new form of forthcoming attacks, because it is independent from any specific DDoS flooding attack tools. The experiment results show that the CRF based method has higher detection accuracy and sensitivity as well as lower false positive alarms. Experiment with KDD CUP1999, DARPA 2000 and generated attack datasets, the CRF based model outperforms other well-known detection methods such as Naïve Bayes, KNN, SVM and etc. The accuracy goes beyond 95.0% and the false alarm rate is less than 5.0%. Meanwhile, the CRF based model is robust under massive background network traffic.

  8. Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems

    KAUST Repository

    Hamza, Doha R.

    2012-04-01

    In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment (ACK) when the received packet is decoded correctly. Lack of ARQ feedback is interpreted as erroneous reception or inactivity. We call this the explicit ACK scheme. The primary receiver may also send a negative acknowledgment (NACK) when the packet is received in error. Lack of ARQ feedback is interpreted as an ACK or no-transmission. This is called the explicit NACK scheme. Under both schemes, when the primary feedback is interpreted as a NACK, the secondary user assumes that there will be retransmission in the next slot and accesses the channel with a certain probability. When the primary feedback is interpreted as an ACK, the secondary user accesses the channel with either one of two probabilities based on the sensing outcome. Under these settings, we find the three optimal access probabilities via maximizing the secondary throughput given a constraint on the primary throughput. We compare the performance of the explicit ACK and explicit NACK schemes and contrast them with schemes based on either sensing or primary ARQ feedback only. © 2012 IEEE.

  9. Digital predistortion of 75–110 GHz W-band frequency multiplier for fiber wireless short range access systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Deng, Lei; Pang, Xiaodan;

    2011-01-01

    We present a W-band fiber-wireless transmission system based on a nonlinear frequency multiplier for high-speed wireless short range access applications. By implementing a baseband digital signal predistortion scheme, intensive nonlinear distortions induced in a sextuple frequency multiplier can...... be effectively pre-compensated. Without using costly W-band components, a transmission system with 26km fiber and 4m wireless transmission operating at 99.6GHz is experimentally validated. Adjacent-channel power ratio (ACPR) improvements for IQ-modulated vector signals are guaranteed and transmission...... performances for fiber and wireless channels are studied. This W-band predistortion technique is a promising candidate for applications in high capacity wireless-fiber access systems....

  10. 24 CFR 960.204 - Denial of admission for criminal activity or drug abuse by household members.

    Science.gov (United States)

    2010-04-01

    ... activity or drug abuse by household members. 960.204 Section 960.204 Housing and Urban Development... HOUSING Admission § 960.204 Denial of admission for criminal activity or drug abuse by household members. (a) Required denial of admission—(1) Persons evicted for drug-related criminal activity. The...

  11. 75 FR 68093 - Partial Grant and Partial Denial of Clean Air Act Waiver Application Submitted by Growth Energy...

    Science.gov (United States)

    2010-11-04

    ... Protection Agency Partial Grant and Partial Denial of Clean Air Act Waiver Application Submitted by Growth Energy To Increase the Allowable Ethanol Content of Gasoline to 15 Percent; Decision of the Administrator...; ] ENVIRONMENTAL PROTECTION AGENCY Partial Grant and Partial Denial of Clean Air Act Waiver Application...

  12. Customized PKI for SCADA System

    Directory of Open Access Journals (Sweden)

    Anupam Saxena

    2010-03-01

    Full Text Available Security of SCADA (supervisory Control and Data Acquisition has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems is securing the data over the communication channel. PKI (public key infrastructure is a well known framework for securing the communication. In SCADA system, due to limited bandwidth and rare communications among some RTUs (Remote Terminal Units, there is a need of customization of general PKI which can reduce the openness of Public Key, frequent transfer of certificates and reduction in DOS (Denial of Service attacks at MTUs (Master Terminal Units and RTUs. This paper intends to address the issues of securing data over communication channel in the constrained environment and presents the novel solutions pivoted on key distribution and key management schemes. This paper also presents a set of innovative methods of multicast and broadcast of messages in SCADA system.

  13. The NASA Astrophysics Data System Free Access to the Astronomical Literature On-Line and through Email

    CERN Document Server

    Eichhorn, G; Grant, C S; Kurtz, M J; Murray, S S

    2001-01-01

    The Astrophysics Data System (ADS) provides access to the astronomical literature through the World Wide Web. It is a NASA funded project and access to all the ADS services is free to everybody world-wide.The ADS Abstract Service allows the searching of four databases with abstracts in Astronomy, Instrumentation, Physics/Geophysics, and the LANL Preprints with a total of over 2.2 million references. The system also provides access to reference and citation information, links to on-line data, electronic journal articles, and other on-line information. The ADS Article Service contains the articles for most of the astronomical literature back to volume 1. It contains the scanned pages of all the major journals (Astrophysical Journal, Astronomical Journal, Astronomy & Astrophysics, Monthly Notices of the Royal Astronomical Society, and Solar Physics), as well as most smaller journals back to volume 1. The ADS can be accessed through any web browser without signup or login. Alternatively an email interface is ...

