WorldWideScience

Sample records for access denial systems

  1. 12 CFR 404.17 - Appeal of denials of access.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Appeal of denials of access. 404.17 Section 404.17 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.17 Appeal of denials of access. (a) Appeals to the Assistant General...

  2. 17 CFR 9.12 - Effective date of disciplinary or access denial action.

    Science.gov (United States)

    2010-04-01

    ... ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.12 Effective date of disciplinary or access denial action. (a) Effective date. Any disciplinary or access denial action taken by an... cause a disciplinary action to become effective prior to that time if: (1) As authorized by § 8.25 of...

  3. 22 CFR 214.51 - Administrative review of denial for public access to records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Administrative review of denial for public access to records. 214.51 Section 214.51 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADVISORY COMMITTEE MANAGEMENT Administrative Remedies § 214.51 Administrative review of denial for public access to...

  4. 17 CFR 9.11 - Form, contents and delivery of notice of disciplinary or access denial action.

    Science.gov (United States)

    2010-04-01

    ... notice of disciplinary or access denial action. 9.11 Section 9.11 Commodity and Securities Exchanges... OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.11 Form, contents and delivery of notice of disciplinary or access denial action. (a) When required...

  5. 22 CFR 212.36 - Denial of request for access to records.

    Science.gov (United States)

    2010-04-01

    ... Section 212.36 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency... responsible for the denial, and the right of the person to appeal the adverse determination. (b) The denial of... Administrative Services, Bureau for Management, Room 803, SA-2, Agency for International Development, 21st and...

  6. 36 CFR 1270.42 - Denial of access to public; right to appeal.

    Science.gov (United States)

    2010-07-01

    ...; right to appeal. 1270.42 Section 1270.42 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Denial of access to public; right to appeal. (a) Any person denied access to a Presidential record... library director at the address cited in part 1253 of this chapter. (b) All appeals must be received by...

  7. 16 CFR 1014.8 - Appeal of initial denial of access, correction or amendment.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Appeal of initial denial of access, correction or amendment. 1014.8 Section 1014.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION... Federal District Court for judicial review of the decision; and (3) The right of the requester to file...

  8. 19 CFR 122.183 - Denial of access.

    Science.gov (United States)

    2010-04-01

    ...-year period, or any longer period that the port director deems appropriate for the offense in question... suspension of access under § 122.182(g) or § 122.187; (2) Evidence of a pending or past investigation... punishable by a maximum term of imprisonment of more than one year; (xxvi) Violence at an airport serving...

  9. System justification, the denial of global warming, and the possibility of "system-sanctioned change".

    Science.gov (United States)

    Feygina, Irina; Jost, John T; Goldsmith, Rachel E

    2010-03-01

    Despite extensive evidence of climate change and environmental destruction, polls continue to reveal widespread denial and resistance to helping the environment. It is posited here that these responses are linked to the motivational tendency to defend and justify the societal status quo in the face of the threat posed by environmental problems. The present research finds that system justification tendencies are associated with greater denial of environmental realities and less commitment to pro-environmental action. Moreover, the effects of political conservatism, national identification, and gender on denial of environmental problems are explained by variability in system justification tendencies. However, this research finds that it is possible to eliminate the negative effect of system justification on environmentalism by encouraging people to regard pro-environmental change as patriotic and consistent with protecting the status quo (i.e., as a case of "system-sanctioned change"). Theoretical and practical implications of these findings are discussed.

  10. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  11. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  12. The current German regime governing third-party access to power transmission systems and denial of TPA, discussed from the angle of applicable civil law, energy industry law and antitrust law

    International Nuclear Information System (INIS)

    Kuehne, G.

    2000-01-01

    The German EnWG (energy industry law) for deregulation of the energy sector and implementation of the Internal Energy Market Directive of the EU contains an obligation to contract and make rules for establishing a legally binding system for access to and use of third parties of transmission and distribution networks in the competitive electricity market. The design of such contracts under private law as well as the grid code for network operation primarily being a matter of the contracting parties, the legal basis and opportunities for governmental supervisory functions are embodied in various laws. The legal analysis of this contribution examines the current situation and asks whether the existing provisions of the German BGB (Civil Code), antitrust law and the EnWG offer practicable means in case of need for governmental supervisory action in order to ensure evolution and adherence to a legal framework that will ensure the objectives of the politically willed deregulation of the energy sector and foster development of an open market serving the public welfare. (CB) [de

  13. The Bear’s Den: Russian Anti Access/Area Denial in the Maritime Domain

    Science.gov (United States)

    2016-05-01

    quietly developing its capabilities. Russia’s territorial seizures and money from natural resources have helped the Russian military develop...an anti- access capability of its own. With their territorial seizures and an influx of money from natural resources, the Russian military has...Russia has also deployed its Bastion anti-ship missile system, designed to destroy enemy ships, to the area. The Bastion is coupled with the S

  14. Understanding the Anti-Access and Area Denial Threat: An Army Perspective

    Science.gov (United States)

    2015-05-21

    65Van Tol, et al, 32-40. 66Eric V. Larson, Derek Eaton, Paul Elrick, Theodore Karasik, Robert Klein , Sherrill Lingel, Brian Nichiporuk, Robert Uy...Davis, Lynn E., Stacie L. Pettyjohn, Melanie W. Sisson, Stephen M. Worman, and Michael J. McNerney. US Overseas Military Presence: What are the...Robert Klein , Sherrill Lingel, Brian Nichiporuk, Robert Uy, and John Zavadil. Assuring Access in Key Strategic Regions: Toward a Long-Term Strategy

  15. Basing Strategies for Air Refueling Forces in Anti-access/Area-Denial Environments

    Science.gov (United States)

    2015-09-01

    likely, increase manpower allocations to provide specialist technician coverage at all locations. Connecting subunits by air or surface lift could re...at disaggregated bases also may be overwhelmed by local challenges ranging from base security breaches and supply shortages to the presence of...supported units offers some opportunity to protect tanker forces. But the requirement to establish supply warehouses , access agreements, and the like

  16. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  17. Healthcare Information Technology (HIT) in an Anti-Access (A2) and Area Denial (AD) Environment

    Science.gov (United States)

    2014-03-01

    point for multiple sites to connect to each other so radiologists can read diagnostic images by managing firewall connections. The idea of multiple...learn from them.41 Although IBM’s Watson isn’t living up to the hype just yet, the artificial intelligent ( AI ) computer system is a precursor for a...on the ground can control a UAV with two passengers in it; one technician and one AI healthcare machine (Medical IBM Watson). Once the UAV lands

  18. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  19. Nuclear information access system

    International Nuclear Information System (INIS)

    Ham, C. H.; Yang, M. H.; Yoon, S. W.

    1998-01-01

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  20. Environmental Denial

    Directory of Open Access Journals (Sweden)

    Tomaž Grušovnik

    2013-03-01

    Full Text Available Even though today reliable information about the negative impact of humans on the environment is only two clicks away, a considerable number of people still deny it. Why? Research shows that what we might call 'environmental denial' is a consequence of specific social and psychological factors: if we were to admit the negative impact of our lifestyles on the environment, we would have to change our way of life founded on consumerism. However, consumerism is not simply a way of exchanging goods; it is also something around which we organize the meaning of our lives, as consumer research clearly shows. Therefore we deny the information on the negattive impact of human activity on the environment because admitting it would lead to a conflict between cognition (attitudes, beliefs and actions (behaviour around which we organize the meaning of our lives. Such an exposition points to wider sociopolitical effects. Firstly, it raises questions about education that have to take into account the non-rational nature of human beings, and secondly it raises questions about the directions and possible outcomes of social action.

  1. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  2. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  3. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  4. Denial: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  5. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  6. Limited Denial of Participation

    Data.gov (United States)

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  7. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  8. Research on a Denial of Service (DoS Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    Seoksoo Kim

    2010-11-01

    Full Text Available This research suggests a Denial of Service (DoS detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed.

  9. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  10. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  11. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  12. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  13. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  14. Young Children's Understanding of Denial

    Science.gov (United States)

    Austin, Keith; Theakston, Anna; Lieven, Elena; Tomasello, Michael

    2014-01-01

    Although a fair amount is known about young children's production of negation, little is known about their comprehension. Here, we focus on arguably the most complex basic form, denial, and how young children understand denial, when it is expressed in response to a question with gesture, single word, or sentence. One hundred twenty-six children in…

  15. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  16. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  17. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  18. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  19. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  20. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  1. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Directory of Open Access Journals (Sweden)

    João José Costa Gondim

    2016-11-01

    Full Text Available Concerns about security on Internet of Things (IoT cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests. After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  2. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  3. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  4. Doomed to Repeat It How the United States Air Force Can Apply History via Counterinsurgency Lessons Learned to Meet Anti-Access/Area Denial Challenges

    Science.gov (United States)

    2012-08-01

    technology used in the COIN fight are not readily transferable to conflicts against enemies using A2/AD tactics, such as heavy electromagnetic attack...particularly when matched against a technology advanced enemy. Technologies unsuitable for an opposed electromagnetic spectrum are unsurvivable...increased numbers of weapons systems such as the MQ-1, MQ-9, and MC-12. Additionally, open-ended deployments of ISR assets such as the RC-135 RIVET

  5. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  6. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  7. Nihilism: a benign denial.

    Science.gov (United States)

    Skandalakis, John E; Mirilas, Petros

    2003-06-01

    Nihilism is the belief that all possible knowledge on a given topic has been amassed and codified. Ranging from benign denial to deliberate attempts at excommunication, nihilism is often encountered in the history of medicine. Eustachius, Columbus, and Sylvius strongly criticized Vesalius and defended the authority of Galen. Riolan fervently rejected Harvey's monumental work on the circulation of blood. Gross stated that no honest and sensible surgeon would ever sanction thyroidectomy. Sandstrom's discovery of the parathyroids was met with silence. Transplantation of parathyroids by Mandl was not appreciated when announced. Aristotle's dictum that the heart cannot withstand serious injury led to Paget's statement that cardiac surgery had reached the limits set by nature, which no new techniques could overcome. The first Billroth I operation was welcomed as, "Hopefully, also the last." Pancreatic surgery was opposed because the organ was of no clinical interest and was impossible for surgeons to reach. Pancreatic transplantation was rejected for many years, despite good results. When Blundell used blood transfusion for postpartum hemorrhage, critics averred that his next exploit would be radical removal of the spleen. Bassini stated that it could be risky to publish more about radical treatment of inguinal hernias. Carcinomas of the lower sigmoid and upper rectum were deemed untreatable because of their inaccessibility. Colostomy during pediatric surgery was rejected many times. Although it is difficult for the human mind to move from a familiar point of view, this propensity should not infect science, thereby impeding advancement.

  8. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  9. Global Warming Denial: The Human Brain on Extremes

    Science.gov (United States)

    Marrouch, N.; Johnson, B. T.; Slawinska, J. M.

    2016-12-01

    Future assessments of climate change rely on multi-model intercomparisons, and projections of the extreme events frequency are of particular interest as associated with significant economic costs and social threats. Notably, systematically simulated increases in the number of extreme weather events agree well with observational data over the last decade. At the same time, as the climate grows more volatile, widespread denial of climate change and its anthropocentric causes continues to proliferate (based on nationally representative U.S. polls). Simultaneous increases in both high-impact exposure and its denial is in stark contrast with our knowledge of socio-natural dynamics and its models. Disentangling this paradox requires an understanding of the origins of global warming denial at an individual level, and how subsequently it propagates across social networks of many scales, shaping global policies. However, as the real world and its dynamical models are complex (high-dimensional and coupled), separating the particular feedback of interest remains a challenge. Here, we demonstrate this feedback in a controlled experiment, where increasing unpredictability using helplessness-training paradigms induces changes in global warming denial, and the endorsement of conservative ideology. We explain these results in the context of evolutionary theory framing self-deception and denial as remnants of evolutionary processes that shaped and facilitated the survival of the human species. Further we link these findings to changes in neural and higher-level cognitive processes in response to unpredictable stimuli. We argue that climate change denial is an example of an extreme belief system that carries the potential to threaten the wellbeing of both humans and other species alike. It is therefore crucial to better quantify climate denial using social informatics tools that provide the means to improve its representations in coupled socio-geophysical models to mitigate its

  10. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    Science.gov (United States)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  11. Fast Access Data Acquisition System (FADAS)

    International Nuclear Information System (INIS)

    Katsman, Vladimir

    1998-01-01

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing

  12. MAST's Integrated Data Access Management system: IDAM

    International Nuclear Information System (INIS)

    Muir, D.G.; Appel, L.; Conway, N.J.; Kirk, A.; Martin, R.; Meyer, H.; Storrs, J.; Taylor, D.; Thomas-Davies, N.; Waterhouse, J.

    2008-01-01

    A new Integrated Data Access Management system, IDAM, has been created to address specific data management issues of the MAST spherical Tokamak. For example, this system enables access to numerous file formats, both legacy and modern (IDA, Ufile, netCDF, HDF5, MDSPlus, PPF, JPF). It adds data quality values at the signal level, and automatically corrects for problems in data: in timings, calibrations, and labelling. It also builds new signals from signal components. The IDAM data server uses a hybrid XML-relational database to record how data are accessed, whether locally or remotely, and how alias and generic signal names are mapped to true names. Also, XML documents are used to encode the details of data corrections, as well as definitions of composite signals and error models. The simple, user friendly, API and accessor function library, written in C on Linux, is available for applications in C, C++, IDL and Fortran-90/95/2003 with good performance: a MAST plasma current trace (28 kbytes of data), requested using a generic name and with data corrections applied, is delivered over a 100 Mbit/s network in ∼13 ms

  13. Defending Science Denial in Cyberspace

    Science.gov (United States)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  14. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  15. Towards Payment Systems for all: accessible POS

    Directory of Open Access Journals (Sweden)

    Begoña Pino

    2014-10-01

    Full Text Available The project presented here is a first step towards building a more accessible world through Payment Systems and a successful implementation of a User Centred Design. By means of a beep-system, a Point of Sale (POS payment device informs the user of those transaction steps that require his/her attention at the moment of payment, such as when: the card has been successfully read, the Personal Identification Number (PIN must be entered, the transaction has been successfully processed and the transaction has not been completed due to an error. The proposed solution increases the personal autonomy and security of blind people when paying at a merchant.

  16. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  17. Internet-accessible real-time weather information system

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.

    An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...

  18. Digital Autonomous Terminal Access Communication (DATAC) system

    Science.gov (United States)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  19. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  20. Resilient control under Denial-of-Service: Robust design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  1. Resilient Control under Denial-of-Service:Robust Design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  2. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  3. Holocaust Denial among Slovenian Secondary School Pupils

    Directory of Open Access Journals (Sweden)

    Maša Pavlič

    2015-06-01

    Full Text Available The article presents tendencies of Holocaust denial among secondary school pupils in Slovenia. It focuses on research implemented in January 2012, in which 400 Slovenian secondary school pupils were included. In spite of the assumption that Holocaust denial amongst the youth in Slovenia already exists, we also assumed that a degree of Holocaust denial amongs Slovenian pupils is lower that amongst their peers in other EU countries. Research also inquired about the level of anti-Semitism in conjunction with Holocaust denial. The research project confirmed that students on lower levels of high school education and with less history and sociology lessons in curriculum are more receptive for the Holocaust denial and anti-Semitism is more present in this demographic. The level of Holocaust denial amongst secondary school pupils is not negligible; it suggests that this topic should be more thoroughly discussed in secondary schools.

  4. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  5. Illness denial questionnaire for patients and caregivers.

    Science.gov (United States)

    Rossi Ferrario, Silvia; Giorgi, Ines; Baiardi, Paola; Giuntoli, Laura; Balestroni, Gianluigi; Cerutti, Paola; Manera, Marina; Gabanelli, Paola; Solara, Valentina; Fornara, Roberta; Luisetti, Michela; Omarini, Pierangela; Omarini, Giovanna; Vidotto, Giulio

    2017-01-01

    Interest in assessing denial is still present, despite the criticisms concerning its definition and measurement. We tried to develop a questionnaire (Illness Denial Questionnaire, IDQ) assessing patients' and caregivers' denial in relation to their illness/disturbance. After a preliminary study, a final version of 24 dichotomous items (true/false) was selected. We hypothesized a theoretical model with three dimensions: denial of negative emotions, resistance to change, and conscious avoidance, the first two composing the actual Denial and the last representing an independent component of the illness denial behavior. The IDQ was administered to 400 subjects (219 patients and 181 caregivers) together with the Anxiety-Depression Questionnaire - Reduced form (AD-R), in order to assess concurrent validity. Confirmatory factor analysis (CFA), internal consistency indices (Cronbach's α and McDonald's ω), and test-retest analysis were performed. CFA and internal consistency indices (Cronbach's α: 0.87-0.96) indicated a clear and meaningful three-factor structure of IDQ, for both patients and caregivers. Further analyses showed good concurrent validity, with Denial and its subscale negatively associated with anxiety and depression and avoidance positively associated with anxiety and depression. The IDQ also showed a good stability ( r from 0.71 to 0.87). The IDQ demonstrated good psychometric properties. Denial of negative emotions and resistance to change seem to contribute to a real expression of denial, and conscious avoidance seems to constitute a further step in the process of cognitive-affective elaboration of the illness.

  6. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  7. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  8. 33 CFR 135.401 - Access to vessel, Certificates of Financial Responsibility.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Access, Denial, and Detention § 135.401 Access to vessel, Certificates of...

  9. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Adrien Bonguet

    2017-08-01

    Full Text Available Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services. Denial-of-Service (DoS and Distributed Denial-of-Service (DDoS attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain.

  10. (Distributed) Denial-of-Service : deel 1

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2013-01-01

    De afgelopen maanden zijn denial-of-service aanvallen op de Nederlandse bancaire sector, de KLM, dagblad de Telegraaf, de overheid (belastindienst, DigiD) en andere organisaties prominent in het nieuws. Wat is denial-of-service? Wie doet dat en waarom? Hoe sterk zijn de aanvallen? Wat kunnen of

  11. Collateral Damage: Interlibrary Loan Lending Denials

    Science.gov (United States)

    Leykam, Andrew

    2009-01-01

    The intent of this paper is to explore the potential of utilizing interlibrary loan (ILL) data relating to lending denials to improve ILL services while highlighting institutional policies that have a negative impact on lending fulfillment rates. Reasons for denial as well as the types of requests being denied are reviewed. In addition, the author…

  12. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Science.gov (United States)

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  13. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  14. Denial of shipments - myth or reality

    International Nuclear Information System (INIS)

    Charrette, M.A.; McInnes, D.

    2004-01-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care

  15. Denial of shipments - myth or reality

    Energy Technology Data Exchange (ETDEWEB)

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  16. 28 CFR 25.6 - Accessing records in the system.

    Science.gov (United States)

    2010-07-01

    ... National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs may... through the NCIC communication network. Upon receiving a request for a background check from an FFL, a POC...

  17. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  18. System Hardening Architecture for Safer Access to Critical Business ...

    African Journals Online (AJOL)

    System Hardening Architecture for Safer Access to Critical Business Data. ... and the threat is growing faster than the potential victims can deal with. ... in this architecture are applied to the host, application, operating system, user, and the ...

  19. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  20. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  1. Health system weaknesses constrain access to PMTCT and maternal HIV services in South Africa: a qualitative enquiry

    Directory of Open Access Journals (Sweden)

    Chersich Matthew F

    2011-03-01

    Full Text Available Abstract Background HIV remains responsible for an estimated 40% of mortality in South African pregnant women and their children. To address these avoidable deaths, eligibility criteria for antiretroviral therapy (ART in pregnant women were revised in 2010 to enhance ART coverage. With greater availability of HIV services in public health settings and increasing government attention to poor maternal-child health outcomes, this study used the patient's journey through the continuum of maternal and child care as a framework to track and document women's experiences of accessing ART and prevention of mother-to-child HIV transmission (PMTCT programmes in the Eastern Cape (three peri-urban facilities and Gauteng provinces (one academic hospital. Results In-depth interviews identified considerable weaknesses within operational HIV service delivery. These manifested as missed opportunities for HIV testing in antenatal care due to shortages of test kits; insufficient staff assigned to HIV services; late payment of lay counsellors, with consequent absenteeism; and delayed transcription of CD4 cell count results into patient files (required for ART initiation. By contrast, individual factors undermining access encompassed psychosocial concerns, such as fear of a positive test result or a partner's reaction; and stigma. Data and information systems for monitoring in the three peri-urban facilities were markedly inadequate. Conclusions A single system- or individual-level delay reduced the likelihood of women accessing ART or PMTCT interventions. These delays, when concurrent, often signalled wholesale denial of prevention and treatment. There is great scope for health systems' reforms to address constraints and weaknesses within PMTCT and ART services in South Africa. Recommendations from this study include: ensuring autonomy over resources at lower levels; linking performance management to facility-wide human resources interventions; developing

  2. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  3. Climate change denial, freedom of speech and global justice

    Directory of Open Access Journals (Sweden)

    Trygve Lavik

    2016-10-01

    Full Text Available In this paper I claim that there are moral reasons for making climate denialism illegal . First I define climate denialism, and then I discuss its impact on society and its reception in the media.  I build my philosophical arguments mainly on John Stuart Mill and Thomas M. Scanlon.  According to Mill’s utilitarian justification of free speech, even untrue opinions are valuable in society’s pursuit of more truth. Consequently one might think that Mill’s philosophy would justify climate denialists’ right to free speech.  A major section of the paper argues against that view. The main arguments are: Climate denialism is not beneficial because its main goal is to produce doubt, and not truth. Climate denialism is not sincerely meant, which is a necessary condition for Mill to accept utterances. Climate denialists bring harm, by blocking necessary action on climate change.  Primarily they harm future generations and people in developing countries. Hence the case can be made in terms of global justice: Would future generations and people in developing countries support my claim? I think so, or so I argue. My argument from global justice is built on Scanlon’s distinction between the interests of participants, the interests of audiences, and the interests of bystanders.  The climate denialists have participant interests ‘in being able to call something to the attention of a wide audience’. Audience interests consist in ‘having access to expressions that we wish to hear or read, and even in being exposed to some degree to expressions we have not chosen’. Future generations and people in poor countries are bystanders to the climate debate. If the debate postpones necessary actions, it is the bystanders who must pay the price. I argue that bystanders’ costs outweigh participants’ and audiences’ interests, and that this is an argument for a statutory ban on climate denialism.Article first published online: 21 DEC 2015 

  4. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  5. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  6. General Controls Over the Electronic Document Access System

    National Research Council Canada - National Science Library

    2000-01-01

    ...) system as part of the DoD Paper-Free Contracting Initiative. EDA contributes to the initiative by digitizing paper documents and offering web-based read-only access to official contracting, finance and accounting documents...

  7. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  8. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2017. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  9. Immediate data access system for LHD experiments

    International Nuclear Information System (INIS)

    Emoto, M.; Iwadare, Y.; Nagayama, Y.

    2004-01-01

    Several kinds of computer systems are used to perform large helical device (LHD) experiments, and each produces its own data format. Therefore, it has been difficult to deal with these data simultaneously. In order to solve this problem, the Kaiseki server was developed; it has been facilitating the unified retrieval of LHD data. The data acquired or analyzed by various computer systems are converted into the unified ASCII format, or Kaiseki format, and transferred to the Kaiseki server. With this method, the researchers can visualize and analyze the data produced by various kinds of computers in the same way. Because validations are needed before registering on the Kaiseki server, it takes time to make the validated data available. However, some researchers need data as soon as it is gathered in order to adjust their instruments during the experiments. To satisfy this requirement, a new visualization system has been under development. The new system has two ways to visualize the data as physical values from the raw data. If the conversion task is not complex, the NIFSscope, a visualization tool, converts the raw data into physics data by itself. If the task is too complex to handle, it asks the ANACalc server to make physics data. When the ANACalc server receives a request, it delegates calculation programs to convert the acquired data into physics data. Because the interfaces between the server and the calculation processes are independent of programming languages and operating systems, the calculation processes can be placed on different computers and the server load can be reduced. Therefore, the system can respond to changes in requirements by replacing the calculation programs, and can easily be expanded by increasing the number of calculation servers

  10. Organizational crisis-denial strategy: the effect of denial on public framing

    NARCIS (Netherlands)

    van der Meer, T.G.L.A.

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames

  11. Illness denial questionnaire for patients and caregivers

    Directory of Open Access Journals (Sweden)

    Rossi Ferrario S

    2017-03-01

    Full Text Available Silvia Rossi Ferrario,1 Ines Giorgi,2 Paola Baiardi,3 Laura Giuntoli,4 Gianluigi Balestroni,1 Paola Cerutti,1 Marina Manera,2 Paola Gabanelli,2 Valentina Solara,5 Roberta Fornara,6 Michela Luisetti,1 Pierangela Omarini,1 Giovanna Omarini,1 Giulio Vidotto4 1Psychology Unit, Istituti Clinici Scientifici Maugeri SpA SB, Veruno, NO, Italy; 2Psychology Unit, 3Scientific Direction, Istituti Clinici Scientifici Maugeri SpA SB, Pavia, Italy; 4Department of General Psychology, University of Padova, Padova, Italy; 5Department of Neurology, ALS Centre, “Maggiore della Carita`” University Hospital, Novara, Italy; 6Psychology Unit, SS Trinità Hospital, Borgomanero, NO, Italy Purpose: Interest in assessing denial is still present, despite the criticisms concerning its definition and measurement. We tried to develop a questionnaire (Illness Denial Questionnaire, IDQ assessing patients’ and caregivers’ denial in relation to their illness/disturbance. Patients and methods: After a preliminary study, a final version of 24 dichotomous items (true/false was selected. We hypothesized a theoretical model with three dimensions: denial of negative emotions, resistance to change, and conscious avoidance, the first two composing the actual Denial and the last representing an independent component of the illness denial behavior. The IDQ was administered to 400 subjects (219 patients and 181 caregivers together with the Anxiety–Depression Questionnaire – Reduced form (AD-R, in order to assess concurrent validity. Confirmatory factor analysis (CFA, internal consistency indices (Cronbach’s α and McDonald’s ω, and test–retest analysis were performed. Results: CFA and internal consistency indices (Cronbach’s α: 0.87–0.96 indicated a clear and meaningful three-factor structure of IDQ, for both patients and caregivers. Further analyses showed good concurrent validity, with Denial and its subscale negatively associated with anxiety and depression and

  12. Reliability of power system with open access

    International Nuclear Information System (INIS)

    Ehsani, A.; Ranjbar, A. M.; Fotuhi Firuzabad, M.; Ehsani, M.

    2003-01-01

    Recently, in many countries, electric utility industry is undergoing considerable changes in regard to its structure and regulation. It can be clearly seen that the thrust towards privatization and deregulation or re regulation of the electric utility industry will introduce numerous reliability problems that will require new criteria and analytical tools that recognize the residual uncertainties in the new environment. In this paper, different risks and uncertainties in competitive electricity markets are briefly introduced; the approach of customers, operators, planners, generation bodies and network providers to the reliability of deregulated system is studied; the impact of dispersed generation on system reliability is evaluated; and finally, the reliability cost/reliability worth issues in the new competitive environment are considered

  13. Remotely Accessed Vehicle Traffic Management System

    Science.gov (United States)

    Al-Alawi, Raida

    2010-06-01

    The ever increasing number of vehicles in most metropolitan cities around the world and the limitation in altering the transportation infrastructure, led to serious traffic congestion and an increase in the travelling time. In this work we exploit the emergence of novel technologies such as the internet, to design an intelligent Traffic Management System (TMS) that can remotely monitor and control a network of traffic light controllers located at different sites. The system is based on utilizing Embedded Web Servers (EWS) technology to design a web-based TMS. The EWS located at each intersection uses IP technology for communicating remotely with a Central Traffic Management Unit (CTMU) located at the traffic department authority. Friendly GUI software installed at the CTMU will be able to monitor the sequence of operation of the traffic lights and the presence of traffic at each intersection as well as remotely controlling the operation of the signals. The system has been validated by constructing a prototype that resembles the real application.

  14. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  15. The COROT ground-based archive and access system

    Science.gov (United States)

    Solano, E.; González-Riestra, R.; Catala, C.; Baglin, A.

    2002-01-01

    A prototype of the COROT ground-based archive and access system is presented here. The system has been developed at LAEFF and it is based on the experience gained at Laboratorio de Astrofisica Espacial y Fisica Fundamental (LAEFF) with the INES (IUE Newly Extracted System) Archive.

  16. Access safety systems - New concepts from the LHC experience

    International Nuclear Information System (INIS)

    Ladzinski, T.; Delamare, C.; Luca, S. di; Hakulinen, T.; Hammouti, L.; Havart, F.; Juget, J.F.; Ninin, P.; Nunes, R.; Riesco, T.; Sanchez-Corral Mena, E.; Valentini, F.

    2012-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hard wired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and the access control includes a state of the art bio-metry check. Building on the LHC experience, new projects targeting the refurbishment of the existing access safety infrastructure in the injector chain have started. This paper summarises the new concepts introduced in the LHC access control and safety systems, discusses the return of experience and outlines the main guiding principles for the renewal stage of the personnel protection systems in the LHC injector chain in a homogeneous manner. (authors)

  17. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  18. Einstein Critical-Slowing-Down is Siegel CyberWar Denial-of-Access Queuing/Pinning/ Jamming/Aikido Via Siegel DIGIT-Physics BEC ``Intersection''-BECOME-UNION Barabasi Network/GRAPH-Physics BEC: Strutt/Rayleigh-Siegel Percolation GLOBALITY-to-LOCALITY Phase-Transition Critical-Phenomenon

    Science.gov (United States)

    Buick, Otto; Falcon, Pat; Alexander, G.; Siegel, Edward Carl-Ludwig

    2013-03-01

    Einstein[Dover(03)] critical-slowing-down(CSD)[Pais, Subtle in The Lord; Life & Sci. of Albert Einstein(81)] is Siegel CyberWar denial-of-access(DOA) operations-research queuing theory/pinning/jamming/.../Read [Aikido, Aikibojitsu & Natural-Law(90)]/Aikido(!!!) phase-transition critical-phenomenon via Siegel DIGIT-Physics (Newcomb[Am.J.Math. 4,39(1881)]-{Planck[(1901)]-Einstein[(1905)])-Poincare[Calcul Probabilités(12)-p.313]-Weyl [Goett.Nachr.(14); Math.Ann.77,313 (16)]-{Bose[(24)-Einstein[(25)]-Fermi[(27)]-Dirac[(1927)]}-``Benford''[Proc.Am.Phil.Soc. 78,4,551 (38)]-Kac[Maths.Stat.-Reasoning(55)]-Raimi[Sci.Am. 221,109 (69)...]-Jech[preprint, PSU(95)]-Hill[Proc.AMS 123,3,887(95)]-Browne[NYT(8/98)]-Antonoff-Smith-Siegel[AMS Joint-Mtg.,S.-D.(02)] algebraic-inversion to yield ONLY BOSE-EINSTEIN QUANTUM-statistics (BEQS) with ZERO-digit Bose-Einstein CONDENSATION(BEC) ``INTERSECTION''-BECOME-UNION to Barabasi[PRL 876,5632(01); Rev.Mod.Phys.74,47(02)...] Network /Net/GRAPH(!!!)-physics BEC: Strutt/Rayleigh(1881)-Polya(21)-``Anderson''(58)-Siegel[J.Non-crystalline-Sol.40,453(80)

  19. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  20. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  1. ISAIA: Interoperable Systems for Archival Information Access

    Science.gov (United States)

    Hanisch, Robert J.

    2002-01-01

    The ISAIA project was originally proposed in 1999 as a successor to the informal AstroBrowse project. AstroBrowse, which provided a data location service for astronomical archives and catalogs, was a first step toward data system integration and interoperability. The goals of ISAIA were ambitious: '...To develop an interdisciplinary data location and integration service for space science. Building upon existing data services and communications protocols, this service will allow users to transparently query hundreds or thousands of WWW-based resources (catalogs, data, computational resources, bibliographic references, etc.) from a single interface. The service will collect responses from various resources and integrate them in a seamless fashion for display and manipulation by the user.' Funding was approved only for a one-year pilot study, a decision that in retrospect was wise given the rapid changes in information technology in the past few years and the emergence of the Virtual Observatory initiatives in the US and worldwide. Indeed, the ISAIA pilot study was influential in shaping the science goals, system design, metadata standards, and technology choices for the virtual observatory. The ISAIA pilot project also helped to cement working relationships among the NASA data centers, US ground-based observatories, and international data centers. The ISAIA project was formed as a collaborative effort between thirteen institutions that provided data to astronomers, space physicists, and planetary scientists. Among the fruits we ultimately hoped would come from this project would be a central site on the Web that any space scientist could use to efficiently locate existing data relevant to a particular scientific question. Furthermore, we hoped that the needed technology would be general enough to allow smaller, more-focused community within space science could use the same technologies and standards to provide more specialized services. A major challenge to searching

  2. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  3. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  4. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  5. Hippo Experiment Data Access and Subseting System

    Science.gov (United States)

    Krassovski, M.; Hook, L.; Boden, T.

    2014-12-01

    HIAPER Pole-to-Pole Observations (HIPPO) was an NSF- and NOAA-funded, multi-year global airborne research project to survey the latitudinal and vertical distribution of greenhouse and related gases, and aerosols. Project scientists and support staff flew five month-long missions over the Pacific Basin on the NSF/NCAR Gulfstream V, High-performance Instrumented Airborne Platform for Environmental Research (HIAPER) aircraft between January 2009 and September 2011, spread throughout the annual cycle, from the surface to 14 km in altitude, and from 87°N to 67°S. Data from the HIPPO study of greenhouse gases and aerosols are now available to the atmospheric research community and the public. This comprehensive dataset provides the first high-resolution vertically resolved measurements of over 90 unique atmospheric species from nearly pole-to-pole over the Pacific Ocean across all seasons. The suite of atmospheric trace gases and aerosols is pertinent to understanding the carbon cycle and challenging global climate models. This dataset will provide opportunities for research across a broad spectrum of Earth sciences, including those analyzing the evolution in time and space of the greenhouse gases that affect global climate. The Carbon Dioxide Information Analysis Center (CDIAC) at Oak Ridge National Laboratory (ORNL) provides data management support for the HIPPO experiment including long-term data storage and dissemination. CDIAC has developed a relational database to house HIPPO merged 10-second meteorology, atmospheric chemistry, and aerosol data. This data set provides measurements from all Missions, 1 through 5, that took place from January of 2009 to September 2011. This presentation introduces newly build database and web interface, reflects the present state and functionality of the HIPPO Database and Exploration System as well as future plans for expansion and inclusion of combined discrete flask and GC sample GHG, Halocarbon, and hydrocarbon data.

  6. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  7. Access to justice in the Convention on Rights system

    NARCIS (Netherlands)

    Gerards, J.H.; Glas, L.R.

    2017-01-01

    The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference

  8. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  9. Providing Access to Library Automation Systems for Students with Disabilities.

    Science.gov (United States)

    California Community Colleges, Sacramento. High-Tech Center for the Disabled.

    This document provides information on the integration of assistive computer technologies and library automation systems at California Community Colleges in order to ensure access for students with disabilities. Topics covered include planning, upgrading, purchasing, implementing and using these technologies with library systems. As information…

  10. Assessment of Deafblind Access to Manual Language Systems (ADAMLS)

    Science.gov (United States)

    Blaha, Robbie; Carlson, Brad

    2007-01-01

    This document presents the Assessment of Deafblind Access to Manual Language Systems (ADAMLS), a resource for educational teams who are responsible for developing appropriate adaptations and strategies for children who are deafblind who are candidates for learning manual language systems. The assessment tool should be used for all children with a…

  11. ‘Not My Child’: Parents’ Denial About Adolescent Sexuality in Harare, Zimbabwe

    Directory of Open Access Journals (Sweden)

    Manase Kudzai Chiweshe

    2018-03-01

    Full Text Available Objective: To find out adult views on adolescent sexualities in Zimbabwe and how adults construct sexual cultures that deny adolescence access to sex.Materials and methods: The paper uses qualitative methodologies, with purposively selected parents and key informants. A total of ten in depth interviews, four focus groups and six key informant interviews with purposively sampled male and female respondents were conducted. Key informants included a headmaster, teacher, social worker, nurses and a member of traditional healers association.Results: Parents that were interviewed denied that their adolescent children were sexually active. This denial of adolescent sexuality was seen throughout the interviews. The denial of adolescent sexuality was linked to the other themes that emerged including sexual surveillance and sexual communication, school pregnancy, STIs and sexual education, and adult anxiety on adolescent sex.Conclusion: The denial of youth sexuality has serious impacts on youths’ access to information and ability to protect themselves from sexually transmitted diseases and HIV. We argue that government policies and lack of comprehensive sex education in schools are based on this denial of adolescent sexuality and should be addressed.

  12. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  13. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  14. Contrast as denial in multi-dimensional semantics

    NARCIS (Netherlands)

    Spenader, Jennifer; Maier, Emar

    We argue that contrastive statements have the same underlying semantics and affect the context in the same way as denials. We substantiate this claim by giving a unified account of the two phenomena that treats contrast as a subtype of denial. We argue that earlier work on contrast-denial obscured

  15. Access Safety Systems – New Concepts from the LHC Experience

    CERN Document Server

    Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E

    2011-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...

  16. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  17. Access systems strategy in the accelerator complex and experimental areas

    International Nuclear Information System (INIS)

    Nunes, R.; Ninin, P.; Sanchez-Corral, E.; Ladzinski, T.

    2012-01-01

    This paper reviews the main features of the new PS Personnel Protection System (PSPSS) as well as the main milestones for its deployment during the Long Shutdown of 2013-2014. Access conditions in the PS, SPS and LHC complexes during this period shall be described as well as the upgrades and improvements that are under preparation. (authors)

  18. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  19. Towards ubiquitous access of computer-assisted surgery systems.

    Science.gov (United States)

    Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin

    2006-01-01

    Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.

  20. (Distributed) Denial-of-Service : deel 2

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2013-01-01

    Het geblokkeerd raken van een dienstverlening wordt in het Engels vaak aangeduid met de term Denial-of-Service (afkort: DoS). Al wordt de term veelal gebruikt in de cyberspace-omgeving, is deze feitelijk generieker, DoS kan zowel een technische oorzaak hebben, als bewust worden veroorzaakt door

  1. "LUDO" - Kids playing Distributed Denial of Service

    NARCIS (Netherlands)

    Steinberger, Jessica; Cardoso de Santanna, José Jair; Spatharas, E.; Amler, H.; Breuer, N.; Graul, K.; Kuhnert, B.; Piontek, U.; Sperotto, Anna; Baier, H.; Pras, Aiko; Bergström, Johan; Hórvath, Gyöngyi; Schofield, Brook

    2016-01-01

    Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services. GE̿ANT, the pan-European network with terabit capacities witnesses close to hundreds of DDoS attacks on a daily basis. The reason is that DDoS attacks are getting larger, more

  2. Inferring Internet Denial-of-Service Activity

    National Research Council Canada - National Science Library

    Moore, David

    2001-01-01

    .... During this period, we observe more than 2,000 attacks against more than 5,000 distinct targets, ranging from well known e-commerce companies such as Amazon and Hotmail to small foreign ISPs and dial-up connections. We believe that our work is the only publically available data quantifying denial-of-service activity in the Internet.

  3. Data denial experiments for extratropical transition

    Directory of Open Access Journals (Sweden)

    Doris Anwender

    2012-11-01

    Full Text Available Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF model are designed to investigate the value of targeted observations for historical extratropical transition (ET cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC environment is, on average, as important as denying data in mid-latitude sensitive regions determined using extratropical singular vectors (SV. The impact of data denial over TC regions propagates downstream from the Atlantic towards Europe, with a maximum degradation at day 4. This degradation is mainly attributed to the data denial at the TC stage, i.e. before ET is completed. When data are denied on mid-latitude sensitive regions, the largest degradation is found around day 2 and also after the day 4 forecast. In general, the loss of information content is larger when data are denied in mid-latitude sensitive areas because these identify dynamically active regions. In both denial experiments, aircraft and satellite radiance data are the most influential observations. For the selected case of Hurricane Irene, the largest degradations are found for forecasts initialised while Irene reached its peak intensity. If observations are denied in the near storm environment, the TC mostly disappears from the analysis and the subsequent forecast. This allows the impact of Irene on the formation of the downstream cut-off low to be investigated.

  4. Input-to-State Stabilizing Control Under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2015-01-01

    The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service (DoS) attacks, namely attacks that prevent transmissions over the network. We characterize frequency

  5. Does the public deserve free access to climate system science?

    Science.gov (United States)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  6. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  7. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  8. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  9. Denials and Delays of Radioactive Material Shipments

    International Nuclear Information System (INIS)

    El-Shinawy, R.M.K.

    2011-01-01

    delays of shipments of radioactive materials forms an important issue today. Radioactive materials need to be transported using all modes of transport for use in different applications such as public health, industry, research and production of nuclear power. The transport of radioactive materials is governed by national and international regulations, which are based on the International Atomic Energy Agency (IAEA) regulations for safe transport of radioactive materials (TS-R-1). These regulations ensure high standards of safety. Recently there were increasing numbers of instances of denials and delays of shipments of radioactive materials even when complying with the regulations. The denials and delays can result in difficulties to patients and others who rely on products sterilized by radiation. Therefore there is an urgent need for a universally accepted approach to solve this problem. In response, the IAEA has formed an International Steering Committee (ISC) on denials and delays of radioactive materials. Also, it designate the National Focal Points (NFP) representative to help the ISC members and the IAEA by informing about denial operations and how they can help. The Steering Committee developed and adopted an action plan which includes the action to be taken. This plan is based on: Awareness, Training, Communication, Lobbying for marketing, Economic and Harmonization among member states. It is important to work within the mandate of the ISC and in the line of action plan on denials and delays. It identified the following network members such as: National Focal Points, Regional Coordinators, National Committee, National Representative for different modes of transport and similar bodies, Carriers, Producers and Suppliers, Different civil societies, NGO's, Ministry of transport and others.

  10. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  11. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  12. Distributed magnetic field positioning system using code division multiple access

    Science.gov (United States)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  13. A Systems Approach for Ameliorating Possible Prima Facie Denial of Hispanic/Black Students' Rights Through Disproportionate Enrollment in Special Education.

    Science.gov (United States)

    McDonnell, James R.

    The paper discusses the issue of educational equity, principles of systems analysis, systems approaches in the educational milieu, the evaluation aspect of the systems approach, and application of the systems approach to preventing disproportionate enrollment of Hispanics and Blacks in special education classes in Holyoke, Massachusetts. The…

  14. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  15. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  16. Interactive water monitoring system accessible by cordless telephone

    Science.gov (United States)

    Volpicelli, Richard; Andeweg, Pierre; Hagar, William G.

    1985-12-01

    A battery-operated, microcomputer-controlled monitoring device linked with a cordless telephone has been developed for remote measurements. This environmental sensor is self-contained and collects and processes data according to the information sent to its on-board computer system. An RCA model 1805 microprocessor forms the basic controller with a program encoded in memory for data acquisition and analysis. Signals from analog sensing devices used to monitor the environment are converted into digital signals and stored in random access memory of the microcomputer. This remote sensing system is linked to the laboratory by means of a cordless telephone whose base unit is connected to regular telephone lines. This offshore sensing system is simply accessed by a phone call originating from a computer terminal in the laboratory. Data acquisition is initiated upon request: Information continues to be processed and stored until the computer is reprogrammed by another phone call request. Information obtained may be recalled by a phone call after the desired environmental measurements are finished or while they are in progress. Data sampling parameters may be reset at any time, including in the middle of a measurement cycle. The range of the system is limited only by existing telephone grid systems and by the transmission characteristics of the cordless phone used as a communications link. This use of a cordless telephone, coupled with the on-board computer system, may be applied to other field studies requiring data transfer between an on-site analytical system and the laboratory.

  17. First Experiences Using XACML for Access Control in Distributed Systems

    Science.gov (United States)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  18. A semi-automated vascular access system for preclinical models

    International Nuclear Information System (INIS)

    Berry-Pusey, B N; David, J; Taschereau, R; Silverman, R W; Williams, D; Ladno, W; Stout, D; Chatziioannou, A; Chang, Y C; Prince, S W; Chu, K; Tsao, T C

    2013-01-01

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. (paper)

  19. The Marley hypothesis: denial of racism reflects ignorance of history.

    Science.gov (United States)

    Nelson, Jessica C; Adams, Glenn; Salter, Phia S

    2013-02-01

    This study used a signal detection paradigm to explore the Marley hypothesis--that group differences in perception of racism reflect dominant-group denial of and ignorance about the extent of past racism. White American students from a midwestern university and Black American students from two historically Black universities completed surveys about their historical knowledge and perception of racism. Relative to Black participants, White participants perceived less racism in both isolated incidents and systemic manifestations of racism. They also performed worse on a measure of historical knowledge (i.e., they did not discriminate historical fact from fiction), and this group difference in historical knowledge mediated the differences in perception of racism. Racial identity relevance moderated group differences in perception of systemic manifestations of racism (but not isolated incidents), such that group differences were stronger among participants who scored higher on a measure of racial identity relevance. The results help illuminate the importance of epistemologies of ignorance: cultural-psychological tools that afford denial of and inaction about injustice.

  20. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Eles, Petru; Doboli, Alex; Pop, Paul

    2000-01-01

    of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have......In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow......, generates an efficient bus access scheme as well as the schedule tables for activation of processes and communications....

  1. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  2. Postmodernism, historical denial, and history education:

    Directory of Open Access Journals (Sweden)

    Robert John Parkes

    2015-12-01

    Full Text Available History educators frequently ignore, or engage only reluctantly and cautiously with postmodernism. This is arguably because postmodernism is frequently accused of assaulting the epistemological foundations of history as an academic discipline, fostering a climate of cultural relativism, encouraging the proliferation of revisionist histories, and providing fertile ground for historical denial. In the Philosophy of History discipline, Frank Ankersmit has become one of those scholars most closely associated with ‘postmodern history’. This paper explores Ankersmit’s ‘postmodern’ philosophy of history, particularly his key notion of ‘narrative substances’; what it might do for our approach to a problem such as historical denial; and what possibilities it presents for history didactics.

  3. A Comprehensive System for Monitoring Urban Accessibility in Smart Cities.

    Science.gov (United States)

    Mora, Higinio; Gilart-Iglesias, Virgilio; Pérez-Del Hoyo, Raquel; Andújar-Montoya, María Dolores

    2017-08-09

    The present work discusses the possibilities offered by the evolution of Information and Communication Technologies with the aim of designing a system to dynamically obtain knowledge of accessibility issues in urban environments. This system is facilitated by technology to analyse the urban user experience and movement accessibility, which enabling accurate identification of urban barriers and monitoring its effectiveness over time. Therefore, the main purpose of the system is to meet the real needs and requirements of people with movement disabilities. The information obtained can be provided as a support service for decision-making to be used by city government, institutions, researchers, professionals and other individuals of society in general to improve the liveability and quality of the lives of citizens. The proposed system is a means of social awareness that makes the most vulnerable groups of citizens visible by involving them as active participants. To perform and implement the system, the latest communication and positioning technologies for smart sensing have been used, as well as the cloud computing paradigm. Finally, to validate the proposal, a case study has been presented using the university environment as a pre-deployment step in urban environments.

  4. Data denial experiments for extratropical transition

    OpenAIRE

    Anwender, Doris; Cardinali, Carla; Jones, Sarah C.

    2012-01-01

    Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF) model are designed to investigate the value of targeted observations for historical extratropical transition (ET) cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC) environment is, on average, as important as denying data in mid-latitude sensitive...

  5. A Rewritable, Random-Access DNA-Based Storage System.

    Science.gov (United States)

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  6. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  7. Administrative and clinical denials by a large dental insurance provider

    Directory of Open Access Journals (Sweden)

    Geraldo Elias MIRANDA

    2015-01-01

    Full Text Available The objective of this study was to assess the prevalence and the type of claim denials (administrative, clinical or both made by a large dental insurance plan. This was a cross-sectional, observational study, which retrospectively collected data from the claims and denial reports of a dental insurance company. The sample consisted of the payment claims submitted by network dentists, based on their procedure reports, reviewed in the third trimester of 2012. The denials were classified and grouped into ‘administrative’, ‘clinical’ or ‘both’. The data were tabulated and submitted to uni- and bivariate analyses. The confidence intervals were 95% and the level of significance was set at 5%. The overall frequency of denials was 8.2% of the total number of procedures performed. The frequency of administrative denials was 72.88%, whereas that of technical denials was 25.95% and that of both, 1.17% (p < 0.05. It was concluded that the overall prevalence of denials in the studied sample was low. Administrative denials were the most prevalent. This type of denial could be reduced if all dental insurance providers had unified clinical and administrative protocols, and if dentists submitted all of the required documentation in accordance with these protocols.

  8. Skepticism and Denial: Drawing a line

    Science.gov (United States)

    Byrne, J. M.; Brown, M. B.; Peacock, K.