  14. Future mobile access for open-data platforms and the BBC-DaaS system

    Science.gov (United States)

    Edlich, Stefan; Singh, Sonam; Pfennigstorf, Ingo

    2013-03-01

    In this paper, we develop an open data platform on multimedia devices to act as marketplace of data for information seekers and data providers. We explore the important aspects of Data-as-a-Service (DaaS) service in the cloud with a mobile access point. The basis of the DaaS service is to act as a marketplace for information, utilizing new technologies and recent new scalable polyglot architectures based on NoSql databases. Whereas Open-Data platforms are beginning to be widely accepted, its mobile use is not. We compare similar products, their approach and a possible mobile usage. We discuss several approaches to address the mobile access as a native app, html5 and a mobile first approach together with the several frontend presentation techniques. Big data visualization itself is in the early days and we explore some possibilities to get big data / open data accessed by mobile users.

  15. Denial of separation anxiety as measured by a serial tachistoscopic technique.

    Science.gov (United States)

    Rubino, I A; Grasso, S; Pezzarossa, B

    1990-12-01

    A mother-child separation stimulus was repeatedly presented by standard Defense Mechanism Test procedure, at increasing durations of tachistoscopic exposure to 60 clinical and nonclinical subjects. Subjective verbal reports were coded blindly for evidence of perceptual distortions presumably indicative of denial of separation anxiety. Low scores on two items measuring sensitivity to separation anxiety and intolerance of aloneness were, as predicted, significantly more often characterized by codings of denial on the tachistoscopic exposures than subjects with high sensitivity to separation anxiety. Stability of effect became stronger when only very low and very high scores were compared for perceptual denial on the last four presentations of the series. This technique, employing other types of anxiety-evoking stimuli, may represent a reliable instrument to reveal the presence of defences toward each of the most relevant conflictual areas of the personality. PMID:2087385

  16. A Single Hidden Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems

    Directory of Open Access Journals (Sweden)

    J.Preethi

    2010-07-01

    Full Text Available In this paper, we propose a single hidden layered fuzzy neural algorithm, which is able to provide a better quality of service constraints in a multi-cell scenario with three different radio access technologies (RATs namely the Universal Mobile Telecommunication Systems (UMTS, the Wireless Local Area Network (WLAN and the Global System for Mobile Telecommunication (GSM /Enhanced Data rate for GSM Evolution (EDGE Radio access Network (GERAN. This proposed algorithm works in two steps; the first step is to select a suitable combination of cells among the three different RATs. The second step chooses the most appropriate RAT to which the users can be attached and to choose the suitable bandwidth to allocate for the users. The Joint Radio Resource Management (JRRM makes use of fuzzy neural approach to manage dynamically the allocation and deallocation of the different radio resources among thedifferent radio access systems for spectrum bands allocated to each of these systems. By simulation results, we have shown that the proposed algorithm selects the most appropriate RAT in a multi-cell scenario.

  17. Development of a secure and cost-effective infrastructure for the access of arbitrary web-based image distribution systems

    International Nuclear Information System (INIS)

    Purpose: To build an infrastructure that enables radiologists on-call and external users a teleradiological access to the HTML-based image distribution system inside the hospital via internet. In addition, no investment costs should arise on the user side and the image data should be sent renamed using cryptographic techniques. Materials and Methods: A pure HTML-based system manages the image distribution inside the hospital, with an open source project extending this system through a secure gateway outside the firewall of the hospital. The gateway handles the communication between the external users and the HTML server within the network of the hospital. A second firewall is installed between the gateway and the external users and builds up a virtual private network (VPN). A connection between the gateway and the external user is only acknowledged if the computers involved authenticate each other via certificates and the external users authenticate via a multi-stage password system. All data are transferred encrypted. External users get only access to images that have been renamed to a pseudonym by means of automated processing before. Results: With an ADSL internet access, external users achieve an image load frequency of 0.4 CT images per second. More than 90% of the delay during image transfer results from security checks within the firewalls. Data passing the gateway induce no measurable delay. (orig.)

  18. Giovanni: A System for Rapid Access, Visualization and Analysis of Earth Science Data Online

    Science.gov (United States)

    Shen, S.; Rui, H.; Liu, Z.; Zhu, T.; Lu, L.; Berrick, S.; Leptoukh, G.; Teng, W.; Acker, J.; Johnson, J.