    2016-12-01

    Climate denialism is distinct from a merely skeptical attitude towards generally accepted views in climate science. But drawing the line between them takes care—there are similarities between skepticism and denial, including a shared reluctance to accept conclusions that nearly all qualified scientists take to be well-justified. Here we will explore both how to draw the line, and how to effectively communicate the differences between denial and skepticism. Identifying which of these two terms best describes someone's attitude turns on whether they reject a generally accepted view based on a `high threshold' for acceptance of conclusions in general, or from a preference that the conclusion in question be false. In most cases, denialism manifests in disregard and mistreatment of evidence, including selective quotation, credulous endorsement of bad sources and incredulous rejection of good sources. Historically, current accepted views became dominant as alternatives were excluded and arguments supporting current views accumulated. The accumulated record of evidence and successful application of those views sets a high bar for proposed alternatives to them. Pure skeptics may refuse to endorse generally accepted views without rejecting or distorting the strong evidence for those views, and typically support policy responses based on the implications of that evidence. But deniers who reject scientific conclusions reject the evidence for those views while endorsing views that a true skeptic would regard as less plausible and well-supported than the accepted views. Thus motivated cognition is the key to defining denial. Pascal's famous argument for belief in God illustrates the problem: even assuming God's existence to be extremely improbable, the expected value of believing is far higher than the expected value of disbelieving. But Pascal's argument undermines its own methodology: without reasons to rely on beliefs as reliable guides to successful action, cost

  9. Remotely Sensed Land Imagery and Access Systems: USGS Updates

    Science.gov (United States)

    Lamb, R.; Pieschke, R.; Lemig, K.

    2017-12-01

    The U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center has implemented a number of updates to its suite of remotely sensed products and distribution systems. These changes will greatly expand the availability, accessibility, and usability of the image products from USGS. As of late 2017, several new datasets are available for public download at no charge from USGS/EROS Center. These products include Multispectral Instrument (MSI) Level-1C data from the Sentinel-2B satellite, which was launched in March 2017. Along with Sentinel-2A, the Sentinel-2B images are now being distributed through USGS systems as part of a collaborative effort with the European Space Agency (ESA). The Sentinel-2 imagery is highly complementary to multispectral data collected by the USGS Landsat 7 and 8 satellites. With these two missions operating together, the potential local revisit rate can be reduced to 2-4 days. Another product addition is Resourcesat-2 data acquired over the United States by the Indian Space Research Organisation (ISRO). The Resourcesat-2 products from USGS consist of Advanced Wide Field Sensor (AWiFS) and Linear Imaging Self-Scanning Sensor Three (LISS-3) images acquired August 2016 to present. In an effort to maximize future Landsat data interoperability, including time series analysis of the 45+ year archive, the reprocessing of Collection 1 for all historical Landsat Level 1 products is nearly complete. The USGS is now working on operational release of higher-level science products to support analysis of the Landsat archive at the pixel level. Major upgrades were also completed in 2017 for several USGS data discovery and access systems, including the LandsatLook Viewer (https://landsatlook.usgs.gov/) and GloVis Tool (https://glovis.usgs.gov/). Other options are now being developed to further enhance data access and overall user experience. These future options will be discussed and community feedback will be encouraged.

  10. Electrical impedance tomography system: an open access circuit design

    Directory of Open Access Journals (Sweden)

    Soleimani Manuchehr

    2006-05-01

    Full Text Available Abstract Background This paper reports a simple 2-D system for electrical impedance tomography EIT, which works efficiently and is low cost. The system has been developed in the Sharif University of Technology Tehran-Iran (for the author's MSc Project. Methods The EIT system consists of a PC in which an I/O card is installed with an external current generator, a multiplexer, a power supply and a phantom with an array of electrodes. The measurement system provides 12-bit accuracy and hence, suitable data acquisition software has been prepared accordingly. The synchronous phase detection method has been implemented for voltage measurement. Different methods of image reconstruction have been used with this instrument to generate electrical conductivity images. Results The results of simulation and real measurement of the system are presented. The reconstruction programs were written in MATLAB and the data acquisition software in C++. The system has been tested with both static and dynamic mode in a 2-D domain. Better results have been produced in the dynamic mode of operation, due to the cancellation of errors. Conclusion In the spirit of open access publication the design details of this simple EIT system are made available here.

  11. Predictors of appendiceal perforation in an equal access system.

    Science.gov (United States)

    Walker, Avery; Hatch, Quinton; Drake, Thurston; Nelson, Daniel W; Fitzpatrick, Emilie; Bingham, Jason; Black, George; Maykel, Justin A; Steele, Scott R

    2014-07-01

    Discrepancies in socioeconomic factors have been associated with higher rates of perforated appendicitis. As an equal-access health care system theoretically removes these barriers, we aimed to determine if remaining differences in demographics, education, and pay result in disparate outcomes in the rate of perforated appendicitis. All patients undergoing appendectomy for acute appendicitis (November 2004-October 2009) at a tertiary care equal access institution were categorized by demographics and perioperative data. Rank of the sponsor was used as a surrogate for economic status. A multivariate logistic regression model was performed to determine patient and clinical characteristics associated with perforated appendicitis. A total of 680 patients (mean age 30±16 y; 37% female) were included. The majority were Caucasian (56.4% [n=384]; African Americans 5.6% [n=38]; Asians 1.9% [n=13]; and other 48.9% [n=245]) and enlisted (87.2%). Overall, 6.4% presented with perforation, with rates of 6.6%, 5.8%, and 6.7% (P=0.96) for officers, enlisted soldiers, and contractors, respectively. There was no difference in perforation when stratified by junior or senior status for either officers or enlisted (9.3% junior versus 4.40% senior officers, P=0.273; 6.60% junior versus 5.50% senior enlisted, P=0.369). On multivariate analysis, parameters such as leukocytosis and temperature, as well as race and rank were not associated with perforation (P=0.7). Only age had a correlation, with individuals aged 66-75 y having higher perforation rates (odds ratio, 1.04; 95% confidence interval, 1.02-1.05; P<0.001). In an equal-access health care system, older age, not socioeconomic factors, correlated with increased appendiceal perforation rates. Published by Elsevier Inc.

  12. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  13. Delay and Denial of Shipment

    International Nuclear Information System (INIS)

    Wright, T. de; Gray, P.; Sobriera, A.C.F.; Xavier, C.C.; Schwela, U.

    2016-01-01

    Despite the strong safety and security record for shipments of Radioactive Material (RAM), Class 7 goods, transportation often continues to provide challenges as many carriers and ports (air and sea) choose not to engage in RAM product transportation. This paper discusses factors impacting the availability of regular air and sea transport routes for RAM, including: negative perception about radiation due to a lack of awareness and information about the industry; concerns about the cost and extent of training required of those who handle radioactive materials; multiplicity and diversity of regulations governing the handling, use and transport of these products; lack of harmonisation between governments in applying international regulations; and, a lack of outreach and public awareness about the needs and applications of radioactive materials. The particular issues involved in sea transport of: relatively small trade volumes; additional requirements or bans on port access, both for transit and trans-shipment; and scheduling difficulties due to commercial carrier routing decisions are also discussed. Initiatives being taken internationally, regionally and nationally to overcome these issues and examples of success are described. (author)

  14. Introduction to the Personal Access Satellite System Study

    Science.gov (United States)

    Sue, Miles K.

    1990-01-01

    A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.

  15. ECONOMIC DENIAL OF SUSTAINABILITY (EDOS ATTACK ON CLOUD – A SURVEY

    Directory of Open Access Journals (Sweden)

    A. Somasundaram

    2016-12-01

    Full Text Available Cloud computing is a promising technology aims to provide reliable, customized and quality of service computation environments for cloud users in terms of Software as a Service-SaaS , Plat- form as a Service-PaaS and Infrastructure as Service-IaaS, which is provided on the pay per use basis. Cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service level agreement (SLA of customer. However, due to elasticity of resources, cloud systems are facing severe security problems. One of the most serious threats to cloud computing is EDoS (economic Distributed Denial of Service aims to consume the cloud resource by attacker and impose financial burden to the legitimate user, where integrity, availability and confidentiality of the cloud services are never compromised but affects the accountability which leads to inaccurate billing. Since the billing models of cloud services may not be mature enough to properly account for an EDoS attack. These paper surveys, the different techniques that generate, detect and mitigate the EDoS Attack on Cloud.

  16. Distributed Denial of Service Detection with IPFIX Protocol

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-03-01

    Full Text Available In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed. Authors suggest to use a method of maximum entropy estimation for the analysis of IPFIX data and propose an approach for detecting Distributed Denial of Service attacks.

  17. 7 CFR 205.405 - Denial of certification.

    Science.gov (United States)

    2010-01-01

    ... PROVISIONS NATIONAL ORGANIC PROGRAM Certification § 205.405 Denial of certification. (a) When the certifying... organic program. (e) An applicant for certification who has received a written notification of... 7 Agriculture 3 2010-01-01 2010-01-01 false Denial of certification. 205.405 Section 205.405...

  18. 45 CFR 5.34 - Appeal of denials.

    Science.gov (United States)

    2010-10-01

    ... Release and Denial of Records § 5.34 Appeal of denials. (a) Right of appeal. You have the right to appeal... reasons why you believe that the FOIA exemption(s) we cited do not apply to the records that you requested... designated review official will consult with the General Counsel to ensure that the rights and interests of...

  19. Denials of Racism in Canadian English Language Textbooks

    Science.gov (United States)

    Gulliver, Trevor; Thurrell, Kristy

    2016-01-01

    This critical discourse analysis examines denials of racism in descriptions of Canada and Canadians from English language textbooks. Denials of racism often accompany racist and nationalist discourse, preempting observations of racism. The study finds that in representations of Canada or Canadians, English language texts minimize and downplay…

  20. Assessing the impact of a medical image access system

    Science.gov (United States)

    McNeill, Kevin M.; Maloney, Kris; Parra, Miguel V.; Ovitt, Theron W.; Dallas, William J.

    1994-05-01

    We have developed and installed a Medical Image Access System in an intensive care unit. Images are acquired and transmitted automatically to this system, thus expanding on the previous results of Shile et. al. It is our goal to determine what effect regular, sustained availability of image data in the clinic has on the Intensive Care Unit and the Department of Radiology. Our system is installed and has been in regular use in the hospital since late August of 1993. Since the time of installation we have been collecting usage information from both the manual and automated systems. From this data we are performing the standard measures established by DeSimone et. al. Our initial results support the original findings that image availability in the clinic leads to earlier patient care decision based on the image data. However, our findings do not seem to indicate that there is a breakdown of communication between the clinician and the radiologist as a result of the use of the clinical display system. In addition to the established measure we are investigating other criteria to measure time saved by both the clinician and radiologist. The results are reported in this paper.

  1. Access Contested: Security, Identity, and Resistance in Asian ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-30

    Sep 30, 2011 ... Book cover Access Contested: Security, Identity, and Resistance in Asian ... examines the interplay of national security, social and ethnic identity, and ... Burmese media, and distributed-denial-of-service attacks and other ...

  2. Access to Urban Land and its Role in Enhancing Business ...

    African Journals Online (AJOL)

    EN_Stebek

    Project Services/Ministry of Lands, Housing and Urban Development, Government of. Uganda. ..... This objective reality renders the subjective denial of market .... income distribution” thereby making it “difficult to achieve equity in access to.

  3. Denial of Service Prevention for 5G

    DEFF Research Database (Denmark)

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology...

  4. Title III Evaluation Report for the Access Road System

    International Nuclear Information System (INIS)

    H.R. Montalvo

    1998-01-01

    The objective of this evaluation is to provide recommendations to ensure consistency between the technical baseline requirements, baseline design, and the as-constructed Access Roads. Recommendations for resolving discrepancies between the as-constructed system, the technical baseline requirements, and the baseline design are included in this report. Cost and Schedule estimates are provided for all recommended modifications. This report does not address items which do not meet current safety or code requirements. These items are identified to the CMO and immediate action is taken to correct the situation. The report does identify safety and code items for which the A/E is recommending improvements. The recommended improvements will exceed the minimum requirements of applicable code and safety guide lines. These recommendations are intended to improve and enhance the operation and maintenance of the facility

  5. Welcome to Systems — A New Interdisciplinary Open Access Journal for Systems Science and Engineering

    Directory of Open Access Journals (Sweden)

    Thomas Huynh

    2012-04-01

    Full Text Available Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies. Understanding of natural systems is essential to the survival of the human species, which is intertwined with the survival of other species on earth. Having the knowledge and ability to build human-made systems is critical to the employment of systems that effectively serve the needs of their users. To gain such understanding and to acquire such knowledge and ability, it is necessary that cutting-edge research in systems science, systems engineering, and systems-related fields continue. This open access journal aims to achieve quick and global dissemination of results of such research. [...

  6. The denial of cancer interview: development and first assessment of psychometric properties in lung cancer patients

    NARCIS (Netherlands)

    Vos, Martina S.; Putter, Hein; Leurs, Amber; Rooijmans, Harry G. M.; de Haes, Hanneke C. J. M.; van Houwelingen, Hans C.

    2007-01-01

    Based on Weissman and Hackett's comprehensive definition of denial, a semi-structured interview was developed to measure denial in cancer patients. The denial in cancer interview (DCI) covers both the patients' recount of their illness experience and the expert's impression of the level of denial in

  7. NuDat system for access to nuclear data

    International Nuclear Information System (INIS)

    Dunford, C.L.; Kinsey, R.R.

    1998-01-01

    The NuDat program provides a user with access to nuclear properties and to some nuclear reaction data. The program operates on DEC VMS operating systems and on PC's with Microsoft operating systems. The program has four user interfaces, all having the same content and functionality. These interfaces are Web, Video and Sequential for VMS. The PC interface is identical to the VMS Video interface. Forms are used to supply the type of data the user desires, the retrieval parameters, the output format, and the sort order of the data. The program and associated database is used in basic research, particularly for the systematic study of nuclear properties. It is also a useful tool for applied research to identify radiations from radionuclides contained in environmental samples, or from those produced by neutron or charged particle activation. The NuDat database is derived from several databases maintained by the National Nuclear Data Center. The databases are the Adopted Levels and Gammas data sets from ENSDF, the Nuclear Wallet Cards, Decay Radiations derived from ENSDF decay data sets processed by RADLIST, and Thermal Neutron Cross Sections

  8. A system for success: BMC Systems Biology, a new open access journal

    OpenAIRE

    Webb Penelope A; Hodgkinson Matt J

    2007-01-01

    Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  9. A system for success: BMC Systems Biology, a new open access journal.

    Science.gov (United States)

    Hodgkinson, Matt J; Webb, Penelope A

    2007-09-04

    BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  10. Science and the Public: Debate, Denial, and Skepticism

    Directory of Open Access Journals (Sweden)

    Stephan Lewandowsky

    2016-08-01

    Full Text Available When the scientific method yields discoveries that imperil people’s lifestyle or worldviews or impinge on corporate vested interests, the public and political response can be anything but favorable. Sometimes the response slides into overt denial of scientific facts, although this denial is often claimed to involve “skepticism”. We outline the distinction between true skepticism and denial with several case studies. We propose some guidelines to enable researchers to differentiate legitimate critical engagement from bad-faith harassment, and to enable members of the public to pursue their skeptical engagement and critique without such engagement being mistaken for harassment.

  11. Tinamit: Making coupled system dynamics models accessible to stakeholders

    Science.gov (United States)

    Malard, Julien; Inam Baig, Azhar; Rojas Díaz, Marcela; Hassanzadeh, Elmira; Adamowski, Jan; Tuy, Héctor; Melgar-Quiñonez, Hugo

    2017-04-01

    Model coupling is increasingly used as a method of combining the best of two models when representing socio-environmental systems, though barriers to successful model adoption by stakeholders are particularly present with the use of coupled models, due to their high complexity and typically low implementation flexibility. Coupled system dynamics - physically-based modelling is a promising method to improve stakeholder participation in environmental modelling while retaining a high level of complexity for physical process representation, as the system dynamics components are readily understandable and can be built by stakeholders themselves. However, this method is not without limitations in practice, including 1) inflexible and complicated coupling methods, 2) difficult model maintenance after the end of the project, and 3) a wide variety of end-user cultures and languages. We have developed the open-source Python-language software tool Tinamit to overcome some of these limitations to the adoption of stakeholder-based coupled system dynamics - physically-based modelling. The software is unique in 1) its inclusion of both a graphical user interface (GUI) and a library of available commands (API) that allow users with little or no coding abilities to rapidly, effectively, and flexibly couple models, 2) its multilingual support for the GUI, allowing users to couple models in their preferred language (and to add new languages as necessary for their community work), and 3) its modular structure allowing for very easy model coupling and modification without the direct use of code, and to which programming-savvy users can easily add support for new types of physically-based models. We discuss how the use of Tinamit for model coupling can greatly increase the accessibility of coupled models to stakeholders, using an example of a stakeholder-built system dynamics model of soil salinity issues in Pakistan coupled with the physically-based soil salinity and water flow model

  12. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  13. NUDAT. System for access to nuclear data. Summary description

    International Nuclear Information System (INIS)

    Dunford, C.L.; Kinsey, R.R.

    1998-01-01

    The NUDAT program with its associated database provides access to nuclear properties and some nuclear reaction data. The program has interfaces for WWW, Telnet online access, and PC. The database contains the following information: level and gamma-ray adopted properties from ENSDF; nuclear ground and metastable state properties; radioactive decay radiations from ENSDF; thermal neutron cross sections and resonance integrals as published in 'Neutron Cross Sections', Vol. 1. The online version is accessible through the IAEA's WWW site or through the Telnet online service NDIS, the PC version is available by FTP or on CD-ROM. (author)

  14. 33 CFR 135.223 - Certificates, denial or revocation.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Financial Responsibility for Offshore Facilities § 135.223 Certificates, denial or revocation... false statement to the Fund Administrator in connection with establishing or maintaining evidence of...

  15. From System Expansion to System Contraction: Access to Higher Education in Poland

    Science.gov (United States)

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  16. Average opportunity-based accessibility of public transit systems to grocery stores in small urban areas

    Directory of Open Access Journals (Sweden)

    Nimish Dharmadhikari

    2015-12-01

    Full Text Available This research studies the accessibility of grocery stores to university students using the public transportation system, drawing from a case study of Fargo, North Dakota. Taking into consideration the combined travel time components of walking, riding, and waiting, this study measures two types of accessibilities: accessibility to reach a particular place and accessibility to reach the bus stop to ride the public transit system. These two accessibilities are interdependent and cannot perform without each other. A new method to calculate the average accessibility measure for the transit routes is proposed. A step-wise case study analysis indicates that one route provides accessibility to a grocery store in eight minutes. This also suggests that the North Dakota State University area has moderate accessibility to grocery stores.

  17. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  18. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  19. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  20. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  1. Deaf women: experiences and perceptions of healthcare system access.

    Science.gov (United States)

    Steinberg, Annie G; Wiggins, Erin A; Barmada, Carlin Henry; Sullivan, Vicki Joy

    2002-10-01

    The authors investigated the knowledge, attitudes, and healthcare experiences of Deaf women. Interviews with 45 deaf women who participated in focus groups in American Sign Language were translated, transcribed, and analyzed. Deaf women's understanding of women's health issues, knowledge of health vocabulary in both English and American Sign Language, common health concerns among Deaf women, and issues of access to information, including pathways and barriers, were examined. As a qualitative study, the results of this investigation are limited and should be viewed as exploratory. A lack of health knowledge was evident, including little understanding of the meaning or value of cancer screening, mammography, or Pap smears; purposes of prescribed medications, such as hormone replacement therapy (HRT); or necessity for other medical or surgical interventions. Negative experiences and avoidance or nonuse of health services were reported, largely due to the lack of a common language with healthcare providers. Insensitive behaviors were also described. Positive experiences and increased access to health information were reported with practitioners who used qualified interpreters. Providers who demonstrated minimal signing skills, a willingness to use paper and pen, and sensitivity to improving communication were appreciated. Deaf women have unique cultural and linguistic issues that affect healthcare experiences. Improved access to health information may be achieved with specialized resource materials, improved prevention and targeted intervention strategies, and self-advocacy skills development. Healthcare providers must be trained to become more effective communicators with Deaf patients and to use qualified interpreters to assure access to healthcare for Deaf women.

  2. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  3. Apartheid and healthcare access for paediatric systemic lupus ...

    African Journals Online (AJOL)

    and children with SLE in Africa are potentially at high risk for poor outcomes based on race ... coloured people.*[6,9] Through a ... areas are least likely to have access to a private car, yet may not have emergency .... High tra c accident mortality.

  4. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  5. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    OpenAIRE

    Elena Verdú; Cristina Pelayo G-Bustelo; Ángeles Martínez Sánchez; Rubén Gonzalez-Crespo

    2017-01-01

    Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to Sign Writing, a way of writing Sign Language. This system extends the functionality of a general we...

  6. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  7. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  8. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  9. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  10. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    NARCIS (Netherlands)

    Koonen, A.M.J.; Popov, M.; Wessing, H.

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy

  11. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  12. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  13. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  14. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright... nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological... the final rule governing exemption to prohibition on circumvention of copyright protection systems for...

  15. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  16. Development of Patient Status-Based Dynamic Access System for Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Chang Won Jeong

    2015-06-01

    Full Text Available Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard. This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.

  17. Denials of Shipments for Radioactive Material - Indian Perspective

    International Nuclear Information System (INIS)

    Singh, Khaidem Ranjankumar; Hussain, S.A; Panda, G.K.; Singh, T. Dewan; Dinakaran, M.C.

    2016-01-01

    Radioactive material (RAM) needs to be transported for use in public health and industry and for production of nuclear power. In India, transport of RAM is governed by national and international regulations which are based on the IAEA Regulations for the safe transport of RAM. However, recently there were increasing numbers of instances of denials and delays of shipment of RAM, reported by many countries worldwide including India, despite compliance with regulations. In Indian experience, the reasons for denials of shipment of RAM by the carriers are varied in nature. From the feedback received from the participants (airport operators, airlines, courier and cargo service providers, cargo forwarding agents, port authorities and sea carriers) of awareness programmes on safe transport of RAM conducted from year 2008 onwards by Atomic Energy Regulatory Board (AERB) it became clear that the denials of shipments in India are mainly due to (1) perception of unnecessary fear for transport of RAM (2) lack of confidence and awareness on the procedures for acceptance of shipment of RAM (3) fear of risk during accidents with packages containing RAM (4) policy of the carriers not to accept consignment of dangerous goods (5) poor infrastructure at the major/transit ports (6) problems of transshipments and (7) shippers not having undergone dangerous goods training. In this paper, the Indian experience in dealing with the problems of denial/delay of shipments containing radioactive material and identified possible consequences of such denials including economical impact are discussed in detail. (author)

  18. Climate Change Denial Books and Conservative Think Tanks

    Science.gov (United States)

    Jacques, Peter J.

    2013-01-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites. PMID:24098056

  19. Delays by people living with HIV/AIDS in accessing antiretroviral ...

    African Journals Online (AJOL)

    Objective: To understand, by qualitative enquiry, the underlying reasons and narratives ... denial, practical clinic constraints and appropriate types of health education. Keywords: qualitative research, delays, access, antiretroviral drugs, ARVs ...

  20. H1DS: A new web-based data access system

    Energy Technology Data Exchange (ETDEWEB)

    Pretty, D.G., E-mail: david.pretty@anu.edu.au; Blackwell, B.D.

    2014-05-15

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems.

  1. H1DS: A new web-based data access system

    International Nuclear Information System (INIS)

    Pretty, D.G.; Blackwell, B.D.

    2014-01-01

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  2. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  3. Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Kim, Tai-Hoon

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  4. A portable marine geophysical data access and management system

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.; Narvekar, P.

    Geophysical Oracle Database Management System (GPODMS) that is residing on UNIX True 64 Compaq Alpha server. GPODMS is a stable Oracle database system for longterm storage and systematic management of geophysical data and information of various disciplines...

  5. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  6. 2 CFR 2424.1125 - How does a limited denial of participation start?

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false How does a limited denial of participation start? 2424.1125 Section 2424.1125 Grants and Agreements Federal Agency Regulations for Grants and... of Participation § 2424.1125 How does a limited denial of participation start? A limited denial of...

  7. 22 CFR 51.61 - Denial of passports to certain convicted drug traffickers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Denial of passports to certain convicted drug... Denial, Revocation, and Restriction of Passports § 51.61 Denial of passports to certain convicted drug... felony conviction for a Federal or state drug offense, if the individual used a U.S. passport or...