    2005-01-01

    Collecting data and understanding data structures traditionally are the first steps that a user must take, before the core investigation can begin. This is a time-consuming and challenging task, especially when science objectives require users to deal with large multi-sensor data that are usually in different formats and internal structures. The Goddard Earth Sciences Data and Information Services Center (GES DISC) has created the GES DISC Interactive Online Visualization and ANalysis Infrastructure, Giovanni, to enable Web-based visualization and analysis of satellite remotely sensed meteorological, oceanographic, and hydrologic data sets, without users having to download data. The current operational Giovanni interfaces provide the capability to process a number of important satellite measurements, such as (1) ozone and other trace gases from TOMS, OMI, HALOE, and MLS; (2) air temperature, water vapor, and geopotential height from AIRS; (3) aerosols from MODIS TerrdAqua, and GOCART model; (4) precipitation from TRMM and ground measurements; (5) chlorophyll and other ocean color products from SeaWiFS and MODIS Aqua; and (6) sea surface temperature from MODIS Aqua. Depending on the input data structure, the system provides simple statistical analysis and creates time-averaged area plot, area-averaged time series, animations, Hovmoller latitude vs. time and longitude vs. time plots, as well as vertical profiles. The inter-comparison interfaces allow a user to compare observations from different instruments, to conduct anomaly analysis, and to study basic relationships between physical parameters. Giovanni handles data with different temporal and spatial resolutions and, thus, enables both regional and global long-term climate research and short-term special events investigation, as well as data validations and assessments. Because of its simplicity of usage, Giovanni is powerful and versatile, able to assist a wide range of users, from the discipline scientists

  19. Integrating in Silico and in Vitro Approaches To Predict Drug Accessibility to the Central Nervous System.

    Science.gov (United States)

    Zhang, Yan-Yan; Liu, Houfu; Summerfield, Scott G; Luscombe, Christopher N; Sahi, Jasminder

    2016-05-01

    Estimation of uptake across the blood-brain barrier (BBB) is key to designing central nervous system (CNS) therapeutics. In silico approaches ranging from physicochemical rules to quantitative structure-activity relationship (QSAR) models are utilized to predict potential for CNS penetration of new chemical entities. However, there are still gaps in our knowledge of (1) the relationship between marketed human drug derived CNS-accessible chemical space and preclinical neuropharmacokinetic (neuroPK) data, (2) interpretability of the selected physicochemical descriptors, and (3) correlation of the in vitro human P-glycoprotein (P-gp) efflux ratio (ER) and in vivo rodent unbound brain-to-blood ratio (Kp,uu), as these are assays routinely used to predict clinical CNS exposure, during drug discovery. To close these gaps, we explored the CNS druglike property boundaries of 920 market oral drugs (315 CNS and 605 non-CNS) and 846 compounds (54 CNS drugs and 792 proprietary GlaxoSmithKline compounds) with available rat Kp,uu data. The exact permeability coefficient (Pexact) and P-gp ER were determined for 176 compounds from the rat Kp,uu data set. Receiver operating characteristic curves were performed to evaluate the predictive power of human P-gp ER for rat Kp,uu. Our data demonstrates that simple physicochemical rules (most acidic pKa ≥ 9.5 and TPSA < 100) in combination with P-gp ER < 1.5 provide mechanistic insights for filtering BBB permeable compounds. For comparison, six classification modeling methods were investigated using multiple sets of in silico molecular descriptors. We present a random forest model with excellent predictive power (∼0.75 overall accuracy) using the rat neuroPK data set. We also observed good concordance between the structural interpretation results and physicochemical descriptor importance from the Kp,uu classification QSAR model. In summary, we propose a novel, hybrid in silico/in vitro approach and an in silico screening model for the

  20. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  1. Effective access to digital assets: An XML-based EAD search system

    NARCIS (Netherlands)

    J. Zhang; K.N. Fachry; J. Kamps

    2009-01-01

    This paper focuses on the question of effective access methods, by developing novel search tools that will be crucial on the massive scale of digital asset repositories. We illustrate concretely why XML matters in digital curation by describing an implementation of a baseline digital asset search sy

  2. Operative technique for insertion of a totally implantable system for venous access.

    Science.gov (United States)

    Sterchi, J M; Fulks, D; Cruz, J; Paschold, E

    1986-10-01

    A totally implantable venous access device is described and a step by step technique for implanting the device is given. Among 203 patients in whom the technique has been used, thrombosis of the subclavian or jugular vein has occurred in only three. There have been no pulmonary complications, and only three devices have been removed because of infection.

  3. Towards a Next Generation Universally Accessible ‘Online Shopping-for-Apparel’ System

    DEFF Research Database (Denmark)

    Kristensen, Kasper; Borum, Nanna; Christiansen, Line Gad;

    2013-01-01

    of online shopping for apparel where conclusions point to the need for adaptive user interface improvements. Unforeseen was that wheelchair-bound public especially responded positively to the potentials for the concept due to their limited mobility in shopping and this accessibility aspect can...