  8. Denial of impending death: a discourse analysis of the palliative care literature.

    Science.gov (United States)

    Zimmermann, Camilla

    2004-10-01

    Terminally ill patients and their families are often referred to as being "in denial" of impending death. This study uses the qualitative method of discourse analysis to investigate the usage of the term "denial" in the contemporary hospice and palliative care literature. A Medline search (1970-2001) was performed combining the text words "deny" and "denial" with the subject headings "terminal care", "palliative care" and "hospice care," and restricted to English articles discussing death denial in adults. The 30 articles were analysed using a constant comparison technique and emerging themes regarding the meaning and usage of the words "deny" and "denial" identified. This paper focusses on the theme of denial as an individual psychological process. Three dominant subthemes were distinguished: denial as an unconscious "defence mechanism", denial as "healthy" and denial as temporary. The analysis focusses on the intertextuality of these themes with each other and with previous texts on the denial of death. Elements of the psychoanalytic definition of denial as an unconscious defence mechanism are retained in the literature but are interwoven with new themes on patient choice. The result is an overall discourse that is conflictual and at times self-contradictory but overall consistent with the biomedical model of illness. I suggest that the representation of death denial elaborated in these articles may be related to a larger discourse on dying in contemporary Western society, which both invites patients to participate in the planning of their death and labels those who do not comply.

  9. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-05] Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  10. Evaluation on the Occupational Information Access System as Used at Churchill High School. A Project Report.

    Science.gov (United States)

    McKinlay, Bruce; Adams, Daniel

    The Occupational Information Access System (OIAS) improves the accessibility of occupational labor market information for career planning. Its operation at Churchill High School is evaluated from several angels: the likes and dislikes of users; the effect of OIAS on users' knowledge of occupational information and on their career plans; why other…

  11. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  12. ATLAS, an integrated structural analysis and design system. Volume 4: Random access file catalog

    Science.gov (United States)

    Gray, F. P., Jr. (Editor)

    1979-01-01

    A complete catalog is presented for the random access files used by the ATLAS integrated structural analysis and design system. ATLAS consists of several technical computation modules which output data matrices to corresponding random access file. A description of the matrices written on these files is contained herein.

  13. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    Directory of Open Access Journals (Sweden)

    Elena Verdú

    2017-12-01

    Full Text Available Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to SignWriting, a way of writing Sign Language. This system extends the functionality of a general web platform that can provide accessible web content for different needs. This platform has a core component that automatically converts any web page to a web page compliant with level AA of WAI guidelines. Around this core component, different adapters complete the conversion according to the needs of specific users. One adapter is the Deaf People Accessibility Adapter, which provides accessible web content for the Deaf, based on SignWritting. Functionality of this adapter has been extended with the video subtitle translator system. A first prototype of this system has been tested through different methods including usability and accessibility tests and results show that this tool can enhance the accessibility of video content available on the Web for Deaf people.

  14. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  15. TECHNOLOGY FOR ADMINISTERING OF THE ACCESS TO INFORMATION RESOURCES IN MANAGEMENT SYSTEM ON THE AVIATION ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Andrey V. Degtyarev

    2015-01-01

    Full Text Available The task of administering software-information complex occurs duringthe development of application systems for managing business-processes and is connected with the organization of access forusers to information resources in conditions of multi-user information systems for management. For solution of this problem proposed theapproach, which is based on a hierarchical system of access rightsto information resources on the levels: tool, object and procedural.Keywords: software-information complex, information resources,administering, permissions, separation of powers, access model.

  16. Systemic barriers accessing HIV treatment among people who inject drugs in Russia: a qualitative study.

    Science.gov (United States)

    Sarang, Anya; Rhodes, Tim; Sheon, Nicolas

    2013-10-01

    Achieving 'universal access' to antiretroviral HIV treatment (ART) in lower income and transitional settings is a global target. Yet, access to ART is shaped by local social condition and is by no means universal. Qualitative studies are ideally suited to describing how access to ART is socially situated. We explored systemic barriers to accessing ART among people who inject drugs (PWID) in a Russian city (Ekaterinburg) with a large burden of HIV treatment demand. We undertook 42 in-depth qualitative interviews with people living with HIV with current or recent experience of injecting drug use. Accounts were analysed thematically, and supplemented here with an illustrative case study. Three core themes were identified: 'labyrinthine bureaucracy' governing access to ART; a 'system Catch 22' created by an expectation that access to ART was conditional upon treated drug use in a setting of limited drug treatment opportunity; and 'system verticalization', where a lack of integration across HIV, tuberculosis (TB) and drug treatment compromised access to ART. Taken together, we find that systemic factors play a key role in shaping access to ART with the potential adverse effects of reproducing treatment initiation delay and disengagement from treatment. We argue that meso-level systemic factors affecting access to ART for PWID interact with wider macro-level structural forces, including those related to drug treatment policy and the social marginalization of PWID. We note the urgent need for systemic and structural changes to improve access to ART for PWID in this setting, including to simplify bureaucratic procedures, foster integrated HIV, TB and drug treatment services, and advocate for drug treatment policy reform.

  17. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail ...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  18. Archiving and access systems for remote sensing: Chapter 6

    Science.gov (United States)

    Faundeen, John L.; Percivall, George; Baros, Shirley; Baumann, Peter; Becker, Peter H.; Behnke, J.; Benedict, Karl; Colaiacomo, Lucio; Di, Liping; Doescher, Chris; Dominguez, J.; Edberg, Roger; Ferguson, Mark; Foreman, Stephen; Giaretta, David; Hutchison, Vivian; Ip, Alex; James, N.L.; Khalsa, Siri Jodha S.; Lazorchak, B.; Lewis, Adam; Li, Fuqin; Lymburner, Leo; Lynnes, C.S.; Martens, Matt; Melrose, Rachel; Morris, Steve; Mueller, Norman; Navale, Vivek; Navulur, Kumar; Newman, D.J.; Oliver, Simon; Purss, Matthew; Ramapriyan, H.K.; Rew, Russ; Rosen, Michael; Savickas, John; Sixsmith, Joshua; Sohre, Tom; Thau, David; Uhlir, Paul; Wang, Lan-Wei; Young, Jeff

    2016-01-01

    Focuses on major developments inaugurated by the Committee on Earth Observation Satellites, the Group on Earth Observations System of Systems, and the International Council for Science World Data System at the global level; initiatives at national levels to create data centers (e.g. the National Aeronautics and Space Administration (NASA) Distributed Active Archive Centers and other international space agency counterparts), and non-government systems (e.g. Center for International Earth Science Information Network). Other major elements focus on emerging tool sets, requirements for metadata, data storage and refresh methods, the rise of cloud computing, and questions about what and how much data should be saved. The sub-sections of the chapter address topics relevant to the science, engineering and standards used for state-of-the-art operational and experimental systems.

  19. Transplant recipients are vulnerable to coverage denial under Medicare Part D.

    Science.gov (United States)

    Potter, Lisa M; Maldonado, Angela Q; Lentine, Krista L; Schnitzler, Mark A; Zhang, Zidong; Hess, Gregory P; Garrity, Edward; Kasiske, Bertram L; Axelrod, David A

    2018-02-15

    Transplant immunosuppressants are often used off-label because of insufficient randomized prospective trial data to achieve organ-specific US Food and Drug Administration (FDA) approval. Transplant recipients who rely on Medicare Part D for immunosuppressant drug coverage are vulnerable to coverage denial for off-label prescriptions, unless use is supported by Centers for Medicare & Medicaid Services (CMS)-approved compendia. An integrated dataset including national transplant registry data and 3 years of dispensed pharmacy records was used to identify the prevalence of immunosuppression use that is both off-label and not supported by CMS-approved compendia. Numbers of potentially vulnerable transplant recipients were identified. Off-label and off-compendia immunosuppression regimens are frequently prescribed (3-year mean: lung 66.5%, intestine 34.2%, pancreas 33.4%, heart 21.8%, liver 16.5%, kidney 0%). The annual retail cost of these at-risk medications exceeds $30 million. This population-based study of transplant immunosuppressants vulnerable to claim denials under Medicare Part D coverage demonstrates a substantial gap between clinical practice, current FDA approval processes, and policy mandates for pharmaceutical coverage. This coverage barrier reduces access to life-saving medications for patients without alternative resources and may increase the risk of graft loss and death from medication nonadherence. © 2018 The American Society of Transplantation and the American Society of Transplant Surgeons.

  20. Access control system in Hamaoka Nuclear Power Station

    International Nuclear Information System (INIS)

    Kaneda, Hisashi; Shimura, Shigetaka; Suzuki, Katsuhiko; Kitazawa, Toshiichi

    1983-01-01

    The new computerized system has introduced to improve function of radiation protection for those who enter the radiation control area, by dealing with measurement of radiation dose, check of personal qualification, resistration of working condition and statistical treatment of these data. This system uses combined TLD, ''TL BADGE'', as a radiation detection sensor, instead of conventional pocket dosimeter and film badge. TL BADGE reading instrument are installed at the entrance to the control area and at working areas. The data of radiation dose, personal qualification etc. read by the reading instrument are transmitted directly to the computer system, which compiles and transacts these data. This system is consisted of three minicomputers, double memory files, CRTs for effective data search and display and floppy disks as a medium for registration, etc. Thus the computer system improves its reliability and the maintenanceability of data, being capable of automatical transaction of a great amount of data quickly. This report describes: Concept of using computer system, System outline, Measurement of radiation dose and Operational functions. (author)

  1. Bus Accessing Performance Evaluation for Plant Control System

    International Nuclear Information System (INIS)

    Chung, Yang Mook

    2005-01-01

    The PCS system with 44 communication masters(CM) which process more than 30000 input and output signals, designed and manufactured by HF Contorols Corporation, is applied to UCN No. 5,6 nuclear power plant for the first time. In the process of system operation, the numerous problems have been issued and investigated and fixed so far. To share a understanding for digital communication system, UCN PCS communication methods are described herein through comparisons between the different priority techniques as well as the results of performance tests

  2. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  3. Harvest: A Scalable, Customizable Discovery and Access System

    National Research Council Canada - National Science Library

    Bowman, C. M; Danzig, Peter B; Hardy, Darren R; Manber, Udi; Schwartz, Michael F

    1994-01-01

    .... In this paper we introduce Harvest, a system that provides a set of customizable tools for gathering information from diverse repositories, building topic-specific content indexes, flexibly searching...

  4. system hardening architecture for safer access to critical business

    African Journals Online (AJOL)

    eobe

    System hardening is a defence strategy, where several different security measures are applied at various layers, all of which .... commerce have tremendously imparted on corporate services ..... Technology and Exploring Engineering, Vol. 2,.

  5. Defense Hotline Allegations Concerning the Biometric Identification System for Access Omnibus Contract

    National Research Council Canada - National Science Library

    2008-01-01

    .... According to the Strategic Services Sourcing (S3) performance work statement the purpose of the BISA is to provide a biometric base access control system that can operate in a hostile environment...

  6. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  7. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  8. Study of LANs access technologies in wind power system

    DEFF Research Database (Denmark)

    Wei, Mu; Chen, Zhe

    2010-01-01

    Due to the energy challenges in the world, new types of generation technologies, such as renewable energy based generators, attract great attention and are being quickly developed, which results in the dramatic developments and changes in modern power systems, the communication technologies play...... a increasingly important role in guaranteeing the power system’s stability, reliability, and security. In this paper the necessity of communication technologies employed in wind power system are introduced. According the International Standards Organization (ISO) reference 7-layered model, the communication...... power environment are explained and discussed. Furthermore the simulation of application of Ethernet in an offshore wind farm communication network by a software, OPNET, is elaborated. With the investigation of the communication technologies in this paper, the offshore wind farm SCADA system can...

  9. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  10. Asymmetry in Maritime Access and Undersea Anti-Access/Area-Denial Strategies

    National Research Council Canada - National Science Library

    Manke, Robert C; Christian, Raymond J

    2007-01-01

    .... From a national security perspective, however, it is equally important to address asymmetric approaches plausibly employed by potential adversaries during conventional campaigns that will most likely...

  11. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  12. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  13. Providers' Access of Imaging Versus Only Reports: A System Log File Analysis.

    Science.gov (United States)

    Jung, Hye-Young; Gichoya, Judy Wawira; Vest, Joshua R

    2017-02-01

    An increasing number of technologies allow providers to access the results of imaging studies. This study examined differences in access of radiology images compared with text-only reports through a health information exchange system by health care professionals. The study sample included 157,256 historical sessions from a health information exchange system that enabled 1,670 physicians and non-physicians to access text-based reports and imaging over the period 2013 to 2014. The primary outcome was an indicator of access of an imaging study instead of access of a text-only report. Multilevel mixed-effects regression models were used to estimate the association between provider and session characteristics and access of images compared with text-only reports. Compared with primary care physicians, specialists had an 18% higher probability of accessing actual images instead of text-only reports (β = 0.18; P < .001). Compared with primary care practice settings, the probability of accessing images was 4% higher for specialty care practices (P < .05) and 8% lower for emergency departments (P < .05). Radiologists, orthopedists, and neurologists accounted for 79% of all the sessions with actual images accessed. Orthopedists, radiologists, surgeons, and pulmonary disease specialists accessed imaging more often than text-based reports only. Consideration for differences in the need to access images compared with text-only reports based on the type of provider and setting of care are needed to maximize the benefits of image sharing for patient care. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  14. Access Control for Monitoring System-Spanning Business Processes

    NARCIS (Netherlands)

    Bassil, S.; Reichert, M.U.; Bobrik, R.; Bauer, Th.

    2007-01-01

    Integrated process support is highly desirable in environ- ments where data related to a particular (business) process are scattered over distributed and heterogeneous information systems (IS). A process monitoring component is a much-needed module in order to provide an integrated view on all these

  15. Cognitive Spectrum Efficient Multiple Access Technique using Relay Systems

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee

    2007-01-01

    Methods to enhance the use of the frequency spectrum by automatical spectrum sensing plus spectrum sharing in a cognitive radio technology context will be presented and discussed in this paper. Ideas to increase the coverage of cellular systems by relay channels, relay stations and collaborate...

  16. Safety of Mixed Model Access Control in a Multilevel System

    Science.gov (United States)

    2014-06-01

    42  H.  FIREWALL AND IPS LANGUAGES...Research Laboratory AIS automated information system ANOA advance notice of arrival APT advanced persistent threat BFM boundary flow modeling...of Investigation FW firewall GENSER general service xvi GUI graphical user interface HAG high-assurance guard HGS high-grade service H-H-H High

  17. Labeling and Rating Systems: Greater Access or Censorship?

    Science.gov (United States)

    Martin, Ann M.

    2015-01-01

    This article asks the question: How well versed are school librarians on issues related to labeling and rating systems? As school librarians continue to design and implement resource location schemes to assist patrons, they must recognize the difference between using labels to create interest in books or implementing labeling and rating systems…

  18. Protecting Dynamic Mobile Agent against Denial of Service Attacks

    Science.gov (United States)

    Aggarwal, Mayank; Nipur, Pallavi

    2010-11-01

    Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.

  19. 44 CFR 73.3 - Denial of flood insurance coverage.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance coverage. 73.3 Section 73.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... sufficient to confirm its identity and location; (2) A clear and unequivocal declaration that the property is...

  20. 9 CFR 2.11 - Denial of initial license application.

    Science.gov (United States)

    2010-01-01

    ... have violated any Federal, State, or local laws or regulations pertaining to animal cruelty within 1... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Denial of initial license application. 2.11 Section 2.11 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT...

  1. 7 CFR 97.105 - Denial of an application.

    Science.gov (United States)

    2010-01-01

    ... certificates or rights are cited, as a reason for denial, their nationality or country, numbers and dates, and... to enable the applicant to identify the cited certificates or rights. (d) If printed publications are... shall be denied. (b) In denying an application, the examiner shall cite the reasons the application was...

  2. 9 CFR 362.4 - Denial or withdrawal of service.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Denial or withdrawal of service. 362.4 Section 362.4 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE..., assaults, abuse, or any other improper means; (iv) has knowingly falsely made, issued, altered, forged, or...

  3. 11 CFR 4.8 - Appeal of denial.

    Science.gov (United States)

    2010-01-01

    ... been received by the Commission, may appeal the adverse determination or the failure to respond by... writing, shall clearly and prominently state on the envelope or other cover and at the top of the first... will not entertain any appeal from an alleged denial or failure to comply with an oral request. Any...

  4. 78 FR 58519 - Denial of Export Privileges; Sixing Liu

    Science.gov (United States)

    2013-09-24

    ... Powers Act (50 U.S.C. 1701, et seq. (2006 & Supp. IV 2010)). I have received notice of Liu's conviction... DEPARTMENT OF COMMERCE Bureau of Industry and Security Denial of Export Privileges; Sixing Liu In the Matter of: Sixing Liu, a/k/a Steve Liu, Inmate 43102-424, FCI Oxford, Federal Correctional...

  5. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  6. Evaluation of an Accessible Home Control and Telecare System

    OpenAIRE

    Sainz , Fausto; Casacuberta , Judit; Díaz , Marta; Madrid , Jaisiel

    2011-01-01

    Part 1: Long and Short Papers; International audience; The article presents part of the research carried out within a project aimed at procuring interaction of people with disabilities and elderly with their environment through the use of information and communication technologies. We present methodological aspects related to participation models, user experience, technology acceptance and peer training. Technology was designed to test the effectiveness of systems and interfaces developed. Ev...

  7. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  8. Geoculture world system, access to Balkan and Albania

    Directory of Open Access Journals (Sweden)

    Ilirjan Çukaj

    2015-03-01

    Full Text Available If culture as a term covers a broad range of relations and social behavior, mutually implicated in influential and economic cycles of the global system, then it becomes wordy geoculture. Geoculture system is used as a term by Wallerstein (2004 who had treated it as a concept largely unused and under a theory of geoculture which plays an important role in the present world system. The theses that is presented in this article is that the global trajectory in the Balkan region is increasing from culture and that, it is imperative to establish a strategic culture direction and management, which, in turn, should be formed not only as a principal need, but also as an obligation of social state institutions to find the viable solutions of the global market policy, economy and culture. And in response to the challenging question the culture of integration becomes imperative now facing nationalism. Albania will have to manage perceptions, fears and realities arising from the above mentioned phenomenon, to establish a balance between the “inside” and “outside” views. In this sense main challenge of Albania is the management of cultural globalization to get the most of opportunities despite the risk of losing ground globally

  9. Mercury- Distributed Metadata Management, Data Discovery and Access System

    Science.gov (United States)

    Palanisamy, Giri; Wilson, Bruce E.; Devarakonda, Ranjeet; Green, James M.

    2007-12-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source and ORNL- developed software. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. Mercury supports various metadata standards including XML, Z39.50, FGDC, Dublin-Core, Darwin-Core, EML, and ISO-19115 (under development). Mercury provides a single portal to information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fast search results to the user, while allowing data providers to advertise the availability of their data and maintain complete control and ownership of that data. Mercury supports various projects including: ORNL DAAC, NBII, DADDI, LBA, NARSTO, CDIAC, OCEAN, I3N, IAI, ESIP and ARM. The new Mercury system is based on a Service Oriented Architecture and supports various services such as Thesaurus Service, Gazetteer Web Service and UDDI Directory Services. This system also provides various search services including: RSS, Geo-RSS, OpenSearch, Web Services and Portlets. Other features include: Filtering and dynamic sorting of search results, book-markable search results, save, retrieve, and modify search criteria.

  10. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  11. What systems participants know about access and service entry and why managers should listen.

    Science.gov (United States)

    Duncombe, Rohena

    2017-08-01

    Objective The present study looked at the views of people directly involved in the entry process for community health counselling using the frame of the health access literature. The concurrence of system participants' views with the access literature highlights access issues, particularly for people who are vulnerable or disadvantaged. The paper privileges the voices of the system participants, inviting local health services to consider using participatory design to improve access at the entry point. Methods People involved in the entry process for community health counselling explored the question, 'What, for you, are the features of a good intake system?' They also commented on themes identified during pilot interviews. These were thematically analysed for each participant group by the researcher to develop a voice for each stakeholder group. Results People accessing the service could be vulnerable and the entry process failed to take that into account. People directly involved in the counselling service entry system, system participants, consisted of: professionals referring in, people seeking services and reception staff taking first enquiries. They shared substantially the same concerns as each other. The responses from these system participants are consistent with the international literature on access and entry into health services. Conclusion Participatory service design could improve primary healthcare service entry at the local level. Canvassing the experiences of system participants is important for delivering services to those who have the least access and, in that way, could contribute to health equity. What is known about the topic? People with the highest health needs receive the fewest services. Health inequality is increasing. What does this paper add? System participants can provide advice consistent with the academic research literature that is useful for improving service entry at the local level. What are the implications for practitioners

  12. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Science.gov (United States)

    2010-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  13. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  14. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Directory of Open Access Journals (Sweden)

    Malik N Ahmed

    Full Text Available Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  15. Prospective evaluation of an internet-linked handheld computer critical care knowledge access system.

    Science.gov (United States)

    Lapinsky, Stephen E; Wax, Randy; Showalter, Randy; Martinez-Motta, J Carlos; Hallett, David; Mehta, Sangeeta; Burry, Lisa; Stewart, Thomas E

    2004-12-01

    Critical care physicians may benefit from immediate access to medical reference material. We evaluated the feasibility and potential benefits of a handheld computer based knowledge access system linking a central academic intensive care unit (ICU) to multiple community-based ICUs. Four community hospital ICUs with 17 physicians participated in this prospective interventional study. Following training in the use of an internet-linked, updateable handheld computer knowledge access system, the physicians used the handheld devices in their clinical environment for a 12-month intervention period. Feasibility of the system was evaluated by tracking use of the handheld computer and by conducting surveys and focus group discussions. Before and after the intervention period, participants underwent simulated patient care scenarios designed to evaluate the information sources they accessed, as well as the speed and quality of their decision making. Participants generated admission orders during each scenario, which were scored by blinded evaluators. Ten physicians (59%) used the system regularly, predominantly for nonmedical applications (median 32.8/month, interquartile range [IQR] 28.3-126.8), with medical software accessed less often (median 9/month, IQR 3.7-13.7). Eight out of 13 physicians (62%) who completed the final scenarios chose to use the handheld computer for information access. The median time to access information on the handheld handheld computer was 19 s (IQR 15-40 s). This group exhibited a significant improvement in admission order score as compared with those who used other resources (P = 0.018). Benefits and barriers to use of this technology were identified. An updateable handheld computer system is feasible as a means of point-of-care access to medical reference material and may improve clinical decision making. However, during the study, acceptance of the system was variable. Improved training and new technology may overcome some of the barriers we

  16. What is at Risk? [Excluding Damages due to Physical Access

    Indian Academy of Sciences (India)

    Possible Targets: Relay Configurations; Control System Settings – Changing of control parameters, limiting values; Erasing complete data from SCADA servers. Freezing values of critical line loadings. Denial of Service (communication to control room)

  17. Environmental Information Management For Data Discovery and Access System

    Science.gov (United States)

    Giriprakash, P.

    2011-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source software and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007 and released in early 2008. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, and ready customization to meet the needs of the multiple projects which use Mercury. For the end users, Mercury provides a single portal to very quickly search for data and information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow ! the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fast search results to the user, while allowing data providers to advertise the availability of their data and maintain complete control and ownership of that data.

  18. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems

    DEFF Research Database (Denmark)

    Handlos, Line Neerup; Olwig, Karen Fog; Bygbjerg, Ib Christian

    2016-01-01

    unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia......Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely......, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than...

  19. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Energy Technology Data Exchange (ETDEWEB)

    Ohmacht, Martin

    2017-08-15

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  20. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Science.gov (United States)

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  1. Design and Implementation of a Library and Information Science Open Access Journal Union Catalogue System

    Directory of Open Access Journals (Sweden)

    Sinn-Cheng Lin

    2017-03-01

    Full Text Available Open access is a mode of academic communication that has been on the rise in recent years, but open access academic resources are widely dispersed across the internet, making it occasionally inconvenient in terms of its use. This research is focused on library and information science, using the OAIS reference model as the system framework, two open access platform, DOAJ and E-LIS as the data sources, and through system implementation develop a “library and information science open access journal union catalogue” system. Using the OAI-PMH protocol as the data interoperability standard, and LAMP as the development environment, four major functionalities: injest, archiving, management and access of information were designed, developed, and integrated into system build. Actual testing and verification showed this system is able to successfully collect data from DOAJ and E-LIS open journal resources related to library and information science. The system is now active and functional, and can be used by researchers in the library and science information field.

  2. The Baker system for nuclear access authorization screening: a psychologically developed system for access screening of vendor and owner applicants at nuclear power plants

    International Nuclear Information System (INIS)

    Baker, E.G.; Crouter, F.L.

    1985-01-01

    This paper presents a comprehensive screening program for unescorted access which has proven to be highly effective in determining the intergrity, trustworthiness, socialibility, behaviors and tendencies of an employee applicant--past, present and future. This procedure, designed specifically for the nuclear industry, can be used with owner or vendor applicants, and meets or exceeds all of the NRC's requirements. The Baker system has been used for nuclear selection since 1979

  3. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  4. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  5. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  6. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Science.gov (United States)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  7. An Information System to Access Status Information of the LHCb Online

    International Nuclear Information System (INIS)

    Frank, M; Gaspar, C

    2012-01-01

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  8. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  9. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to

  10. Access to Justice in the European Convention on Human Rights System

    NARCIS (Netherlands)

    Glas, L.R.; Gerards, J.H.

    2017-01-01

    The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference

  11. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2007-01-01

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  12. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  13. Information system architecture to support transparent access to distributed, heterogeneous data sources

    International Nuclear Information System (INIS)

    Brown, J.C.

    1994-08-01

    Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today's situation analyst's have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today's technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses

  14. GP preferences for information systems: conjoint analysis of speed, reliability, access and users.

    Science.gov (United States)

    Wyatt, Jeremy C; Batley, Richard P; Keen, Justin

    2010-10-01

    To elicit the preferences and trade-offs of UK general practitioners about key features of health information systems, to help inform the design of such systems in future. A stated choice study to uncover implicit preferences based on a binary choice between scenarios presented in random order. were all 303 general practice members of the UK Internet service provider, Medix who were approached by email to participate. The main outcome measure was the number of seconds delay in system response that general practitioners were willing to trade off for each key system feature: the reliability of the system, the sites from which the system could be accessed and which staff are able to view patient data. Doctors valued speed of response most in information systems but would be prepared to wait 28 seconds to access a system in exchange for improved reliability from 95% to 99%, a further 2 seconds for an improvement to 99.9% and 27 seconds for access to data from anywhere including their own home compared with one place in a single health care premises. However, they would require a system that was 14 seconds faster to compensate for allowing social care as well as National Health Service staff to read patient data. These results provide important new evidence about which system characteristics doctors value highly, and hence which characteristics designers need to focus on when large scale health information systems are planned. © 2010 Blackwell Publishing Ltd.

  15. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  16. A System for Web-based Access to the HSOS Database

    Science.gov (United States)

    Lin, G.

    Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.

  17. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Science.gov (United States)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  18. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  19. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  20. Is the Japanese Distribution System Becoming More Accessible to Foreign Firms?

    OpenAIRE

    Ralf bebenroth; Nir Kshetri; Reinhard Hunerberg

    2009-01-01

    Complexities in the Japanese distribution system are well-publicized. An emerging body of literature has documented recent changes in the Japanese distribution system. In this paper, it is examined whether foreign firms' accessibility to the Japanese distribution system has changed in a favorable direction in recent years. Furthermore, as foreign firms vary widely in terms of institutional barriers and complexity they face in the Japanese market, the authors also investigate the determinants ...

  1. Request Stream Control for the Access to Broadband Multimedia Educational Resources in the Distance Learning System

    Directory of Open Access Journals (Sweden)

    Irina Pavlovna Bolodurina

    2013-10-01

    Full Text Available This article presents a model of queuing system for broadband multimedia educational resources, as well as a model of access to a hybrid cloud system storage. These models are used to enhance the efficiency of computing resources in a distance learning system. An additional OpenStack control module has been developed to achieve the distribution of request streams and balance the load between cloud nodes.

  2. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  3. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  4. Entropy-Based Economic Denial of Sustainability Detection

    Directory of Open Access Journals (Sweden)

    Marco Antonio Sotelo Monge

    2017-11-01

    Full Text Available In recent years, an important increase in the amount and impact of Distributed Denial of Service (DDoS threats has been reported by the different information security organizations. They typically target the depletion of the computational resources of the victims, hence drastically harming their operational capabilities. Inspired by these methods, Economic Denial of Sustainability (EDoS attacks pose a similar motivation, but adapted to Cloud computing environments, where the denial is achieved by damaging the economy of both suppliers and customers. Therefore, the most common EDoS approach is making the offered services unsustainable by exploiting their auto-scaling algorithms. In order to contribute to their mitigation, this paper introduces a novel EDoS detection method based on the study of entropy variations related with metrics taken into account when deciding auto-scaling actuations. Through the prediction and definition of adaptive thresholds, unexpected behaviors capable of fraudulently demand new resource hiring are distinguished. With the purpose of demonstrate the effectiveness of the proposal, an experimental scenario adapted to the singularities of the EDoS threats and the assumptions driven by their original definition is described in depth. The preliminary results proved high accuracy.

  5. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  6. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  7. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  8. Seed quality of common bean accessions under organic and conventional farming systems

    Directory of Open Access Journals (Sweden)

    Diego Medeiros Gindri

    2017-06-01

    Full Text Available Agrobiodiversity is essential for a sustainable food production, and the knowledge of the potential characteristics of landrace seeds may prompt farmers to adopt the habit of seed conservation for this species. This study aimed at categorizing landrace and commercial common bean (Phaseolus vulgaris L. accessions, according to the physiological quality (viability and vigor of seeds produced in the field, during two growing seasons, under organic and conventional farming systems. Germination percentage, field emergence, electrical conductivity, accelerated aging, cold test and seedling length were assessed. The landrace bean accessions exhibit diversity in the physiological seed quality, in terms of their viability and vigor. No differences were observed between the farming systems, in relation to the physiological quality of the seeds produced. The categorization of landrace common bean accessions allows to identify those with superior physiological seed quality.

  9. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  10. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    Science.gov (United States)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  11. The upgrade of the J-TEXT experimental data access and management system

    International Nuclear Information System (INIS)

    Yang, C.; Zhang, M.; Zheng, W.; Liu, R.; Zhuang, G.

    2014-01-01

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  12. Design and Implementation of File Access and Control System Based on Dynamic Web

    Institute of Scientific and Technical Information of China (English)

    GAO Fuxiang; YAO Lan; BAO Shengfei; YU Ge

    2006-01-01

    A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained.

  13. Massive M2M Access with Reliability Guarantees in LTE Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arriva...

  14. A METHOD OF AND A SYSTEM FOR CONTROLLING ACCESS TO A SHARED RESOURCE

    DEFF Research Database (Denmark)

    2006-01-01

    A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority...

  15. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    Science.gov (United States)

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  16. An API-based search system for one click access to information

    NARCIS (Netherlands)

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  17. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    Science.gov (United States)

    2010-10-01

    ... Government procurement to the public. (b) Fee for direct hook-up. To the extent that a member of the public... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data... Procurement Data System—Public access to data. (a) The FPDS database. The General Services Administration...

  18. Shared random access memory resource for multiprocessor real-time systems

    International Nuclear Information System (INIS)

    Dimmler, D.G.; Hardy, W.H. II

    1977-01-01

    A shared random-access memory resource is described which is used within real-time data acquisition and control systems with multiprocessor and multibus organizations. Hardware and software aspects are discussed in a specific example where interconnections are done via a UNIBUS. The general applicability of the approach is also discussed

  19. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    Science.gov (United States)

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  20. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services...

  1. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  2. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  3. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  4. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    International Nuclear Information System (INIS)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-01

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4

  5. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    Science.gov (United States)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  6. Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code

    Science.gov (United States)

    Sikder, Somali; Ghosh, Shila

    2018-02-01

    This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.

  7. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-15

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4.

  8. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  9. Endoscopic Ultrasonography-Guided Techniques for Accessing and Draining the Biliary System and the Pancreatic Duct.

    Science.gov (United States)

    Rimbaş, Mihai; Larghi, Alberto

    2017-10-01

    When endoscopic retrograde cholangiopancreatography (ERCP) fails to decompress the biliary system or the pancreatic duct, endoscopic ultrasonography (EUS)-guided biliary or pancreatic access and drainage can be used. Data show a high success rate and acceptable adverse event rate for EUS-guided biliary drainage. The outcomes of EUS-guided biliary drainage seem equivalent to percutaneous drainage and ERCP, whereas only retrospective studies are available for pancreatic duct drainage. In this article, revision of the technical and clinical status and the current evidence of interventional EUS-guided biliary and pancreatic duct access and drainage are presented. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  11. Design and Implementation of a Web-based Monitoring System by using EPICS Channel Access Protocol

    International Nuclear Information System (INIS)

    An, Eun Mi; Song, Yong Gi

    2009-01-01

    Proton Engineering Frontier Project (PEFP) has developed a 20MeV proton accelerator, and established a distributed control system based on EPICS for sub-system components such as vacuum unit, beam diagnostics, and power supply system. The control system includes a real-time monitoring and alarm functions. From the aspect of a efficient maintenance of a control system and a additional extension of subsystems, EPICS software framework was adopted. In addition, a control system should be capable of providing an easy access for users and a real-time monitoring on a user screen. Therefore, we have implemented a new web-based monitoring server with several libraries. By adding DB module, the new IOC web monitoring system makes it possible to monitor the system through the web. By integrating EPICS Channel Access (CA) and Database libraries into a Database module, the web-based monitoring system makes it possible to monitor the sub-system status through user's internet browser. In this study, we developed a web based monitoring system by using EPICS IOC (Input Output Controller) with IBM server

  12. An end-to-end secure patient information access card system.

    Science.gov (United States)

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  13. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    Science.gov (United States)

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  14. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    Science.gov (United States)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  15. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  16. Synergies in the Asian energy system: Climate change, energy security, energy access and air pollution

    International Nuclear Information System (INIS)

    Vliet, Oscar van; Krey, Volker; McCollum, David; Pachauri, Shonali; Nagai, Yu; Rao, Shilpa; Riahi, Keywan

    2012-01-01

    We use the MESSAGE model to examine multiple dimensions of sustainable development for three Asian regions in a set of scenarios developed for the Asian Modelling Exercise. Using climate change mitigation as a starting point for the analysis, we focus on the interaction of climate and energy with technology choice, energy security, energy access, and air pollution, which often have higher policy priority than climate change. Stringent climate policies drive the future energy supply in Asia from being dominated by coal and oil to a more diversified system based mostly on natural gas, coal with CCS, nuclear and renewable energy. The increase in diversity helps to improve the energy security of individual countries and regions. Combining air pollution control policies and universal energy access policies with climate policy can further help to reduce both outdoor and indoor air pollution related health impacts. Investments into the energy system must double by 2030 to achieve stringent climate goals, but are largely offset by lower costs for O and M and air pollution abatement. Strong focus on end-use efficiency also helps lowering overall total costs and allows for limiting or excluding supply side technologies from the mitigation portfolio. Costs of additional energy access policies and measures are a small fraction of total energy system costs. - Highlights: ► Half of added investments in energy offset by lower costs for O and M and air pollution. ► Costs for achieving universal energy access much smaller than energy system costs. ► Combined emissions and access policies further reduce air pollution impacts on health. ► Strong focus on end-use efficiency allows for more flexibility on energy sources. ► Stringent climate policy can improve energy security of Asian regions.

  17. Peripheral Insertion of a Central Venous Access Device Under Fluoroscopic Guidance Using a Peripherally Accessed System (PAS) Port in the Forearm

    International Nuclear Information System (INIS)

    Hata, Yasuhiro; Morita, Sojiro; Morita, Yoshitaka; Awatani, Toshihide; Takasaki, Motohiro; Horimi, Tadashi; Ozawa, Zen

    1998-01-01

    Purpose: We describe the technique, efficacy, and complications of fluoroscopy-guided implantation of a central venous access device using a peripherally accessed system (PAS) port via the forearm. Methods: Beginning in July 1994, 105 central venous access devices were implanted in 104 patients for the long-term infusion of antibiotics or antineoplasmic agents, blood products, or parenteral nutrition. The devices was inserted under fluoroscopic guidance with real-time venography from a peripheral route. Results: All ports were successfully implanted. There were no procedure-related complications. No thrombosis or local infection was observed; however, in six patients catheter-related phlebitis occurred. Conclusion: Fluoroscopy-guided implantation of a central venous access device using a PAS port via the forearm is safe and efficacious, and injection of contrast medium through a peripheral IV catheter before introduction of the catheter helps to avoid catheter-related phlebitis

  18. Interoperable Access to Near Real Time Ocean Observations with the Observing System Monitoring Center

    Science.gov (United States)

    O'Brien, K.; Hankin, S.; Mendelssohn, R.; Simons, R.; Smith, B.; Kern, K. J.

    2013-12-01

    The Observing System Monitoring Center (OSMC), a project funded by the National Oceanic and Atmospheric Administration's Climate Observations Division (COD), exists to join the discrete 'networks' of In Situ ocean observing platforms -- ships, surface floats, profiling floats, tide gauges, etc. - into a single, integrated system. The OSMC is addressing this goal through capabilities in three areas focusing on the needs of specific user groups: 1) it provides real time monitoring of the integrated observing system assets to assist management in optimizing the cost-effectiveness of the system for the assessment of climate variables; 2) it makes the stream of real time data coming from the observing system available to scientific end users into an easy-to-use form; and 3) in the future, it will unify the delayed-mode data from platform-focused data assembly centers into a standards- based distributed system that is readily accessible to interested users from the science and education communities. In this presentation, we will be focusing on the efforts of the OSMC to provide interoperable access to the near real time data stream that is available via the Global Telecommunications System (GTS). This is a very rich data source, and includes data from nearly all of the oceanographic platforms that are actively observing. We will discuss how the data is being served out using a number of widely used 'web services' (including OPeNDAP and SOS) and downloadable file formats (KML, csv, xls, netCDF), so that it can be accessed in web browsers and popular desktop analysis tools. We will also be discussing our use of the Environmental Research Division's Data Access Program (ERDDAP), available from NOAA/NMFS, which has allowed us to achieve our goals of serving the near real time data. From an interoperability perspective, it's important to note that access to the this stream of data is not just for humans, but also for machine-to-machine requests. We'll also delve into how we

  19. Open Access Intellectual Property Systems: A Comparison to Commercial Solutions in Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    Jan Cerny

    2016-07-01

    Full Text Available ICT/IS management plays an important role within the framework of innovation management, and one of the key elements of this role is the support of Competitive Intelligence in the context of innovation processes. The strategic information needs of innovation management are also directed towards different kinds of intellectual property (IP information entities and commercialization. The purpose of this paper is to define these entities and IP information systems as an important part of a company’s Competitive Intelligence Unit for competitor analysis and technology trends. The open access IP information systems will be analysed together with commercial solutions.. The aim of this paper is to underline the importance of open access IP systems compared to added value commercial solutions for competitive intelligence purposes for SMEs. The comparison will be carried out using examples of patent searches within a concrete dataset.

  20. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  1. Broadband and scalable mobile satellite communication system for future access networks

    Science.gov (United States)

    Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi

    2005-07-01

    Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.

  2. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    International Nuclear Information System (INIS)

    Kulcsar, Zsolt; Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-01-01

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  3. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  4. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    International Nuclear Information System (INIS)

    Taylor, C.L.; O'Rourke, J.E.; Allirot, D.; O'Connor, K.

    1980-09-01

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report

  5. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  6. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Directory of Open Access Journals (Sweden)

    Line Neerup Handlos

    2016-09-01

    Full Text Available Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  7. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-01-01

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption. PMID:27657096

  8. Return Migrants' Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example.

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-09-19

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants' access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  9. 26 CFR 1.585-5 - Denial of bad debt reserves for large banks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Denial of bad debt reserves for large banks. 1...) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions § 1.585-5 Denial of bad debt... other section for an addition to a reserve for bad debts. However, for these years, except as provided...

  10. 12 CFR 303.223 - Applicant's right to hearing following denial.

    Science.gov (United States)

    2010-01-01

    ... Criminal Offenses) § 303.223 Applicant's right to hearing following denial. An applicant may request a... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Applicant's right to hearing following denial. 303.223 Section 303.223 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION PROCEDURE AND RULES OF...

  11. 40 CFR 86.1850-01 - Denial, suspension or revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 19 2010-07-01 2010-07-01 false Denial, suspension or revocation of... AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM NEW AND IN-USE HIGHWAY VEHICLES AND...-Duty Vehicles, Light-Duty Trucks, and Complete Otto-Cycle Heavy-Duty Vehicles § 86.1850-01 Denial...

  12. 24 CFR 2002.21 - Authority to deny requests for records and form of denial.

    Science.gov (United States)

    2010-04-01

    ... of a record or information compiled by a criminal law enforcement authority in the course of a...) Be in writing; (2) State simply the reasons for the denial; (3) State that review of the denial by the Inspector General of HUD may be requested; (4) Set forth the steps for obtaining review consistent...

  13. 78 FR 71032 - Foreign Tire Sales, Inc., Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ...-0063; Notice 2] Foreign Tire Sales, Inc., Denial of Petition for Decision of Inconsequential...). ACTION: Denial of Petition. SUMMARY: Foreign Tire Sales, Inc. (FTS), as importer for ProMeter brand medium truck radial replacement tires manufactured by Shandlong Linglong Rubber Company Limited, has...

  14. 78 FR 71030 - Ford Motor Company, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ...-0005; Notice 2] Ford Motor Company, Denial of Petition for Decision of Inconsequential Noncompliance...). ACTION: Denial of Petition. SUMMARY: Ford Motor Company (Ford) has determined that certain model year 2011 Ford E-150, E-250, E-350 and E-450 motor vehicles manufactured [[Page 71031

  15. S-band multiple-access interference study for advanced tracking and data relay satellite systems

    Science.gov (United States)

    Peng, Wei-Chung; Yang, Chau-Chin

    1990-01-01

    The results of a study on the effect of mutual interference among S-band multiple access (SMA) system users of advanced tracking and data relay satellite system (ATDRSS) are presented. In the ATDRSS era, the SMA system is required to support data rates ranging from 10 kb/s to 3 Mb/s. The system will consist of four advanced tracking and data relay satellites (ATDRS) each supporting up to five telemetry links. All users have 10 MHz bandwidth with their carrier frequency equal to 2.2875 GHz. A hybrid SDMA/CDMA scheme is used to mitigate the effect of the interference among system users. SMA system interference probability is evaluated with CLASS software. User link margin degradation due to mutual interference between two users is evaluated. System interference probability is evaluated for the projected 1996 mission model, a reference mission model, and a modified reference mission model.

  16. Above the nominal limit performance evaluation of multiwavelength optical code-division multiple-access systems

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M. H.

    2009-03-01

    We provide an analysis for the performance of a multiwavelength optical code-division multiple-access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one-coincidence sequences with nonrepeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of the MW-OCDMA system can be critically affected when working above the nominal limit, an event that can happen when the network operates at a high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed medium access control (MAC) protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T, while the R3T is better at very high transmission rates. In general, it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  17. Impact of optical hard limiter on the performance of an optical overlapped-code division multiple access system

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Tablieh, Nicole

    2011-08-01

    Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.

  18. Urban air quality management and information systems in Europe: legal framework and information access

    International Nuclear Information System (INIS)

    Karatzas, K.; Moussiopoulos, N.

    2000-01-01

    The European Union (EU) legislative framework related to air quality, together with national legislation and relevant declarations of the United Nations (UN), requires an integrated approach concerning air quality management (AQM), and accessibility of related information for the citizens. In the present paper, the main requirements of this legislative framework are discussed and main air quality management and information system characteristics are drawn. The use of information technologies is recommended for the construction of such systems. The World Wide Web (WWW) is considered a suitable platform for system development and integration and at the same time as a medium for communication and information dissemination. (author)

  19. Urban air quality management and information systems in Europe: legal framework and information access

    Energy Technology Data Exchange (ETDEWEB)

    Karatzas, K.; Moussiopoulos, N. [Aristotle University of Thessaloniki (Greece). Department of Mechanical Engineering, Laboratory of Heat Transfer and Environmental Engineering

    2000-06-01

    The European Union (EU) legislative framework related to air quality, together with national legislation and relevant declarations of the United Nations (UN), requires an integrated approach concerning air quality management (AQM), and accessibility of related information for the citizens. In the present paper, the main requirements of this legislative framework are discussed and main air quality management and information system characteristics are drawn. The use of information technologies is recommended for the construction of such systems. The World Wide Web (WWW) is considered a suitable platform for system development and integration and at the same time as a medium for communication and information dissemination. (author)

  20. Mitigation of Beat Noise in Time Wavelength Optical Code-Division Multiple-Access Systems

    Science.gov (United States)

    Bazan, Taher M.; Harle, David; Andonovic, Ivan

    2006-11-01

    This paper presents an analysis of two methods for enhancing the performance of two-dimensional time wavelength Optical code-division multiple-access systems by mitigating the effects of beat noise. The first methodology makes use of an optical hard limiter (OHL) in the receiver prior to the optical correlator; a general formula for the error probability as a function of crosstalk level for systems adopting OHLs is given, and the implications of the OHL's nonideal transfer characteristics are then examined. The second approach adopts pulse position modulation, and system performance is estimated and compared to that associated with on off keying.

  1. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  2. The Consent Solution to Punishment and the Explicit Denial Objection

    Directory of Open Access Journals (Sweden)

    Miroslav Imbrisevic

    2010-06-01

    Full Text Available Recently, David Boonin has put forward several objections to Carlos S. Nino's 'Consensual Theory of Punishment'. In this paper I will defend Nino against the 'explicit denial objection'. I will discuss whether Boonin's interpretation of Nino as a tacit consent theorist is right. I will argue that the offender's consent is neither tacit nor express, but a special category of implicit consent. Further, for Nino the legal-normative consequences of an act (of crime are 'irrevocable', i.e. one cannot (expressly and successfully deny liability to them. I will suggest an explanation for Nino's irrevocability claim.

  3. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  4. A web accessible scientific workflow system for vadoze zone performance monitoring: design and implementation examples

    Science.gov (United States)

    Mattson, E.; Versteeg, R.; Ankeny, M.; Stormberg, G.

    2005-12-01

    Long term performance monitoring has been identified by DOE, DOD and EPA as one of the most challenging and costly elements of contaminated site remedial efforts. Such monitoring should provide timely and actionable information relevant to a multitude of stakeholder needs. This information should be obtained in a manner which is auditable, cost effective and transparent. Over the last several years INL staff has designed and implemented a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition from diverse sensors (geophysical, geochemical and hydrological) with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic javascript and html/css) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This system has been implemented and is operational for several sites, including the Ruby Gulch Waste Rock Repository (a capped mine waste rock dump on the Gilt Edge Mine Superfund Site), the INL Vadoze Zone Research Park and an alternative cover landfill. Implementations for other vadoze zone sites are currently in progress. These systems allow for autonomous performance monitoring through automated data analysis and report generation. This performance monitoring has allowed users to obtain insights into system dynamics, regulatory compliance and residence times of water. Our system uses modular components for data selection and graphing and WSDL compliant webservices for external functions such as statistical analyses and model invocations. Thus, implementing this system for novel sites and extending functionality (e.g. adding novel models) is relatively straightforward. As system access requires a standard webbrowser

  5. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  6. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    Iyengar, R.D.; Verma, P.B.; Prasad, V.V.S.S.; George, Jain R.; Das, Tripti; Deshmukh, D.K.

    2001-01-01

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  7. The denial of death thesis: sociological critique and implications for palliative care.

    Science.gov (United States)

    Zimmermann, Camilla; Rodin, Gary

    2004-03-01

    It has become commonplace to say that contemporary western society is 'death-denying'. This characterization, which sociologists have termed the 'denial of death thesis', first arose in the social science, psychological and clinical medical literature in the period between 1955 and 1985. During the same time period, the hospice and palliative care movements were developing and in part directed themselves against the perceived cultural denial of death in western society. While the denial of death has been taken for granted by the lay public as well as by clinicians, in the sociological literature it has been increasingly questioned. In this paper we use sociological critiques of the denial of death thesis to raise critical questions about the theory and practice of contemporary palliative care. In particular, we argue that the emphasis of palliative care should not be on extinguishing the denial of death but on the relief of suffering.

  8. Implications of access hole size on tank waste retrieval system design and cost

    International Nuclear Information System (INIS)

    Babcock, S.M.; Kwon, D.S.; Burks, B.L.; Stoughton, R.S.; Evans, M.S.