  4. Flexible OFDM-based access systems with intrinsic function of chromatic dispersion compensation

    Science.gov (United States)

    Konishi, Tsuyoshi; Murakawa, Takuya; Nagashima, Tomotaka; Hasegawa, Makoto; Shimizu, Satoshi; Hattori, Kuninori; Okuno, Masayuki; Mino, Shinji; Himeno, Akira; Uenohara, Hiroyuki; Wada, Naoya; Cincotti, Gabriella

    2015-12-01

    Cost-effective and tunable chromatic dispersion compensation in a fiber link are still an open issue in metro and access networks to cope with increasing costs and power consumption. Intrinsic chromatic dispersion compensation functionality of optical fractional orthogonal frequency division multiplexing is discussed and experimentally demonstrated using dispersion-tunable transmitter and receiver based on wavelength selective switching devices.

  5. Resistance to Penicillium allii in accessions from a National Plant Germplasm System Allium collection.

    Science.gov (United States)

    Accessions of Allium sativum (garlic), A. ampeloprasum (elephant garlic) and A. acuminatum, A. aflatunense, A. atroviolaceum, A. canadense, A. longicuspis, A. moly, A. ponticum, A. roseum, A. scorodoprasum, A. senescens, A. stipitatum, and Allium sp. (wild or ornamental species) were screened for re...

  6. A New Performance Analysis Method of Optical Code Division Multiple Access Systems with An Optical Hard-Limiter

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new performance analysis method of Optical Code Division Multiple Access (OCDMA) systems with an optical hard-limiter is studied. The bit error probability of the OCDMA system is derived, and the numerical results of the system with and without an ideal optical hard-limiter are analyzed respectively. The results show that although the derived expression is different from the one derived by J A Salehi[1], the numerical results are the same as those analyzed by J A Salehi, and the numerical result can be easily achieved in this expression.

  7. Performance Analysis of Global Search Algorithm Based Multiuser Detector for Multi Carrier Code Division Multiple Access System under Clipping Noise

    Directory of Open Access Journals (Sweden)

    S. Sivanesskumar

    2011-01-01

    Full Text Available Problem statement: Multi Carrier Code Division Multiple Access (MC-CDMA, a promising technology for the 4G communication systems. The major limitation of MC-CDMA system is the Multiple Access Interference (MAI which is due to near-far effect, frequency offset and nonlinear power amplification due to clipping noise. Approach: The performance of MC-CDMA under clipping noise using Global search algorithm based Multiuser detector in AWGN, Rayleigh and Rician channel is analyzed in this study. Results: The proposed method is simulated using BPSK modulation, Walsh spreading code, number of subcarriers 64 and number of users 16 and clipping noise. Conclusion: By simulation result, BER in AWGN channel outperforms other channels as SNR is increased. The performance of Rician fading channel is better than that of Rayleigh fading channel, because of the LOS path.

  8. Performance Analysis of Multiple Access 60 GHz System Using Frequency-shifted Gaussian Pulse and Non-carrier PSWF Pulse

    OpenAIRE

    Hao Zhang; Wei Shi; Tingting Lu; Jingjing Wang; Xinjie Wang

    2013-01-01

    In this paper, a kind of impulse radio (IR) 60 GHz pulse based on Prolate Spheroidal Wave Functions (PSWF) is proposed. The capacity and performance for multiple access 60 GHz communication system based on carrier pulse and impulse radio pulse are analyzed separately. Both frequency-shifted Gaussian pulse and Prolate Spheroidal Wave Functions (PSWF) pulse are considered and devised according to the federal communication commission (FCC) power constraints. Pulse position modulation (PPM) with ...

  9. Enabling clean access into Subglacial Lake Whillans: development and use of the WISSARD hot water drill system.

    Science.gov (United States)

    Rack, Frank R

    2016-01-28

    Clean hot water drill systems (CHWDSs) are used with clean access protocols for the exploration of subglacial lakes and other subglacial aquatic environments (e.g. ice-shelf cavities) in Antarctica. A CHWDS developed for the Whillans Ice Stream Subglacial Access Research Drilling (WISSARD) project by the Science Management Office at the University of Nebraska-Lincoln (UNL-SMO), USA, was specifically designed for use in West Antarctica, where the US Antarctic Program's South Pole Traverse could assist with logistical support. The initial goal was to provide clean access holes through ice up to 1000 m thick following environmental stewardship guidelines; however, the existing design allows this CHWDS to be used for ice thicknesses up to 2000 m following modifications to accommodate longer hose lengths. In January 2013, the WISSARD CHWDS successfully provided for the first time a clean access borehole through 800 m of ice into Subglacial Lake Whillans beneath the West Antarctic Ice Sheet for the deployment of scientific instruments and sampling tools. The development and initial use of the WISSARD CHWDS required the project team to address a number of constraints while providing contingencies to meet the defined project scope, schedule and budget.