    1994-05-01

    The DOE Environmental Restoration and Waste Management Robotics Technology Development Program has been investigating the application of robotics technology to the retrieval of waste from single-shell storage tanks for several years. The use of a large, ''long-reach'' manipulator to position and orient a variety of tools and other equipment has been recommended. The objective of this study is to determine the appropriate access hole size for the tank waste retrieval system installation. Previous reports on the impact of access hole size on manipulator performance are summarized. In addition, the practical limitation for access hole size based on structural limitations of the waste storage tanks, the state-of-the-art size limitations for the installation of new risers, the radiation safety implications of various access hole sizes, and overall system cost implications are considered. Basic conclusions include: (1) overall cost of remediation will; be dominated by the costs of the balance of plant and time required to perform the task rather than the cost of manipulator hardware or the cost of installing a riser, (2) the most desirable solution from a manipulator controls point of view is to make the manipulator as stiff as possible and have as high as possible a natural frequency, which implies a large access hole diameter, (3) beyond some diameter; simple, uniform cross-section elements become less advantageous from a weight standpoint and alternative structures should be considered, and (4) additional shielding and contamination control measures would be required for larger holes. Parametric studies summarized in this report considered 3,790,000 1 (1,000,000 gal) tanks, while initial applications are likely to be for 2,840,000 1 (750,000 gal) tanks. Therefore, the calculations should be somewhat conservative, recognizing the limitations of the specific conditions considered

  9. Iterative Pilot-Layer Aided Channel Estimation with Emphasis on Interleave-Division Multiple Access Systems

    OpenAIRE

    Schoeneich Hendrik; Hoeher Peter Adam

    2006-01-01

    Channel estimation schemes suitable for interleave-division multiple access (IDMA) systems are presented. Training and data are superimposed. Training-based and semiblind linear channel estimators are derived and their performance is discussed and compared. Monte Carlo simulation results are presented showing that the derived channel estimators in conjunction with a superimposed pilot sequence and chip-by-chip processing are able to track fast-fading frequency-selective channels. As opposed ...

  10. Finding food: Issues and challenges in using Geographic Information Systems to measure food access

    OpenAIRE

    Forsyth, Ann; Lytle, Leslie; Riper, David Van

    2010-01-01

    A significant amount of travel is undertaken to find food. This paper examines challenges in measuring access to food using Geographic Information Systems (GIS), important in studies of both travel and eating behavior. It compares different sources of data available including fieldwork, land use and parcel data, licensing information, commercial listings, taxation data, and online street-level photographs. It proposes methods to classify different kinds of food sales places in a way that says...

  11. Design of Nutrition Catering System for Athletes Based on Access Database

    OpenAIRE

    Hongjiang Wu,; Haiyan Zhao; Xugang Liu; Mingshun Xing

    2015-01-01

    In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO) and Structure Query Language (SQL) were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring n...

  12. PHOTO ENCODING OF ANALOG WATER METER FOR USER ACCESS AND PAYMENT SYSTEM

    OpenAIRE

    GODFREY A. MILLS; MOSES A. ACQUAH; APPAH BREMANG

    2012-01-01

    This paper presents design reconfiguration of analog water meter to provide remote access to user water consumption and billing records, payments, and meter device monitoring using photo-encoding as the detecting method for water consumption, a PIC18F2423 microcontroller for data processing, and SMS (short message service) technology for data transportation. To validate the system design, an analog water meter was converted into a digital equivalent and interfaced to the cellular network to t...

  13. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Directory of Open Access Journals (Sweden)

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  14. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  15. 28 CFR 16.83 - Exemption of the Executive Office for Immigration Review System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Immigration Review System-limited access. 16.83 Section 16.83 Judicial Administration DEPARTMENT OF JUSTICE....83 Exemption of the Executive Office for Immigration Review System—limited access. (a) The following system of records is exempt from 5 U.S.C. 552a(d): (1) The Executive Office for Immigration Review's...

  16. 28 CFR 16.72 - Exemption of Office of the Associate Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Attorney General System-limited access. 16.72 Section 16.72 Judicial Administration DEPARTMENT OF JUSTICE....72 Exemption of Office of the Associate Attorney General System—limited access. (a) The following...) General Files System of the Office of the Associate Attorney General (JUSTICE/AAG-001). These exemptions...

  17. New capabilities in the HENP grand challenge storage access system and its application at RHIC

    International Nuclear Information System (INIS)

    Bernardo, L.; Gibbard, B.; Malon, D.; Nordberg, H.; Olson, D.; Porter, R.; Shoshani, A.; Sim, A.; Vaniachine, A.; Wenaus, T.; Wu, K.; Zimmerman, D.

    2000-01-01

    The High Energy and Nuclear Physics Data Access Grand Challenge project has developed an optimizing storage access software system that was prototyped at RHIC. It is currently undergoing integration with the STAR experiment in preparation for data taking that starts in mid-2000. The behavior and lessons learned in the RHIC Mock Data Challenge exercises are described as well as the observed performance under conditions designed to characterize scalability. Up to 250 simultaneous queries were tested and up to 10 million events across 7 event components were involved in these queries. The system coordinates the staging of ''bundles'' of files from the HPSS tape system, so that all the needed components of each event are in disk cache when accessed by the application software. The caching policy algorithm for the coordinated bundle staging is described in the paper. The initial prototype implementation interfaced to the Objectivity/DB. In this latest version, it evolved to work with arbitrary files and use CORBA interfaces to the tag database and file catalog services. The interface to the tag database and the MySQL-based file catalog services used by STAR are described along with the planned usage scenarios

  18. The optimal access system for future far-offshore wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  19. A New Time-Hopping Multiple Access Communication System Simulator: Application to Ultra-Wideband

    Directory of Open Access Journals (Sweden)

    José M. Páez-Borrallo

    2005-03-01

    Full Text Available Time-hopping ultra-wideband technology presents some very attractive features for future indoor wireless systems in terms of achievable transmission rate and multiple access capabilities. This paper develops an algorithm to design time-hopping system simulators specially suitable for ultra-wideband, which takes advantage of some of the specific characteristics of this kind of systems. The algorithm allows an improvement of both the time capabilities and the achievable sampling rate and can be used to research into the influence of different parameters on the performance of the system. An additional result is the validation of a new general performance formula for time-hopping ultra-wideband systems with multipath channels.

  20. Towards the Adoption of Open Source and Open Access Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Ilias Maglogiannis

    2012-01-01

    Full Text Available As the Electronic Health Record (EHR systems constantly expand to support more clinical activities and their implementations in healthcare organizations become more widespread, several communities have been working intensively for several years to develop open access and open source EHR software, aiming at reducing the costs of EHR deployment and maintenance. In this paper, we describe and evaluate the most popular open source electronic medical records such as openEMR, openMRS and patientOS, providing their technical features and potentials. These systems are considered quite important due to their prevalence. The article presents the key features of each system and outlines the advantages and problems of Open Source Software (OSS Systems through a review of the literature, in order to demonstrate the possibility of their adoption in modern electronic healthcare systems. Also discussed are the future trends of OS EHRs in the context of the Personal Health Records and mobile computing paradigm.

  1. The NILE system architecture: fault-tolerant, wide-area access to computing and data resources

    International Nuclear Information System (INIS)

    Ricciardi, Aleta; Ogg, Michael; Rothfus, Eric

    1996-01-01

    NILE is a multi-disciplinary project building a distributed computing environment for HEP. It provides wide-area, fault-tolerant, integrated access to processing and data resources for collaborators of the CLEO experiment, though the goals and principles are applicable to many domains. NILE has three main objectives: a realistic distributed system architecture design, the design of a robust data model, and a Fast-Track implementation providing a prototype design environment which will also be used by CLEO physicists. This paper focuses on the software and wide-area system architecture design and the computing issues involved in making NILE services highly-available. (author)

  2. Iterative Pilot-Layer Aided Channel Estimation with Emphasis on Interleave-Division Multiple Access Systems

    Directory of Open Access Journals (Sweden)

    Schoeneich Hendrik

    2006-01-01

    Full Text Available Channel estimation schemes suitable for interleave-division multiple access (IDMA systems are presented. Training and data are superimposed. Training-based and semiblind linear channel estimators are derived and their performance is discussed and compared. Monte Carlo simulation results are presented showing that the derived channel estimators in conjunction with a superimposed pilot sequence and chip-by-chip processing are able to track fast-fading frequency-selective channels. As opposed to conventional channel estimation techniques, the BER performance even improves with increasing Doppler spread for typical system parameters. An error performance close to the case of perfect channel knowledge can be achieved with high power efficiency.

  3. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  4. Test-Access Planning and Test Scheduling for Embedded Core-Based System Chips

    OpenAIRE

    Goel, Sandeep Kumar

    2005-01-01

    Advances in the semiconductor process technology enable the creation of a complete system on one single die, the so-called system chip or SOC. To reduce time-to-market for large SOCs, reuse of pre-designed and pre-veried blocks called cores is employed. Like the design style, testing of SOCs can be best approached in a core-based fashion. In order to enable core-based test development, an embedded core should be isolated from its surrounding circuitry and electrical test access from chip pins...

  5. An Automated Mouse Tail Vascular Access System by Vision and Pressure Feedback.

    Science.gov (United States)

    Chang, Yen-Chi; Berry-Pusey, Brittany; Yasin, Rashid; Vu, Nam; Maraglia, Brandon; Chatziioannou, Arion X; Tsao, Tsu-Chin

    2015-08-01

    This paper develops an automated vascular access system (A-VAS) with novel vision-based vein and needle detection methods and real-time pressure feedback for murine drug delivery. Mouse tail vein injection is a routine but critical step for preclinical imaging applications. Due to the small vein diameter and external disturbances such as tail hair, pigmentation, and scales, identifying vein location is difficult and manual injections usually result in poor repeatability. To improve the injection accuracy, consistency, safety, and processing time, A-VAS was developed to overcome difficulties in vein detection noise rejection, robustness in needle tracking, and visual servoing integration with the mechatronics system.

  6. Denial of shipments of radioactive materials in Paraguay

    International Nuclear Information System (INIS)

    More Torres, Luis E.; Romero de Gonzalez, V.; Lopez Caceres, S.M.

    2008-01-01

    The Denials, Delays and Abandonment of the Radioactive Materials is a problem at world level that has been increased in the last times with more emphasis starting from the attack of September 11 the 2001 in the USA. From then radioactive materials have been denial or delayed and until abandoned. The materials of short periods used mainly in nuclear medicine as the 99m Tc or the 131 I, when they are rejected, delayed it usually causes the lost of the material because it has surpassed their useful life and in many cases they are abandoned. The rejections, delays and later abandonment of the materials in special of Medical use have originated serious damages for the nuclear medicine patients as much of diagnoses as of treatments, in Teleterapia for many patients of cancer who could not be treated. In the petroliferous prospecting and Industry has originated numerous economic damages due to the delays since most of the used sources they are of long period but the delay causes an important increase in the cost. (author)

  7. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  8. U-Access: a web-based system for routing pedestrians of differing abilities

    Science.gov (United States)

    Sobek, Adam D.; Miller, Harvey J.

    2006-09-01

    For most people, traveling through urban and built environments is straightforward. However, for people with physical disabilities, even a short trip can be difficult and perhaps impossible. This paper provides the design and implementation of a web-based system for the routing and prescriptive analysis of pedestrians with different physical abilities within built environments. U-Access, as a routing tool, provides pedestrians with the shortest feasible route with respect to one of three differing ability levels, namely, peripatetic (unaided mobility), aided mobility (mobility with the help of a cane, walker or crutches) and wheelchair users. U-Access is also an analytical tool that can help identify obstacles in built environments that create routing discrepancies among pedestrians with different physical abilities. This paper discusses the system design, including database, algorithm and interface specifications, and technologies for efficiently delivering results through the World Wide Web (WWW). This paper also provides an illustrative example of a routing problem and an analytical evaluation of the existing infrastructure which identifies the obstacles that pose the greatest discrepancies between physical ability levels. U-Access was evaluated by wheelchair users and route experts from the Center for Disability Services at The University of Utah, USA.

  9. Development of Environmental Decision Support System: Unifying Cross-Discipline Data Access Through Open Source Tools

    Science.gov (United States)

    Freeman, S.; Darmenova, K.; Higgins, G. J.; Apling, D.

    2012-12-01

    A common theme when it comes to accessing climate and environmental datasets is that it can be difficult to answer the five basic questions: Who, What, When, Where, and Why. Sometimes even the act of locating a data set or determining how it was generated can prove difficult. It is even more challenging for non-scientific individuals such as planners and policy makers who need to access and include such information in their work. Our Environmental Decision Support System (EDSS) attempts to address this issue by integrating several open source packages to create a simple yet robust web application for conglomerating, searching, viewing, and downloading environmental information for both scientists and decision makers alike. The system is comprised of several open source components, each playing an important role in the EDSS. The Geoportal web application provides an intuitive interface for searching and managing metadata ingested from data sets/data sources. The GeoServer and ncWMS web applications provide overlays and information for visual presentations of the data through web mapping services (WMS) by ingesting ESRI shapefiles, NetCDF, and HDF files. Users of the EDSS can browse the catalog of available products, enter a simple search string, or even constrain searches by temporal and spatial extents. Combined with a custom visualization web application, the EDSS provides a simple yet efficient means for users to not only access and manipulate climate and environmental data, but also trace the data source and the analytical methods used in the final decision aids products.

  10. Open-Access, Low-Magnetic-Field MRI System for Lung Research

    Science.gov (United States)

    Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William

    2009-01-01

    An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.

  11. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  12. Improving Access to Essential Medicines: How Health Concerns can be Prioritised in the Global Governance System.

    Science.gov (United States)

    Sridhar, Devi

    2008-07-01

    This paper discusses the politics of access to essential medicines and identifies 'space' in the current system where health concerns can be strengthened relative to trade. This issue is addressed from a global governance perspective focusing on the main actors who can have the greatest impact. These include developing country coalitions and citizens in developed countries though participation in civil society organisations. These actors have combined forces to tackle this issue successfully, resulting in the 2001 Doha Declaration on Public Health. The collaboration has been so powerful due to the assistance of the media as well as the decision to compromise with pharmaceutical companies and their host countries. To improve access to essential medicines, six C's are needed: coalitions, civil society, citizenship, compromise, communication and collaboration.

  13. Using speech recognition to enhance the Tongue Drive System functionality in computer access.

    Science.gov (United States)

    Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue operated assistive technology (AT), which can enable people with severe physical disabilities to access computers and drive powered wheelchairs using their volitional tongue movements. TDS offers six discrete commands, simultaneously available to the users, for pointing and typing as a substitute for mouse and keyboard in computer access, respectively. To enhance the TDS performance in typing, we have added a microphone, an audio codec, and a wireless audio link to its readily available 3-axial magnetic sensor array, and combined it with a commercially available speech recognition software, the Dragon Naturally Speaking, which is regarded as one of the most efficient ways for text entry. Our preliminary evaluations indicate that the combined TDS and speech recognition technologies can provide end users with significantly higher performance than using each technology alone, particularly in completing tasks that require both pointing and text entry, such as web surfing.

  14. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  15. Experimental demonstration of 2.5 Gbit/S incoherent two-dimensional optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.; Bres, C.-S.; Xu, L.; Rand, D.; Prucnal, P.R.

    2004-01-01

    We demonstrated error-free operation of 4 simultaneous users in a fast frequency-hopping time-spreading optical code division multiple access system operating at 2.5 Gbit/s a Star architecture. Effective power penalty was ≤0.5dB. Novel optical code division multiple access receiver based on Terahertz Optical Asymmetric Demultiplexer was demonstrated to eliminate multiple access interference (Authors)

  16. National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents

    Science.gov (United States)

    Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.

    2014-12-01

    The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using

  17. Architecture and implementation for a system enabling smartphones to access smart card based healthcare records.

    Science.gov (United States)

    Karampelas, Vasilios; Pallikarakis, Nicholas; Mantas, John

    2013-01-01

    The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has been the healthcare professional need of quality information, in every healthcare provision incident, whenever and wherever this incident may take place. In order to address this need a truly mobile health care system is required, one that will be able to provide a healthcare provider with accurate patient-related information regardless of the time and place that healthcare is provided. In order to fulfill this role the present study proposes the architecture for a Healthcare Smartcard system, which provides authenticated healthcare professionals with remote mobile access to a Patient's Healthcare Record, through their Smartphone. Furthermore the research proceeds to develop a working prototype system.

  18. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  19. Study and development of a document file system with selective access

    International Nuclear Information System (INIS)

    Mathieu, Jean-Claude

    1974-01-01

    The objective of this research thesis was to design and to develop a set of software aimed at an efficient management of a document file system by using methods of selective access to information. Thus, the three main aspects of file processing (creation, modification, reorganisation) have been addressed. The author first presents the main problems related to the development of a comprehensive automatic documentation system, and their conventional solutions. Some future aspects, notably dealing with the development of peripheral computer technology, are also evoked. He presents the characteristics of INIS bibliographic records provided by the IAEA which have been used to create the files. In the second part, he briefly describes the file system general organisation. This system is based on the use of two main files: an inverse file which contains for each descriptor a list of of numbers of files indexed by this descriptor, and a dictionary of descriptor or input file which gives access to the inverse file. The organisation of these both files is then describes in a detailed way. Other related or associated files are created, and the overall architecture and mechanisms integrated into the file data input software are described, as well as various processing applied to these different files. Performance and possible development are finally discussed

  20. Remote access to an interferometric fringes stabilization active system via RENATA

    Science.gov (United States)

    Espitia-Gómez, Javier; Ángel-Toro, Luciano

    2013-11-01

    The Advanced Technology National Network (RENATA, for its acronym in Spanish) is a Colombian, collaborative work tool, linked to other networks worldwide, in which take participation researchers, teachers and students, by sharing laboratory resources located in different universities, institutes and research centers throughout the country. In the Universidad EAFIT (Medellín, Colombia) it has been designed an interferometric fringes stabilization active system, which can be accessed remotely via the RENATA network. A Mach-Zehnder interferometer was implemented, with independent piezoelectric actuators in each arm, with which the lengths of optical path of light that goes over in each of them can be modified. Using these actuators, one can simultaneously perturb the system and compensate the phase differences caused by that perturbation. This allows us to experiment with different disturbs, and analyze the system response to each one of them. This can be made from any location worldwide, and especially from those regions in which optical and optoelectronic components required for the implementation of the interferometer or for the stabilization system are not available. The device can also be used as a platform in order to conduct diverse experiments, involving optical and controlling aspects, constituting with this in a pedagogic tool. For the future, it can be predicted that remote access to available applications would be possible, as well as modifications of the implemented code in labVIEW™, so that researchers and teachers can adapt and improve their functionalities or develop new applications, based on the collaborative work.

  1. “Future Directions”: m-government computer systems accessed via cloud computing – advantages and possible implementations

    OpenAIRE

    Daniela LIŢAN

    2015-01-01

    In recent years, the activities of companies and Public Administration had been automated and adapted to the current information system. Therefore, in this paper, I will present and exemplify the benefits of m-government computer systems development and implementation (which can be accessed from mobile devices and which are specific to the workflow of Public Administrations) starting from the “experience” of e-government systems implementation in the context of their access and usage through ...

  2. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    Science.gov (United States)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  3. National Geothermal Data System (USA): an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. Lee; Richard, Stephen; Blackman, Harold; Anderson, Arlene; Patten, Kim

    2014-05-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in April, 2014 will provide open access to millions of data records, sharing -relevant geoscience and longer term to land use data to propel geothermal development and production. NGDS serves information from all of the U.S. Department of Energy's sponsored development and research projects and geologic data from all 50 states, using free and open source software. This interactive online system is opening new exploration opportunities and potentially shortening project development by making data easily discoverable, accessible, and interoperable. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 6 million records online, including 1.72 million well headers (oil and gas, water, geothermal), 670,000 well logs, and 497,000 borehole temperatures and is growing rapidly. There are over 312 interoperable Web services and another 106 WMS (Web Map Services) registered in the system as of January, 2014. Companion projects run by Southern Methodist University and U.S. Geological Survey (USGS) are adding millions of additional data records. The DOE Geothermal Data Repository, currently hosted on OpenEI, is a system node and clearinghouse for data from hundreds of U.S. DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS complies with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with support from the US

  4. 28 CFR 16.71 - Exemption of the Office of the Deputy Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Attorney General System-limited access. 16.71 Section 16.71 Judicial Administration DEPARTMENT OF JUSTICE....71 Exemption of the Office of the Deputy Attorney General System—limited access. (a) The following... of the Office of the Deputy Attorney General (JUSTICE/DAG-013). (d) In addition, the Drug Enforcement...

  5. Complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard system

    CSIR Research Space (South Africa)

    Adebesin, F

    2010-10-01

    Full Text Available and used by people with varying abilities. Although accessibility concerns are aimed at making systems usable for people with disabilities, support for direct accessibility, the built-in redundancies in an application that enable as many people as possible...

  6. Accessibility patterns and community integration among previously homeless adults: a Geographic Information Systems (GIS) approach.

    Science.gov (United States)

    Chan, Dara V; Gopal, Sucharita; Helfrich, Christine A

    2014-11-01

    Although a desired rehabilitation goal, research continues to document that community integration significantly lags behind housing stability success rates for people of a variety of ages who used to be homeless. While accessibility to resources is an environmental factor that may promote or impede integration activity, there has been little empirical investigation into the impact of proximity of community features on resource use and integration. Using a Geographic Information Systems (GIS) approach, the current study examines how accessibility or proximity to community features in Boston, United States related to the types of locations used and the size of an individual's "activity space," or spatial presence in the community. Significant findings include an inverse relationship between activity space size and proximity to the number and type of community features in one's immediate area. Specifically, larger activity spaces were associated with neighborhoods with less community features, and smaller activity spaces corresponded with greater availability of resources within one's immediate area. Activity space size also varied, however, based on proximity to different types of resources, namely transportation and health care. Greater community function, or the ability to navigate and use community resources, was associated with better accessibility and feeling part of the community. Finally, proximity to a greater number of individual identified preferred community features was associated with better social integration. The current study suggests the ongoing challenges of successful integration may vary not just based on accessibility to, but relative importance of, specific community features and affinity with one's surroundings. Community integration researchers and housing providers may need to attend to the meaning attached to resources, not just presence or use in the community. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Effects of interaction of an early experience of reward through maternal contact or its denial with social stress during adolescence on the serotonergic system and the stress responsiveness of adult female rats.

    Science.gov (United States)

    Raftogianni, A; Diamantopoulou, A; Alikaridis, F; Stamatakis, A; Stylianopoulou, F

    2012-05-03

    Experiences during critical periods, such as the neonatal and adolescence, play a critical role in determining adult stress-coping behavior. Based on the aforementioned we developed an experimental protocol, which included a neonatal experience and a social stress during adolescence. The serotonergic system is known as an important modulator of coping ability and, in general, emotional balance in both normal and pathological states, such as depression and anxiety, for which females are more vulnerable. Thus in the present work we used female rats and determined 5-HT, 5-hydroxyindoleacetic acid (5-HIAA), and 5-hydroxytryptamine receptor type 1A (5-HT(1A)) receptor levels in the prefrontal cortex (PFC) and the amygdala (AMY). During postnatal days 10-13 (PND 10-13) rat pups were exposed to a T-maze, one arm of which lead to the mother. One group of animals was allowed contact with the mother (rewarded-receiving expected reward (RER)), whereas the other was denied the expected reward (DER). High performance liquid chromatography (HPLC) analysis revealed that in both the PFC and in AMY, adult RER animals had higher basal 5-HT levels. Furthermore, in the AMY of this group of animals, higher levels of 5-HT(1A) receptors were detected by Western blot analysis. In adulthood rats were exposed to the Forced Swimming Test/Stress (FST/S). RER animals not exposed to the adolescent stress exhibited longer immobility time during both the first and second day of FST. Corticosterone levels following the FST fell faster in the DER animals. Adolescent stress affected the responses to the adult FSS only in the DER animals, which had decreased 5-HT in the AMY and increased immobility time on both days of the FST, compared with the DER, not stressed in adolescence. The phenotype of the DER animals is in line with the "match-mismatch" hypothesis, which states that if two events during critical periods of life "match" in being mildly stressful, their interaction can be adaptive. Copyright

  8. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  9. On-Chip Fluorescence Switching System for Constructing a Rewritable Random Access Data Storage Device.