  10. 门禁系统在博物馆的应用%Application of Access Control Systems in Museums

    Institute of Scientific and Technical Information of China (English)

    王振

    2015-01-01

    在数字技术网络技术飞速发展的今天门禁技术得到了迅猛的发展。门禁系统早已超越了单纯的门道及钥匙管理,它已经逐渐发展成为一套完整的出入管理系统。它在工作环境安全、人事考勤管理等行政管理工作中发挥着巨大的作用。本文就门禁系统在博物馆的应用进行分析研究。%got rapid development in the rapid development of digital technology, network technology today access technology. Access control systems have already gone beyond the simple road and key management, it has gradual y developed into a complete access control system. It plays a great role in administrative work environment safety, personnel at endance management etc. In this paper, the museum entrance guard system in the research on the application of.

  11. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  12. FRAMES-2.0 Software System: Providing Password Protection and Limited Access to Models and Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Whelan, Gene; Pelton, Mitch A.

    2007-08-09

    One of the most important concerns for regulatory agencies is the concept of reproducibility (i.e., reproducibility means credibility) of an assessment. One aspect of reproducibility deals with tampering of the assessment. In other words, when multiple groups are engaged in an assessment, it is important to lock down the problem that is to be solved and/or to restrict the models that are to be used to solve the problem. The objective of this effort is to provide the U.S. Nuclear Regulatory Commission (NRC) with a means to limit user access to models and to provide a mechanism to constrain the conceptual site models (CSMs) when appropriate. The purpose is to provide the user (i.e., NRC) with the ability to “lock down” the CSM (i.e., picture containing linked icons), restrict access to certain models, or both.

  13. Apparatus, method and system to control accessibility of platform resources based on an integrity level

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, Chris; Pierson, Lyndon G.

    2016-10-25

    Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report domain to monitor the functional domain and a policy domain to identify, based on such monitoring, a transition of the functional domain from a first integrity level to a second integrity level. In response to a change in integrity level, the policy domain may configure the enforcement domain to enforce against the functional domain one or more resource accessibility rules corresponding to the second integrity level. In another embodiment, the policy domain automatically initiates operations in aid of transitioning the platform from the second integrity level to a higher integrity level.

  14. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS. PMID:23828650

  15. An Approach to Assessing Multicity Implementation of Healthful Food Access Policy, Systems, and Environmental Changes

    OpenAIRE

    Silberfarb, Laura Oliven; Savre, Sonja; Geber, Gayle

    2014-01-01

    Local governments play an increasingly important role in improving residents’ access to healthful food and beverages to reduce obesity and chronic disease. Cities can use multiple strategies to improve community health through, for example, land use and zoning policies, city contracting and procurement practices, sponsorship of farmers markets and community gardens, and vending and concession practices in parks and recreation facilities. With 41 cities in the Hennepin County Human Services an...

  16. Methods and systems for supporting open access and reuse to educational resources and practices

    OpenAIRE

    Ζέρβας, Παναγιώτης Δ.

    2014-01-01

    Over the past years, the term Open Educational Resources (OERs) has been emerged, aiming to promote open access to digital educational resources that are available online for everyone at a global level. The OER term was introduced by UNESCO, which has defined OERs as the “technology-enabled, open provision of educational resources for consultation, use and adaptation by a community of users for non-commercial purposes”. Nevertheless, existing OER initiatives do not treat their OERs differentl...

  17. What Can Analytics Contribute to Accessibility in e-Learning Systems and to Disabled Students’ Learning?

    OpenAIRE

    Cooper, Martyn; Ferguson, Rebecca; Wolff, Annika

    2016-01-01

    This paper explores the potential of analytics for improving accessibility of e-learning and supporting disabled learners in their studies. A comparative analysis of completion rates of disabled and non-disabled students in a large five-year dataset is presented and a wide variation in comparative retention rates is characterized. Learning analytics enable us to identify and understand such discrepancies and, in future, could be used to focus interventions to improve retention of disabled stu...

  18. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    OpenAIRE

    Luis Joyanes Aguilar; Gloria García Fernández; Oscar Sanjuán Martínez; Edward Rolando Núñez Valdez; Juan Manuel Cueva Lovelle

    2009-01-01

    Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by peop...

  19. Random access MAC protocols and system monitoring methodology in wireless mesh networks.

    OpenAIRE

    Huang, F.

    2008-01-01

    As an extension of wireless Ad Hoc 1 and sensor 2 networks, wireless mesh networks (WMN) 3 have recently been developed as a key solution to provide high-quality multimedia services and applications, such as voice, data and video, over wireless personal area networks (WPAN) 4, wireless local area network (WXAN) 5 and wireless metropolitan area network (WMAN) 6. A WMN usually has a hierarchical network infrastructure with backbone and access networks operated in both Ad Hoc and centralized mod...

  20. A Context Aware Content Based Federated Access Control System for Healthcare Domain

    OpenAIRE

    Amjad, Haseeb

    2007-01-01

    Legislation to create electronic healthcare records and provide electronic healthcare services requires the same level of privacy and disclosure regulations as are applicable to the current practices for paper based patient health records. Most of work in this area has been organization-oriented that deals with exchange of information among healthcare organizations (such as referrals). However, the requirements for ensuring security and privacy of information for online access and sharing of ...