    Science.gov (United States)

    Nguyen, Hoang Hiep; Park, Jeho; Hwang, Seungwoo; Kwon, Oh Seok; Lee, Chang-Soo; Shin, Yong-Beom; Ha, Tai Hwan; Kim, Moonil

    2018-01-10

    We report the development of on-chip fluorescence switching system based on DNA strand displacement and DNA hybridization for the construction of a rewritable and randomly accessible data storage device. In this study, the feasibility and potential effectiveness of our proposed system was evaluated with a series of wet experiments involving 40 bits (5 bytes) of data encoding a 5-charactered text (KRIBB). Also, a flexible data rewriting function was achieved by converting fluorescence signals between "ON" and "OFF" through DNA strand displacement and hybridization events. In addition, the proposed system was successfully validated on a microfluidic chip which could further facilitate the encoding and decoding process of data. To the best of our knowledge, this is the first report on the use of DNA hybridization and DNA strand displacement in the field of data storage devices. Taken together, our results demonstrated that DNA-based fluorescence switching could be applicable to construct a rewritable and randomly accessible data storage device through controllable DNA manipulations.

  10. Power Stabilization Strategy of Random Access Loads in Electric Vehicles Wireless Charging System at Traffic Lights

    Directory of Open Access Journals (Sweden)

    Linlin Tan

    2016-10-01

    Full Text Available An opportunity wireless charging system for electric vehicles when they stop and wait at traffic lights is proposed in this paper. In order to solve the serious power fluctuation caused by random access loads, this study presents a power stabilization strategy based on counting the number of electric vehicles in a designated area, including counting method, power source voltage adjustment strategy and choice of counting points. Firstly, the circuit model of a wireless power system with multi-loads is built and the equation of each load is obtained. Secondly, after the counting method of electric vehicles is stated, the voltage adjustment strategy, based on the number of electric vehicles when the system is at a steady state, is set out. Then, the counting points are chosen according to power curves when the voltage adjustment strategy is adopted. Finally, an experimental prototype is implemented to verify the power stabilization strategy. The experimental results show that, with the application of this strategy, the charging power is stabilized with the fluctuation of no more than 5% when loads access randomly.

  11. Exploring the drivers of health and healthcare access in Zambian prisons: a health systems approach.

    Science.gov (United States)

    Topp, Stephanie M; Moonga, Clement N; Luo, Nkandu; Kaingu, Michael; Chileshe, Chisela; Magwende, George; Heymann, S Jody; Henostroza, German

    2016-11-01

    Prison populations in sub-Saharan Africa (SSA) experience a high burden of disease and poor access to health care. Although it is generally understood that environmental conditions are dire and contribute to disease spread, evidence of how environmental conditions interact with facility-level social and institutional factors is lacking. This study aimed to unpack the nature of interactions and their influence on health and healthcare access in the Zambian prison setting. We conducted in-depth interviews of a clustered random sample of 79 male prisoners across four prisons, as well as 32 prison officers, policy makers and health care workers. Largely inductive thematic analysis was guided by the concepts of dynamic interaction and emergent behaviour, drawn from the theory of complex adaptive systems. A majority of inmates, as well as facility-based officers reported anxiety linked to overcrowding, sanitation, infectious disease transmission, nutrition and coercion. Due in part to differential wealth of inmates and their support networks on entering prison, and in part to the accumulation of authority and material wealth within prison, we found enormous inequity in the standard of living among prisoners at each site. In the context of such inequities, failure of the Zambian prison system to provide basic necessities (including adequate and appropriate forms of nutrition, or access to quality health care) contributed to high rates of inmate-led and officer-led coercion with direct implications for health and access to healthcare. This systems-oriented analysis provides a more comprehensive picture of the way resource shortages and human interactions within Zambian prisons interact and affect inmate and officer health. While not a panacea, our findings highlight some strategic entry-points for important upstream and downstream reforms including urgent improvement in the availability of human resources for health; strengthening of facility-based health services systems

  12. Particle Filtering for Multiple Access DS/CDMA Systems DS/CDMA Channel Estimation

    Directory of Open Access Journals (Sweden)

    Rafael Oliveira Ribeiro

    2013-09-01

    Full Text Available This article discusses computational implementation aspects and performance of a Bayesian methodology, namely particle filter (PF. The PF channel estimation technique is directly applied to the channel coefficients estimation of DS/CDMA systems. Simulation results for non-line-of-sight (NLOS Rayleigh fading channel propagation have indicated that the bootstrap PF estimator is capable to provide RMSE in the range of [10-3 ; 10-2] for a wide range of multiple access interference (MAI levels and signal-noise ratio (SNR, and still be able to offer robustness to near-far ratio (NFR effect.

  13. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  14. Retention in a public health care system with free access to treatment

    DEFF Research Database (Denmark)

    Helleberg, Marie; Engsig, Frederik N; Kronborg, Gitte

    2012-01-01

    were retained in care 95.0% of person-years under observation, increasing to 98.1% after initiation of antiretroviral treatment (HAART). The overall IR/100 person-years for first episode of LTFU was 2.6 (95% CI: 2.5-2.8) and was significantly lower after initiation of HAART (1.2 (95% CI: 1......, especially after initiation of HAART. Absence from HIV care is associated with increased mortality. We conclude that high rates of retention can be achieved in a health care system with free access to treatment and is associated with a favorable outcome....

  15. Towards a Next Generation Universally Accessible ‘Online Shopping-for-Apparel’ System

    DEFF Research Database (Denmark)

    Kristensen, Kasper; Borum, Nanna; Christiansen, Line Gad

    2013-01-01

    , reportedly up to 40%, which is a huge burden to the clothing industries as shopping percentile of sales online continues to increase, is targeted. Three studies are reported where results cumulate to highlight the need for continued research to realize a next-generation system to improve the user experience...... of online shopping for apparel where conclusions point to the need for adaptive user interface improvements. Unforeseen was that wheelchair-bound public especially responded positively to the potentials for the concept due to their limited mobility in shopping and this accessibility aspect can...

  16. An 'ADC-Memory' system based on a new principle in data access

    International Nuclear Information System (INIS)

    Pan Dajing; Wu Yongqing; Wang Shibo

    1990-01-01

    A new kind of 'ADC-Memory' (ADC-M) with real time correction of counting loss in dead time is now used in a multiuser data acquisition and processing system based on DUAL/68000 microcomputer. In data access, it replaces the 'DMA + 1' in classical MCA with the new method 'DMA + N', where N is weight factor of correction. The new method is based on the principle of virtual pulse generator. This method is superior to the correction by the software because the correction needn't take the computer time. Thus, this ADC-M can be used in the counting of high rate pulses

  17. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  18. DDC in DSpace: Integration of Multi-lingual Subject Access System in Institutional Digital Repositories

    Directory of Open Access Journals (Sweden)

    Bijan Kumar Roy

    2017-12-01

    Full Text Available The paper discusses the nature of Knowledge Organization Systems (KOSs and shows how these can support digital library users. It demonstrates processes related to integration of KOS like the Dewey Decimal Classification, 22nd edition (DDC22 in DSpace software (http://www.dspace.org/ for organizing and retrieving (browsing and searching scholarly objects. An attempt has been made to use the DDC22 available in Bengali language and highlights the required mechanisms for system-level integration. It may help repository administrator to build IDR (Institutional Digital Repository integrated with SKOS-enabled multilingual subject access systems for supporting subject descriptors based indexing (DC.Subject metadata element, structured navigation (browsing and efficient searching.

  19. National Geothermal Data System: an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.

    2013-12-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational

  20. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  1. Coping with stereotype threat: denial as an impression management strategy.

    Science.gov (United States)

    von Hippel, William; von Hippel, Courtney; Conway, Leanne; Preacher, Kristopher J; Schooler, Jonathan W; Radvansky, Gabriel A

    2005-07-01

    Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype of incompetence (Study 1) and hostel-dwelling older adults (Study 2) were more likely to deny incompetence if they were high in impression management. African Americans (Study 3) showed a similar pattern of denying cognitive incompetence, which emerged primarily when they were interviewed by a White experimenter and had attended a predominantly Black high school. In Study 4, White students who expected to take an IQ test and were threatened by a stereotype of being less intelligent than Asians were more likely to deny that intelligence is important if they were high in impression management.

  2. The need for a greater commitment to america region to prevent denials of shipments of radioactive materials

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Schwela, Ulric

    2013-01-01

    Radioactive sources are used worldwide in a wide range of applications in industry health care, industrial applications, manufacturing materials, exploration and technological development, as well as basic scientific research. The ability to use such radioactive material in these sectors depends on both its safe transport within a country and between different countries, for developed and developing countries can have access to this technology, in a timely manner and in conditions economically acceptable. In this paper the issue of denials and restraints of shipment of radioactive material and the need for greater commitment that Member States of the International Atomic Energy Agency (IAEA) must assume to facilitate the transport of radioactive materials for the benefit of society is analyzed

  3. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  4. The cerebral neurobiology of anxiety, anxiety displacement, and anxiety denial.

    Science.gov (United States)

    Gottschalk, L A; Fronczek, J; Abel, L; Buchsbaum, M S; Fallon, J H

    2001-01-01

    Previous studies examining the relationship of anxiety scores, derived from the content analysis of speech of normal individuals, have revealed that the anxiety scores occurring in the dreams associated with rapid eye movement (REM) sleep are significantly correlated with localized cerebral glucose metabolic rates assessed by positron emission tomography (PET) scanning. These significant intercorrelations occur in different cerebral areas when the anxiety scores are obtained from mental experiences reported during non-REM sleep or during wakeful silent mentation. The purpose of the present study was to examine the intercorrelations found between anxiety attributed to the self, anxiety-displacement, and anxiety denial measured from computerized content analysis of 5-min verbal reports of subjective thoughts and feelings obtained from wakeful normal subjects and localized cerebral glucose metabolic rates during PET scanning. The subjects were 10 wakeful young males. Their anxiety scores were derived from computerized content analysis of 5-min reports they gave of their subjective thoughts, feelings and fantasies during a 30-min period following an intravenous injection of F D-deoxyglucose (FDG). The subjects were moved 32--45 min after this injection to obtain a PET scan, which records all of the localized cerebral glucose metabolic rates during the 30 min following the FDG injection. Significant intercorrelations of localized cerebral glucose metabolic rates with the scores of self-anxiety, anxiety displacement, and anxiety-denial were found in dissimilar cerebral locations depending on the type of anxiety involved. The significant correlations occurred in brain regions known to be associated with the functions of emotions, cognition, memory, and vision. Specific combinations of cerebral areas, based on glucose metabolic rates, appear to distinguish and be associated with different verbal expressions of anxiety. Replication of this preliminary research will be

  5. A Mechanism Denial Study on the Madden-Julian Oscillation

    Directory of Open Access Journals (Sweden)

    In-Sik Kang

    2011-12-01

    Full Text Available A series of Madden-Julian oscillation (MJO mechanism-denial experiments is performed using an atmospheric general circulation model (AGCM. Daily climatological seasonal cycles of i surface latent heat flux, ii net radiative heating rate, and iii surface wind stress are obtained from a control simulation and prescribed in place of the normal interactive computations of these fields in order to turn off the i wind-induced surface heat exchange (WISHE, ii cloud-radiation interaction (CRI, and iii frictional wave-CISK (FWC mechanisms, respectively. Dual and triple mechanism denial experiments are also conducted by switching off multiple mechanisms together. The influence of each mechanism is assessed by comparing experiments with that mechanism turned off to those in which it is not. CRI and WISHE are both found to be important to the simulated MJO amplitude and propagation speed, while FWC has weaker and less systematic effects. The MJO is weakened when CRI is turned off, but strengthened when WISHE is turned off, indicating that CRI amplifies the MJO in the control simulation while WISHE weakens it. The negative influence of WISHE is shown to result from simulated phase relationships between surface winds, surface fluxes and convection which differ significantly from those found in observations, and thus is not interpreted as evidence against a positive role for WISHE in the development and maintenance of the observed MJO. The positive influence of CRI in the model is consistent with a strong simulated relationship between daily grid-point column-integrated radiative and convective heating; the mean ratio of the latter to the former exceeds 0.2 for rain rates less than 14 mm d-1. CRI is also shown to suppress an excessive excitation of the convectively coupled Kelvin wave so that the amplitude and frequency of the MJO is maintained.

  6. Effective use of multibeam antenna and space-time multiple access technology in modern mobile communication systems

    OpenAIRE

    Moskalets, N. V.

    2015-01-01

    A possibility for efficient use of radio-frequency spectrum and of corresponding increase in productivity of mobile communication system with space-time multiple access obtained by use of multibeam antenna of base station is considered.

  7. Ocean Surface Topography Mission (OSTM) /Jason-2: Near Real-Time Altimetry Validation System (NRTAVS) QA Reports (NODC Accession 0044984)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains the descriptions for the OSTM/Jason-2 Near Real-Time Altimetry Validation System Quality Reports, which are served through the NOAA/NESDIS...

  8. Enhancing Access to Drought Information Using the CUAHSI Hydrologic Information System

    Science.gov (United States)

    Schreuders, K. A.; Tarboton, D. G.; Horsburgh, J. S.; Sen Gupta, A.; Reeder, S.

    2011-12-01

    The National Drought Information System (NIDIS) Upper Colorado River Basin pilot study is investigating and establishing capabilities for better dissemination of drought information for early warning and management. As part of this study we are using and extending functionality from the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS) to provide better access to drought-related data in the Upper Colorado River Basin. The CUAHSI HIS is a federated system for sharing hydrologic data. It is comprised of multiple data servers, referred to as HydroServers, that publish data in a standard XML format called Water Markup Language (WaterML), using web services referred to as WaterOneFlow web services. HydroServers can also publish geospatial data using Open Geospatial Consortium (OGC) web map, feature and coverage services and are capable of hosting web and map applications that combine geospatial datasets with observational data served via web services. HIS also includes a centralized metadata catalog that indexes data from registered HydroServers and a data access client referred to as HydroDesktop. For NIDIS, we have established a HydroServer to publish drought index values as well as the input data used in drought index calculations. Primary input data required for drought index calculation include streamflow, precipitation, reservoir storages, snow water equivalent, and soil moisture. We have developed procedures to redistribute the input data to the time and space scales chosen for drought index calculation, namely half monthly time intervals for HUC 10 subwatersheds. The spatial redistribution approaches used for each input parameter are dependent on the spatial linkages for that parameter, i.e., the redistribution procedure for streamflow is dependent on the upstream/downstream connectivity of the stream network, and the precipitation redistribution procedure is dependent on elevation to account

  9. Cancer Deaths due to Lack of Universal Access to Radiotherapy in the Brazilian Public Health System.

    Science.gov (United States)

    Mendez, L C; Moraes, F Y; Fernandes, G Dos S; Weltman, E

    2018-01-01

    Radiotherapy plays a fundamental role in the treatment of cancer. Currently, the Brazilian public health system cannot match the national radiotherapy demand and many patients requiring radiotherapy are never exposed to this treatment. This study estimated the number of preventable deaths in the public health system if access to radiotherapy was universal. Incidence rates for the year 2016 provided by Instituto Nacional de Cancer were used in this analysis. The number of untreated patients requiring radiotherapy was obtained through the difference between the total number of patients requiring radiotherapy and the total amount of delivered radiotherapy treatments in the public health system. The number of deaths for the three most common cancers in each gender due to radiotherapy shortage was calculated. Initially, the total number of patients per cancer type was divided in stages using Brazilian epidemiological data. Subsequently, previously published tree arm diagrams were used to define the rate of patients requiring radiotherapy in each specific clinical setting. Finally, the clinical benefit of radiotherapy in overall survival was extracted from studies with level 1 evidence. Over 596 000 cancer cases were expected in Brazil in 2016. The public health system covers more than 75% of the Brazilian population and an estimated 111 432 patients who required radiotherapy in 2016 did not receive this treatment. Breast, colorectal and cervix cancers are the most frequent malignant tumours in women and prostate, lung and colorectal in men. The number of deaths due to a radiotherapy shortage in the year 2016 for these types of cancer were: (i) breast: 1011 deaths in 10 years; (ii) cervix: 2006 deaths in 2 years; (iii) lung: 1206 deaths in 2 years; (iv) prostate, intermediate risk: 562 deaths in 13 years; high risk: 298 deaths in 10 years; (v) colorectal: 0 deaths, as radiotherapy has no proven benefit in overall survival. Thousands of cancer patients requiring

  10. Software interface system for Geophysical Data Access and Management System (GPDAMS-CD)

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.

    This report examines the principles underlying GPDAMS, philosophy behind data management, and describes functionalities, limitations and usage of GPDAMS. GPDAMS is a complete marine geophysical data management system that provides user...

  11. Optical orthogonal code-division multiple-access system - Part 2: Multibits/sequence-period OOCDMA

    Science.gov (United States)

    Kwon, Hyuck M.

    1994-08-01

    In a recently proposed optical orthogonal code division multiple-access (OOCDMA) system, one bit of user's data is transmitted per sequence-period, and a threshold is employed for the final bit decision. In this paper, a system that can transmit multibits per sequence-period is introduced, and avalanche photodiode (APD) noise, thermal noise, and interference, are included. This system, derived by exploiting orthogonal properties of the OOCDMA code sequence and using a maximum search (instead of a threshold) in the final decision, is log(sub 2) F times higher in throughput, where F is sequence-period. For example, four orders of magnitude are better in bit error probability at - 56 dBW received laser power, with F = 1000 chips, 10 'marks' in a sequence, and 10 users of 30 Mb/s data rate for one-bit/sequence-period and 270 Mb/s data rate for multibits/sequence-period system. Furthermore, an exact analysis is performed for the log(sub 2)F bits/sequence-period system with a hard-limiter placed before the receiver, and its performance is compared to the performance without hard-limiter, for the chip-synchronous case. The improvement from using a hard-limiter is significant in the log(sub 2)F bits/sequence-period OCCDMA system.

  12. A Hybrid System for Acquisition of and Access to the Data from Foundry Technical Standards

    Directory of Open Access Journals (Sweden)

    A. Macioł

    2007-07-01

    Full Text Available The growing importance of automatized systems for interchange of commercial and technical information prompts searching for new forms of knowledge modelling. One of the possible solutions presented in this article is the use of relational databases for acquisition of information comprised in technical standards and of a rule-based reasoning system providing access to these bases. The study describes the structure of a database created under the assumption that concepts describing knowledge will be recorded in data collecting system and not in relational schema. The user is free to define by himself the structure of the knowledge without the need of introducing any changes to the relational schema. At the same time, the reasoning system enables very efficient knowledge searching. At present, tests are carried out on a software operating on a MS SQL Server. The project work and test performance of the system confirm that the adopted assumptions have been right and correct. The development of a new interface is anticipated using internet techniques. As a next step, the information resources collected in the system will be successively expanded using also information sources other than the technical standards.

  13. Widened Participation and Unequal Access to the System of Higher Education in Denmark

    DEFF Research Database (Denmark)

    Munk, Martin D.; Thomsen, Jens Peter

    This paper deals with access to Higher Education (HE), more specifically with social differentiation within Danish university field of studies and institutions. We use Danish register data and investigate choice of field of study and choice of university institution while controlling for a range...... of student background variables. Theoretically we draw on notions of forms of capital and of channelling, diversion and effectively maintained inequality in the educational system. We find that it is important to differentiate not only between fields of studies, but also between university institutions......, in explaining the processes of inequality and differentiation in the Danish University system. Here two dimensions are important: the university institutions degree of social selectivity and whether it is has a ‘classic’ university profile (liberal arts) or a more ‘modern’ applied-oriented profile....

  14. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  15. The integration of open access journals in the scholarly communication system: Three science fields

    DEFF Research Database (Denmark)

    Faber Frandsen, Tove

    2009-01-01

    across disciplines. This study is an analysis of the citing behaviour in journals within three science fields: biology, mathematics, and pharmacy and pharmacology. It is a statistical analysis of OAJs as well as non-OAJs including both the citing and cited side of the journal to journal citations......The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences....... The multivariate linear regression reveals many similarities in citing behaviour across fields and media. But it also points to great differences in the integration of OAJs. The integration of OAJs in the scholarly communication system varies considerably across fields. The implications for bibliometric research...

  16. Streamlining On-Demand Access to Joint Polar Satellite System (JPSS) Data Products for Weather Forecasting

    Science.gov (United States)

    Evans, J. D.; Tislin, D.

    2017-12-01

    Observations from the Joint Polar Satellite System (JPSS) support National Weather Service (NWS) forecasters, whose Advanced Weather Interactive Processing System (AWIPS) Data Delivery (DD) will access JPSS data products on demand from the National Environmental Satellite, Data, and Information Service (NESDIS) Product Distribution and Access (PDA) service. Based on the Open Geospatial Consortium (OGC) Web Coverage Service, this on-demand service promises broad interoperability and frugal use of data networks by serving only the data that a user needs. But the volume, velocity, and variety of JPSS data products impose several challenges to such a service. It must be efficient to handle large volumes of complex, frequently updated data, and to fulfill many concurrent requests. It must offer flexible data handling and delivery, to work with a diverse and changing collection of data, and to tailor its outputs into products that users need, with minimal coordination between provider and user communities. It must support 24x7 operation, with no pauses in incoming data or user demand; and it must scale to rapid changes in data volume, variety, and demand as new satellites launch, more products come online, and users rely increasingly on the service. We are addressing these challenges in order to build an efficient and effective on-demand JPSS data service. For example, on-demand subsetting by many users at once may overload a server's processing capacity or its disk bandwidth - unless alleviated by spatial indexing, geolocation transforms, or pre-tiling and caching. Filtering by variable (/ band / layer) may also alleviate network loads, and provide fine-grained variable selection; to that end we are investigating how best to provide random access into the variety of spatiotemporal JPSS data products. Finally, producing tailored products (derivatives, aggregations) can boost flexibility for end users; but some tailoring operations may impose significant server loads

  17. 7 CFR 330.204 - Denial or cancellation of permits; reconsiderations.

    Science.gov (United States)

    2010-01-01

    ...; PLANT PESTS; SOIL, STONE, AND QUARRY PRODUCTS; GARBAGE Movement of Plant Pests § 330.204 Denial or... ground it will involve a danger of dissemination of the plant pest into the State, Territory or...

  18. 20 CFR 404.981 - Effect of Appeals Council's decision or denial of review.

    Science.gov (United States)

    2010-04-01

    ... decision or denial of review. The Appeals Council may deny a party's request for review or it may decide to... law judge if the request for review is denied, is binding unless you or another party file an action...

  19. 44 CFR 6.55 - Appeal of denial of request to amend a record.

    Science.gov (United States)

    2010-10-01

    ... an employee of FEMA and the denial to amend involves a record maintained in the employee's Official... right to file a Statement of Disagreement for distribution in accordance with § 6.56. (4) Notice of the...

  20. 75 FR 8193 - Jeri Hassman, M.D.; Denial of Application

    Science.gov (United States)

    2010-02-23

    ... is buying drugs on the street. Id. at 1006. With respect to requests for early refills, Dr. Hare... Part II Department of Justice Drug Enforcement Administration Jeri Hassman, M.D.; Denial of...; [[Page 8194

  1. Semantics and pragmatics of social influence: how affirmations and denials affect beliefs in referent propositions.

    Science.gov (United States)

    Gruenfeld, D H; Wyer, R S

    1992-01-01

    Ss read either affirmations or denials of target propositions that ostensibly came from either newspapers or reference volumes. Denials of the validity of a proposition that was already assumed to be false increased Ss' beliefs in this proposition. The effect generalized to beliefs in related propositions that could be used to support the target's validity. When denials came from a newspaper, their "boomerang effect" was nearly equal in magnitude to the direct effect of affirming the target proposition's validity. When Ss were asked explicitly to consider the implications of the assertions, however, the impact of denials was eliminated. Affirmations of a target proposition that was already assumed to be true also had a boomerang effect. Results have implications for the effects of both semantic and pragmatic processing of assertions on belief change.

  2. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  3. Incident and Trafficking Database: New Systems for Reporting and Accessing State Information

    International Nuclear Information System (INIS)

    Dimitrovski, D.; Kittley, S.