  1. Use of Data Denial Experiments to Evaluate ESA Forecast Sensitivity Patterns

    Energy Technology Data Exchange (ETDEWEB)

    Zack, J; Natenberg, E J; Knowe, G V; Manobianco, J; Waight, K; Hanley, D; Kamath, C

    2011-09-13

    wind speed and vertical temperature difference. Ideally, the data assimilation scheme used in the experiments would have been based upon an ensemble Kalman filter (EnKF) that was similar to the ESA method used to diagnose the Mid-Colombia Basin sensitivity patterns in the previous studies. However, the use of an EnKF system at high resolution is impractical because of the very high computational cost. Thus, it was decided to use the three-dimensional variational analysis data assimilation that is less computationally intensive and more economically practical for generating operational forecasts. There are two tasks in the current project effort designed to validate the ESA observational system deployment approach in order to move closer to the overall goal: (1) Perform an Observing System Experiment (OSE) using a data denial approach which is the focus of this task and report; and (2) Conduct a set of Observing System Simulation Experiments (OSSE) for the Mid-Colombia basin region. The results of this task are presented in a separate report. The objective of the OSE task involves validating the ESA-MOOA results from the previous sensitivity studies for the Mid-Columbia Basin by testing the impact of existing meteorological tower measurements on the 0- to 6-hour ahead 80-m wind forecasts at the target locations. The testing of the ESA-MOOA method used a combination of data assimilation techniques and data denial experiments to accomplish the task objective.

  2. Electronic medical record systems in critical access hospitals: leadership perspectives on anticipated and realized benefits.

    Science.gov (United States)

    Mills, Troy R; Vavroch, Jared; Bahensky, James A; Ward, Marcia M

    2010-04-01

    The growth of electronic medical records (EMRs) is driven by the belief that EMRs will significantly improve healthcare providers' performance and reduce healthcare costs. Evidence supporting these beliefs is limited, especially for small rural hospitals. A survey that focused on health information technology (HIT) capacity was administered to all hospitals in Iowa. Structured interviews were conducted with the leadership at 15 critical access hospitals (CAHs) that had implemented EMRs in order to assess the perceived benefits of operational EMRs. The results indicate that most of the hospitals implemented EMRs to improve efficiency, timely access, and quality. Many CAH leaders also viewed EMR implementation as a necessary business strategy to remain viable and improve financial performance. While some reasons reflect external influences, such as perceived future federal mandates, other reasons suggest that the decision was driven by internal forces, including the hospital's culture and the desires of key leaders to embrace HIT. Anticipated benefits were consistent with goals; however, realized benefits were rarely obvious in terms of quantifiable results. These findings expand the limited research on the rationale for implementing EMRs in critical access hospitals.

  3. Web based dosimetry system for reading and monitoring dose through internet access

    International Nuclear Information System (INIS)

    The InstadoseTM dosemeter from Mirion Technologies is a small, rugged device based on patented direct ion storage technology and is accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) through NIST, bringing radiation monitoring into the digital age. Smaller than a flash drive, this dosemeter provides an instant read-out when connected to any computer with internet access and a USB connection. Instadose devices provide radiation workers with more flexibility than today's dosemeters. Non Volatile Analog Memory Cell surrounded by a Gas Filled Ion Chamber. Dose changes the amount of Electric Charge in the DIS Analog Memory. The total charge storage capacity of the memory determines the available dose range. The state of the Analog Memory is determined by measuring the voltage across the memory cell. AMP (Account Management Program) provides secure real time access to account details, device assignments, reports and all pertinent account information. Access can be restricted based on the role assignment assigned to an individual. A variety of reports are available for download and customizing. The Advantages of the Instadose dosemeter are: - Unlimited reading capability, - Concerns about a possible exposure can be addressed immediately, - Re-readability without loss of exposure data, with cumulative exposure maintained. (authors)

  4. Transmission Analysis of Optical Code Division Multiple Access Communication Systems in the Presence of Noise in Local Area Network Applications

    Directory of Open Access Journals (Sweden)

    Ahmed Nabih Zaki Rashed

    2013-04-01

    Full Text Available OCDMA is an essential part of the digital communication system now days for long haul, high speed networks. The biggest challenge with Optical CDMA system is to maintain the performance of the system and offer high bandwidth in case of higher number of users at minimum cost. As the number of users increase, the input requirements i.e. transmitted power, bit rate etc start increasing sharply which contribute to the additional cost. It has recently attracted significant research interest because of the advantages it offers in terms of the flexibility in the management of the system resources. We have taken into account the system design parameters are determined such as BER (bit error rate, signal to noise ratio (SNR, transmission bit rates, and optical received power for different code lengths. The Optical CDMA systems suffer from the problem of multiple access interference (MAI.As the number of users increase the BER error rate degrades because the effect of MAI (multiple access interference increases. So, there is a limitation in number of users, as the number of users increase SNR decrease and probability of error increases.

  5. Evidence that the circadian system mediates photoperiodic nonresponsiveness in Siberian hamsters: the effect of running wheel access on photoperiodic responsiveness.

    Science.gov (United States)

    Freeman, D A; Goldman, B D

    1997-04-01

    Juvenile male Siberian hamsters from a line of hamsters selected for nonresponsiveness to short photoperiod (PNRj) and animals from the general colony (UNS) were separated at weaning into two groups. Group 1 males were moved into short days (10 h light:14 h dark [10L:14D]) with free access to running wheels (RW). Group 2 animals were the male siblings of Group 1 hamsters; they were moved at the same time into the same room, but were housed in cages without access to RW. Group 2 hamsters only had access to RW for the final week of short-day exposure (Week 8). Animals were blood sampled at the time of sacrifice for analysis of serum prolactin (PRL) and follicle-stimulating hormone (FSH) concentrations. At sacrifice, paired testis weights were obtained and pelage color was scored. Animals from the UNS line showed the expected declines in testis weight, body weight, and serum concentrations of both PRL and FSH, regardless of the presence or absence of RW. These animals also exhibited a high proportion of individuals molting to winter-type pelage. By contrast, a marked difference was noted between siblings from the PNRj line depending on whether RW access was provided at the time of weaning. Animals with access to RW exhibited identical responses to those of the UNS responder animals, whereas PNRj animals without access to RW showed no adjustments to short days (i.e., testis regression, pelage molt, expansion of alpha). In a second experiment, PNRj and UNS males were placed in constant darkness (DD), with or without RW access. The results of this experiment indicated that PNRj animals respond to DD regardless of the presence or absence of RW. In DD, PNRj hamsters also exhibited significantly longer free-running period lengths (taus) than did UNS hamsters; all the PNRj hamsters had taus > 24 h, whereas none of the UNS hamsters had a tau > 24 h. These results indicate that PNRj hamsters retain the proper neural pathways for responding to short day lengths and establish a

  6. Effectiveness and Safety of Computer-controlled Periodontal Ligament Injection System in Endodontic Access to the Mandibular Posterior Teeth

    Institute of Scientific and Technical Information of China (English)

    Quan Jing; Kuo Wan; Xiao-jun Wang; Lin Ma

    2014-01-01

    Objective To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posterior teeth in patients with irreversible pulpitis. Methods A total of 162 Chinese patients who had been diagnosed with irreversible pulpitis in their mandibular posterior teeth without acute infection or inflammation in the periodontal tissues were enrolled in this clinical study. The patients were divided into 3 groups according to the position of the involved tooth:the premolar group (PM, n=38), first molar group (FM, n=66), and second molar group (SM, n=58). All the patients received computer-controlled PDL injection with 4%articaine and 1∶100 000 epinephrine. Immediately after the injection, endodontic access was performed, and the degree of pain during the treatment was evaluated by the patients using Visual Analogue Scale for pain. The success rates were compared among the 3 groups. The responses of local soft tissues were evaluated 3-8 days and 3 weeks after the procedure. Results The overall success rate was 76.5%. There was a significant difference in success rates among the PM, FM, and SM groups (92.1%, 53.0%, 93.1%, respectively;χ2=34.3, P Conclusion The computer-controlled PDL injection system demonstrates both satisfactory anesthetic effects and safety in local soft tissues as primary anesthetic technique in endodontic access to the mandibular posterior teeth in patients with irreversible pulpitis.

  7. A design of a wavelength-hopping time-spreading incoherent optical code division multiple access system

    International Nuclear Information System (INIS)

    We present the architecture and code design for a highly scalable, 2.5 Gb/s per user optical code division multiple access (OCDMA) system. The system is scalable to 100 potential and more than 10 simultaneous users, each with a bit error rate (BER) of less than 10-9. The system architecture uses a fast wavelength-hopping, time-spreading codes. Unlike frequency and phase sensitive coherent OCDMA systems, this architecture utilizes standard on off keyed optical pulses allocated in the time and wavelength dimensions. This incoherent OCDMA approach is compatible with existing WDM optical networks and utilizes off the shelf components. We discuss the novel optical subsystem design for encoders and decoders that enable the realization of a highly scalable incoherent OCDMA system with rapid reconfigurability. A detailed analysis of the scalability of the two dimensional code is presented and select network deployment architectures for OCDMA are discussed (Authors)

  8. A Discrete Event Simulator for Extensive Defense Mechanism for Denial of Service Attacks Analysis

    Directory of Open Access Journals (Sweden)

    Maryam Tanha

    2012-01-01

    Full Text Available Problem statement: Seeking for defense mechanisms against low rate Denial of Service (DoS attacks as a new generation of DoS attacks has received special attention during recent years. As a decisive factor, evaluating the performance of the offered mitigation techniques based on different metrics for determining the viability and ability of these countermeasures requires more research. Approach: The development of a new generalized discrete event simulator has been deliberated in detail. The research conducted places high emphasis on the benefits of creating a customized discrete event simulator for the analysis of security and in particular the DoS attacks. The simulator possesses a niche in terms of the small scale, low execution time, portability and ease of use. The attributes and mechanism of the developed simulator is complemented with the proposed framework. Results: The simulator has been extensively evaluated and has proven to provide an ideal tool for the analysis and exploration of DoS attacks. In-depth analysis is enabled by this simulator for creating multitudes of defense mechanisms against HTTP low rate DoS attacks. The acquired results from the simulation tool have been compared against a simulator from the same domain. Subsequently, it enables the validation of developed simulator utilizing selected performance metrics including mean in-system time, average delay and average buffer size. Conclusion: The proposed simulator serves as an efficient and scalable performance analysis tool for the analysis of HTTP low rate DoS attack defense mechanism. Future work can encompass the development of discrete event simulators for analysis of other security issues such as Intrusion Detection Systems.

  9. 76 FR 15986 - Alpha Omega Technology, Inc.; Denial Without Prejudice of Food Additive Petition

    Science.gov (United States)

    2011-03-22

    ... the Federal Register of March 15, 1990 (55 FR 9772), FDA announced that a food additive petition (FAP....; Denial Without Prejudice of Food Additive Petition AGENCY: Food and Drug Administration, HHS. ACTION...). Consequently, FDA is denying the petition without prejudice to a future filing (21 U.S.C. 348(c)(1)(B), 21...

  10. 33 CFR Appendix A to Part 331 - Administrative Appeal Process for Permit Denials and Proffered Permits

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Administrative Appeal Process for... ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE ADMINISTRATIVE APPEAL PROCESS Pt. 331, App. A Appendix A to Part 331—Administrative Appeal Process for Permit Denials and Proffered Permits ER28MR00.000...

  11. Ethics, Dialogue, and Denial: Responding to Anti-Semitic Discourse on the Web.

    Science.gov (United States)

    Borrowman, Shane

    Holocaust denial, like hate speech in general, is reaching far larger audiences on the World Wide Web that it was ever able to do in the past. The Internet is the most free press imaginable, and Holocaust deniers can publish their works as widely as they like and construct their message in any way they choose--they have great latitude when…

  12. 7 CFR 900.357 - Denial of application; suspension or revocation of determination of qualification.

    Science.gov (United States)

    2010-01-01

    ... (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts... Marketing Associations § 900.357 Denial of application; suspension or revocation of determination of... recommendation as to what action shall be taken and the basis for such action. A copy of said report shall...

  13. Older People and Poverty in Rural Britain: Material Hardships, Cultural Denials and Social Inclusions

    Science.gov (United States)

    Milbourne, Paul; Doheny, Shane

    2012-01-01

    This paper explores the relations between older people, poverty and place in rural Britain. It develops previous work on rural poverty that has pointed both to the significance of older people within the rural poor population and to their denials of poverty. The paper also connects with recent discussions on the complexity of relations between…

  14. 24 CFR 891.630 - Denial of admission, termination of tenancy, and modification of lease.

    Science.gov (United States)

    2010-04-01

    ... terminate tenancy, the Owner shall follow 24 CFR part 5, subpart L, in all cases where domestic violence... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Denial of admission, termination of tenancy, and modification of lease. 891.630 Section 891.630 Housing and Urban Development...

  15. 7 CFR 400.205 - Denial or termination of contract and administrative reassignment of business.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Denial or termination of contract and administrative reassignment of business. 400.205 Section 400.205 Agriculture Regulations of the Department of Agriculture (Continued) FEDERAL CROP INSURANCE CORPORATION, DEPARTMENT OF AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Agency Sales and...

  16. Third-Person Effects on Publication of a Holocaust-Denial Advertisement.

    Science.gov (United States)

    Price, Vincent; Tewksbury, David; Huang, Li-Ning

    1998-01-01

    Investigates college students' judgments about a controversial Holocaust-denial advertisement and its suitability for publication in their college newspaper. Finds that those with interests at stake perceived the advertisement as especially likely to influence others, and that third-person effects and publication decisions were a function of…

  17. 42 CFR 73.8 - Denial, revocation, or suspension of registration.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Denial, revocation, or suspension of registration. 73.8 Section 73.8 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES... law enforcement or intelligence agency of: (i) Committing a crime specified in 18 U.S.C....

  18. 40 CFR 91.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 91.123 Section 91.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Certification Provisions § 91.123 Denial, revocation of certificate of conformity. (a) If, after review of the... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The...

  19. 40 CFR 89.126 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 89.126 Section 89.126 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Standards and Certification Provisions § 89.126 Denial, revocation of certificate of conformity. (a) If... issued certificate of conformity if the Administrator finds any one of the following infractions to...

  20. 40 CFR 90.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 90.123 Section 90.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Emission Standards and Certification Provisions § 90.123 Denial, revocation of certificate of conformity... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The...