    2015-01-01

    The IAEA's Incident and Trafficking Database (ITDB) is the Agency's authoritative source for information on incidents in which nuclear and other radioactive material is out of national regulatory control. It was established in 1995 and, as of June 2014, 126 States participate in the ITDB programme. Currently, the database contains over 2500 confirmed incidents, out of which 21% involve nuclear material, 62% radioactive source and 17% radioactively contaminated material. In recent years, the system for States to report incidents to the ITDB has been evolving — moving from fax-based to secure email and most recently to secure on-line reporting. A Beta version of the on-line system was rolled out this June, offering a simple, yet secure, communication channel for member states to provide information. In addition the system serves as a central hub for information related to official communication of the IAEA with Member States so some communication that is traditionally shared by e-mail does not get lost when ITDB counterparts change. In addition the new reporting system incorporates optional features that allow multiple Member State users to collaboratively contribute toward an INF. States are also being given secure on-line access to a streamlined version of the ITDB. This improves States' capabilities to retrieve and analyze information for their own purposes. In addition, on-line access to ITDB statistical information on incidents is available to States through an ITDB Dashboard. The dashboard contains aggregate information on number and types of incidents, material involved, as well some other statistics related to the ITDB that is typically provided in the ITDB Quarterly reports. (author)

  4. Access to medication in the Public Health System and equity: populational health surveys in São Paulo, Brazil.

    Science.gov (United States)

    Monteiro, Camila Nascimento; Gianini, Reinaldo José; Barros, Marilisa Berti de Azevedo; Cesar, Chester Luiz Galvão; Goldbaum, Moisés

    2016-03-01

    Since 2003, the access to medication has been increasing in Brazil and particularly in São Paulo. The present study aimed to analyze the access to medication obtained in the public sector and the socioeconomic differences in this access in 2003 and 2008. Also, we explored the difference in access to medication from 2003 to 2008. Data were obtained from two cross-sectional population-based household surveys from São Paulo, Brazil (ISA-Capital 2003 and ISA-Capital 2008). Concentration curve and concentration index were calculated to analyze the associations between socioeconomic factors and access to medication in the public sector. Additionally, the differences between 2003 and 2008 regarding socioeconomic characteristics and access to medication were studied. Access to medication was 89.55% in 2003 and 92.99% in 2008, and the proportion of access to medication did not change in the period. Access in the public sector increased from 26.40% in 2003 to 48.55% in 2008 and there was a decrease in the concentration index between 2003 and 2008 in access to medication in the public sector. The findings indicate an expansion of Brazilian Unified Health System (Sistema Único de Saúde ) users, with the inclusion of people of higher socioeconomic position in the public sector. As the SUS gives more support to people of lower socioeconomic position in terms of medication provision, the SUS tends to equity. Nevertheless, universal coverage for medication and equity in access to medication in the public sector are still challenges for the Brazilian public health system.

  5. Dairy cows welfare quality in tie-stall housing system with or without access to exercise

    Science.gov (United States)

    2013-01-01

    Background Tie-stall housing of dairy cows is used extensively worldwide, despite of the welfare concerns regarding the restriction of voluntary movement and limitation of expression of the cows’ natural behaviour. The aim of this study was to compare the welfare quality of dairy cows kept in two types of tie-stall housing systems: with regular outdoor exercise and without access to exercise. In addition, the study investigated the relationship between different welfare measures of dairy cows kept in tie-stalls. Methods 3,192 lactating cows were assessed using the Welfare Quality® assessment protocol for cattle in 80 commercial dairy farms, half of the farms providing outdoor access for the animals to exercise. The descriptive statistical indicators were determined for the assessed measures and for the welfare criteria and principle scores. The data obtained in the two housing types were compared and the correlation coefficients were calculated between the different welfare measures. Results The significant differences found between the two housing systems for the majority of the animal based measures indicate the positive effect of exercise on the welfare of tethered cows. Many of the animal welfare parameters correlated with each other. For the farms allowing the cows’ turnout in a paddock, pasture or both, the mean scores for the welfare criteria and principles were higher than for the farms with permanent tethering of the cows, except the criteria absence of prolonged hunger and expression of social behaviours. The lowest scores were obtained for the criterion positive emotional state, in both housing systems. With regard to the overall classification, none of the farms were considered excellent. In the not classified category were only farms with all-year-round tethering of the animals and in the enhanced category only farms where the cows had outdoor access. Conclusions The welfare quality of the investigated dairy cows was significantly better in the

  6. A Real-time License Plate Detection System for Parking Access

    Directory of Open Access Journals (Sweden)

    Roenadi Koesdijarto

    2010-08-01

    Full Text Available The automatic and real-time license plate detection system can be used as an access control entry of vehicles into the parking area. The problem is how to recognize the vehicles that will go into the parking lot and how to recognize various types of license plates in various light conditions quickly and accurately. In this research, the prototype was developed with a detection system to recognize the vehicles that will enter the parking area, and a license plate recognition system. In the license plate recognition system, the Fourier transform and Hidden Markov model method have proposed to detect location of license plate and as characters segmentation to recognize Indonesia license plates. The research results have shown that the developed prototype system has successfully recognized all Indonesia license plates in several of light condition and camera position. The percentage of plate recognition in the real-time experiment is 84.38%, and the average execution time for all recognition process is 5.834 second.

  7. Testing a bedside personal computer Clinical Care Classification System for nursing students using Microsoft Access.

    Science.gov (United States)

    Feeg, Veronica D; Saba, Virginia K; Feeg, Alan N

    2008-01-01

    This study tested a personal computer-based version of the Sabacare Clinical Care Classification System on students' performance of charting patient care plans. The application was designed as an inexpensive alternative to teach electronic charting for use on any laptop or personal computer with Windows and Microsoft Access. The data-based system was tested in a randomized trial with the control group using a type-in text-based-only system also mounted on a laptop at the bedside in the laboratory. Student care plans were more complete using the data-based system over the type-in text version. Students were more positive but not necessarily more efficient with the data-based system. The results demonstrate that the application is effective for improving student nursing care charting using the nursing process and capturing patient care information with a language that is standardized and ready for integration with other patient electronic health record data. It can be implemented on a bedside stand in the clinical laboratory or used to aggregate care planning over a student's clinical experience.

  8. A study for the review of export license through the NSG denial notification

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Sun Do; Yang, Seung Hyo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2012-10-15

    All NSG participating members that have rejected applications of export licenses for nuclear export control items within their respective countries must give notice of this to the point of contact at NSG. This is referred to as the Denial Notification, and each of the participating members must respect the denial notifications of the other member nations. When participating members seek to obtain approval for an export license that is essentially identical to the denial notification of other member nations, they must necessarily go through the process of prior discussion with the nation that gave the denial notification. Also, it is regulated that the export license must not be approved without the sufficient exchange of information. Thus, these records of denial notifications must be constantly checked and maintained as the latest updated information and these records must be utilized in related approval examinations. This study analyzes the denial notifications that have been recorded in the past 20 years and it describes the areas that must be mainly examined at the export and import licensing.

  9. 45 CFR 310.40 - What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D...

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D Systems and Office Automation? 310.40 Section 310.40... COMPUTERIZED TRIBAL IV-D SYSTEMS AND OFFICE AUTOMATION Accountability and Monitoring Procedures for...

  10. An approach to assessing multicity implementation of healthful food access policy, systems, and environmental changes.

    Science.gov (United States)

    Silberfarb, Laura Oliven; Savre, Sonja; Geber, Gayle

    2014-04-24

    Local governments play an increasingly important role in improving residents' access to healthful food and beverages to reduce obesity and chronic disease. Cities can use multiple strategies to improve community health through, for example, land use and zoning policies, city contracting and procurement practices, sponsorship of farmers markets and community gardens, and vending and concession practices in parks and recreation facilities. With 41 cities in the Hennepin County Human Services and Public Health Department jurisdiction, the county undertook to measure the extent to which cities were engaged in making policy, systems, and environmental (PSE) changes to increase residents' access to healthful food. The results revealed that some cities, particularly those with higher resident demand for healthful food, are making nationally recommended PSE changes, such as sponsoring farmers markets and community gardens. Cities have moved more slowly to make changes in areas with perceived negative cost consequences or lesser public demand, such as parks and recreation vending and concessions. This article describes the assessment process, survey tools, findings, and implications for other health departments seeking to undertake a similar assessment.

  11. New System For Tokamak T-10 Experimental Data Acquisition, Data Handling And Remote Access

    International Nuclear Information System (INIS)

    Sokolov, M. M.; Igonkina, G. B.; Koutcherenko, I. Yu.; Nurov, D. N.

    2008-01-01

    For carrying out the experiments on nuclear fusion devices in the Institute of Nuclear Fusion, Moscow, a system for experimental data acquisition, data handling and remote access (further 'DAS-T10') was developed and has been used in the Institute since the year 2000. The DAS-T10 maintains the whole cycle of experimental data handling: from configuration of data measuring equipment and acquisition of raw data from the fusion device (the Device), to presentation of math-processed data and support of the experiment data archive. The DAS-T10 provides facilities for the researchers to access the data both at early stages of an experiment and well afterwards, locally from within the experiment network and remotely over the Internet.The DAS-T10 is undergoing a modernization since the year 2007. The new version of the DAS-T10 will accommodate to modern data measuring equipment and will implement improved architectural solutions. The innovations will allow the DAS-T10 to produce and handle larger amounts of experimental data, thus providing the opportunities to intensify and extend the fusion researches. The new features of the DAS-T10 along with the existing design principles are reviewed in this paper

  12. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  13. La Resolución de problemas mediante el sistema de aplicación Microsoft Access Problem solving by means of Microsoft Access application system

    Directory of Open Access Journals (Sweden)

    Pablo González Ruíz

    2010-03-01

    and to carry out relationships among these; that is why it is necessary to elaborate a system of exercises considering the levels of cognitive performance which contribute with the development of skills of problem-solving with computers, using Microsoft Access System, and taking into account the following aspects: the design or the table work as a basic premise ( Diagram entity- relation and the Model entity-relation. The system of exercises is based on a quasi-experimental study covering two groups of medical students in 1st academic year in the Medical University, Pinar del Rio municipality. The bases of this research paper are on lecture controls and knowledge checking, which show difficulties in problem-solving when using the Microsoft Access database. The newness of this system is that it envisages the exercises upon a developing perspective of the levels of cognitive performance. The essential conclusion stated is that, with the creation of this system the student will quickly get familiar with the concepts (tables, attributes, field, register, key field and others, before approaching to an informative system, that is to say, a better way of logic thinking is achieved, from the living contemplation to the abstract thinking and from this to the practice as a prove of truth.

  14. Architectural Considerations of Fiber-Radio Millimeter-Wave Wireless Access Systems

    Science.gov (United States)

    Kitayama, Ken-Ichi

    The architecture of fiber-radio mm-wave wireless access systems critically depends upon the optical mm-wave generation and transport techniques. Four optical mm-wave generation and transport techniques: 1) optical self-heterodyning, 2) external modulation, 3) up- and downconversion, and 4) optical transceiver, will be assessed. From the technical viewpoints, their advantages and disadvantages are discussed. The economical assessment, focusing on the cost of a base station BS ( ), will suggest that the optical transceiver looks the most promising in the long run, but in the near future, however, the external modulation will be cost-effective. The experimental results of 60 GHz testbeds using the external modulation will support the conclusion.

  15. Accessible methods for the dynamic time-scale decomposition of biochemical systems.

    Science.gov (United States)

    Surovtsova, Irina; Simus, Natalia; Lorenz, Thomas; König, Artjom; Sahle, Sven; Kummer, Ursula

    2009-11-01

    The growing complexity of biochemical models asks for means to rationally dissect the networks into meaningful and rather independent subnetworks. Such foregoing should ensure an understanding of the system without any heuristics employed. Important for the success of such an approach is its accessibility and the clarity of the presentation of the results. In order to achieve this goal, we developed a method which is a modification of the classical approach of time-scale separation. This modified method as well as the more classical approach have been implemented for time-dependent application within the widely used software COPASI. The implementation includes different possibilities for the representation of the results including 3D-visualization. The methods are included in COPASI which is free for academic use and available at www.copasi.org. irina.surovtsova@bioquant.uni-heidelberg.de Supplementary data are available at Bioinformatics online.

  16. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Science.gov (United States)

    Musick, Charles R [Castro Valley, CA; Critchlow, Terence [Livermore, CA; Ganesh, Madhaven [San Jose, CA; Slezak, Tom [Livermore, CA; Fidelis, Krzysztof [Brentwood, CA

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  17. Multiagent -Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Li Husheng

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of -learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the -learning are illustrated using a Metrick-Polak plot, which shows the traces of -values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent -learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  18. RFID card based access control system with counter for Indus Complex

    International Nuclear Information System (INIS)

    Jathar, M.R.; Vikas, Meshram; Patidar, S.C.

    2015-01-01

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  19. Treatment Trends for Stage I Testicular Seminoma in an Equal-Access Medical System.

    Science.gov (United States)

    Wingate, Jonathan T; Etzioni, Ruth; Macdonald, Dusten M; Brand, Timothy C

    2016-10-01

    The practice patterns for adjuvant therapies for stage I seminoma are rapidly evolving, and surveillance is currently preferred. How these recommendations have affected contemporary practice in an equal-access US population is unknown. A total of 436 men diagnosed with clinical stage IA-IB seminoma from 2001 to 2011 were identified in the Automated Central Tumor Registry (ACTUR). The ACTUR is the cancer registry system for the Department of Defense. Logistic regression models analyzed the association between patient characteristics and adjuvant therapy. Overall and recurrence-free survival were determined from Kaplan-Meier analysis. The use of adjuvant radiotherapy in this population decreased significantly from 2001 to 2011. In 2001, 83.9% of patients received radiotherapy compared with only 24.0% in 2011. During that period, a concomitant increase occurred in the use of chemotherapy from 0% to 38.0%. A later year of diagnosis was significantly associated with a greater rate of receiving chemotherapy relative to radiotherapy (P associated with the receipt of surveillance (P = .412 for 2006-2011 vs. 2001-2005; odds ratio, 0.83; 95% CI, 0.54-1.29). Black race or age was not significantly associated with adjuvant therapy. With a median follow-up period of 4.7 years, the 5-year overall and recurrence-free survival rates were 98.0% and 77.0%, respectively. The use of adjuvant radiotherapy has been replaced by chemotherapy for clinical stage I testicular seminoma in an equal-access system. The lack of an increase in active surveillance in our cohort might represent overtreatment of the population. Published by Elsevier Inc.

  20. New seismic monitoring observation system and data accessibility at Syowa Station

    Directory of Open Access Journals (Sweden)

    Masaki Kanao

    1999-03-01

    Full Text Available The seismic observation system at Syowa Station, East Antarctica was fully replaced in the wintering season of the 38th Japanese Antarctic Research Expedition (JARE-38 in 1996-1998. The old seismographic vault constructed in 1970 was closed at the end of JARE-38 because of cumulative damage to the inner side of the vault by continuous flowing in of water from walls in summer and its freezing in winter. All the seismometers were moved to a new seismographic hut (69°00′24.0″S, 39°35′06.0″E and 20m above mean sea level in April 1997. Seismic signals of the short-period (HES and broadband (STS-1 seismometers in the new hut are transmitted to the Earth Science Laboratory (ESL via analog cable 600m in length. The new acquisition system was installed in the ESL with 6-channel 24-bit A/D converters for both sensor signals. All digitized data are automatically transmitted from the A/D converter to a workstation via TCP/IP protocol. After parallel observations with the old acquisition system by personal computers and the new system during the wintering season of JARE-38,the main system was changed to the new one, which has some advantages for both the reduction of daily maintenance efforts and the data transport/communication processes via Internet by use of LAN at the station. In this report, details of the new seismographic hut and the recording system are described. Additionally, the seismic data accessibility for public use, including Internet service, is described.

  1. Physical protection system using activated barriers

    International Nuclear Information System (INIS)

    Timm, R.E.; Zinneman, T.E.; Haumann, J.R.; Flaugher, H.A.; Reigle, D.L.

    1984-03-01

    The Argonne National Laboratory has recently installed an activated barrier, the Access Denial System, to upgrade its security. The technology of this system was developed in the late 70's by Sandia National Laboratory-Albuquerque. The Argonne National Laboratory is the first Department of Energy facility to use this device. Recent advancements in electronic components provide the total system support that makes the use of an activated barrier viable and desirable. The premise of an activated barrier is that it is deployed after a positive detection of an adversary is made and before the adversary can penetrate vital area. To accomplish this detection, sophisticated alarms, assessment, and communications must be integrated into a system that permits a security inspector to make a positive evaluation and to activate the barrier. The alarm sensor locations are selected to provide protection in depth. Closed circuit television is used with components that permit multiple video frames to be stored for automated, priority-based playback to the security inspector. Further, algorithms permit look-ahead surveillance of vital areas so that the security inspector can activate the access denial system in a timely manner and not be restricted to following the adversaries' penetration path(s)

  2. Insurance denials for cancer clinical trial participation after the Affordable Care Act mandate.

    Science.gov (United States)

    Mackay, Christine B; Antonelli, Kaitlyn R; Bruinooge, Suanna S; Saint Onge, Jarron M; Ellis, Shellie D

    2017-08-01

    The Affordable Care Act (ACA) includes a mandate requiring most private health insurers to cover routine patient care costs for cancer clinical trial participation; however, the impact of this provision on cancer centers' efforts to accrue patients to clinical trials has not been well described. First, members of cancer research centers and community-based institutions (n = 252) were surveyed to assess the status of insurance denials, and then, a focused survey (n = 77) collected denial details. Univariate and multivariate analyses were used to examine associations between the receipt of denials and site characteristics. Overall, 62.7% of the initial survey respondents reported at least 1 insurance denial during 2014. Sites using a precertification process were 3.04 times more likely to experience denials (95% confidence interval, 1.55-5.99; P ≤ .001), and similar rates of denials were reported from sites located in states with preexisting clinical trial coverage laws versus states without them (82.3% vs 85.1%; χ = 50.7; P ≤ .001). Among the focused survey sites, academic centers reported denials more often than community sites (71.4% vs 46.4%). The failure of plans to cover trial participation was cited as the most common reason provided for denials (n = 33 [80.5%]), with nearly 80% of sites (n = 61) not receiving a coverage response from the insurer within 72 hours. Despite the ACA's mandate for most insurers to cover routine care costs for cancer clinical trial participation, denials and delays continue. Denials may continue because some insurers remain exempt from the law, or they may signal an implementation failure. Delays in coverage may affect patient participation in trials. Additional efforts to eliminate this barrier will be needed to achieve federal initiatives to double the pace of cancer research over the next 5 years. Future work should assess the law's effectiveness at the patient level to inform these efforts

  3. A new model with an anatomically accurate human renal collecting system for training in fluoroscopy-guided percutaneous nephrolithotomy access.

    Science.gov (United States)

    Turney, Benjamin W

    2014-03-01

    Obtaining renal access is one of the most important and complex steps in learning percutaneous nephrolithotomy (PCNL). Ideally, this skill should be practiced outside the operating room. There is a need for anatomically accurate and cheap models for simulated training. The objective was to develop a cost-effective, anatomically accurate, nonbiologic training model for simulated PCNL access under fluoroscopic guidance. Collecting systems from routine computed tomography urograms were extracted and reformatted using specialized software. These images were printed in a water-soluble plastic on a three-dimensional (3D) printer to create biomodels. These models were embedded in silicone and then the models were dissolved in water to leave a hollow collecting system within a silicone model. These PCNL models were filled with contrast medium and sealed. A layer of dense foam acted as a spacer to replicate the tissues between skin and kidney. 3D printed models of human collecting systems are a useful adjunct in planning PCNL access. The PCNL access training model is relatively low cost and reproduces the anatomy of the renal collecting system faithfully. A range of models reflecting the variety and complexity of human collecting systems can be reproduced. The fluoroscopic triangulation process needed to target the calix of choice can be practiced successfully in this model. This silicone PCNL training model accurately replicates the anatomic architecture and orientation of the human renal collecting system. It provides a safe, clean, and effective model for training in accurate fluoroscopy-guided PCNL access.

  4. System for accessing a collection of histology images using content-based strategies

    International Nuclear Information System (INIS)

    Gonzalez F; Caicedo J C; Cruz Roa A; Camargo, J; Spinel, C

    2010-01-01

    Histology images are an important resource for research, education and medical practice. The availability of image collections with reference purposes is limited to printed formats such as books and specialized journals. When histology image sets are published in digital formats, they are composed of some tens of images that do not represent the wide diversity of biological structures that can be found in fundamental tissues; making a complete histology image collection available to the general public having a great impact on research and education in different areas such as medicine, biology and natural sciences. This work presents the acquisition process of a histology image collection with 20,000 samples in digital format, from tissue processing to digital image capturing. The main purpose of collecting these images is to make them available as reference material to the academic community. In addition, this paper presents the design and architecture of a system to query and explore the image collection, using content-based image retrieval tools and text-based search on the annotations provided by experts. The system also offers novel image visualization methods to allow easy identification of interesting images among hundreds of possible pictures. The system has been developed using a service-oriented architecture and allows web-based access in http://www.informed.unal.edu.co

  5. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  6. CAC on a MAC: setting up a DOD Common Access Card reader on the Macintosh OS X operating system

    OpenAIRE

    Hopfner, Phil

    2006-01-01

    The Naval Postgraduate School, along with many other Department of Defense (DOD) organizations, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user's Smart Card enables access to DOD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DOD Public Key Infrastructure (PKI). Microsoft Windows systems utilize the ActivCard Gold middleware software to enable CAC reader functionality. This software packag...

  7. Integrating the Land and Air Components in an Anti-Access/Area Denial Environment

    Science.gov (United States)

    2013-06-01

    to his pursuit and bomber squadrons being already tasked to their limits, Fredendall retorted that he had lost 300 men due to enemy actions and the...190 Murray and Scales, The Iraq War, 173. 191 Author’s personal experience as a Close Air Support planner and Strike Package ...in the future the command and control structure will need to support air strike packages transitioning from interdiction and global strike missions to

  8. Improving Standoff Bombing Capacity in the Face of Anti-Access Area Denial Threats

    Science.gov (United States)

    2015-09-01

    threats, there will be a high premium on destroying certain targets early in the conflict. The ability of bombers to operate in A2/AD is a significant...Maximum gross takeoff weight (1,000s of lbs.) Military cargo derivatives Commercial derivatives Legacy bombers 63 Military Cargo Derivative...and other structural modifications for the launcher. The original Boeing design for a 747 CMCA had 90,000 pounds reserved for handling and launch

  9. Risk of infection due to medical interventions via central venous catheters or implantable venous access port systems at the middle port of a three-way cock: luer lock cap vs. luer access split septum system (Q-Syte).

    Science.gov (United States)

    Pohl, Fabian; Hartmann, Werner; Holzmann, Thomas; Gensicke, Sandra; Kölbl, Oliver; Hautmann, Matthias G

    2014-01-25

    Many cancer patients receive a central venous catheter or port system prior to therapy to assure correct drug administration. Even appropriate hygienic intervention maintenance carries the risk of contaminating the middle port (C-port) of a three-way cock (TWC), a risk that increases with the number of medical interventions. Because of the complexity of the cleaning procedure with disconnection and reconnection of the standard luer lock cap (referred as "intervention"), we compared luer lock caps with a "closed access system" consisting of a luer access split septum system with regard to process optimization (work simplification, process time), efficiency (costs) and hygiene (patient safety). For determination of process optimization the workflow of an intervention according to the usual practice and risks was depicted in a process diagram. For determining the actual process costs, we analyzed use of material and time parameters per intervention and used the process parameters for programming the process into a simulation run (n = 1000) to determine the process costs as well as their differences (ACTUAL vs. NOMINAL) within the framework of a discrete event simulation.Additionally cultures were carried out at the TWC C-ports to evaluate possible contamination. With the closed access system, the mean working time of 5.5 minutes could be reduced to 2.97 minutes. The results for average process costs (labour and material costs per use) were 3.92 € for luer lock caps and 2.55 € for the closed access system. The hypothesis test (2-sample t-test, CI 0.95, p-valuerisks (related to material, surroundings, staff handling) could be reduced by 65.38%. In the present research, the closed access system with a divided split septum was superior to conventional luer lock caps. The advantage of the closed access system lies in the simplified handling for staff, which results in a reduced risk of patient infection due to improved clinical hygiene.

  10. Beat Noise Cancellation in 2-D Optical Code-Division Multiple-Access Systems Using Optical Hard-Limiter Array

    Science.gov (United States)

    Dang, Ngoc T.; Pham, Anh T.; Cheng, Zixue

    We analyze the beat noise cancellation in two-dimensional optical code-division multiple-access (2-D OCDMA) systems using an optical hard-limiter (OHL) array. The Gaussian shape of optical pulse is assumed and the impact of pulse propagation is considered. We also take into account the receiver noise and multiple access interference (MAI) in the analysis. The numerical results show that, when OHL array is employed, the system performance is greatly improved compared with the cases without OHL array. Also, parameters needed for practical system design are comprehensively analyzed.

  11. Access to dialysis services: A systematic mapping review based on geographical information systems.

    Science.gov (United States)

    Hoseini, Benyamin; Bagheri, Nasser; Kiani, Behzad; Azizi, Amirabbas; Tabesh, Hamed; Tara, Mahmood

    2018-05-07

    Equitable access to healthcare services constitutes one of the leading priorities of healthcare provision and access to dialysis services (ADS) has an essential impact on patients depending on renal dialysis. The many existing GIS-based ADS evaluations include various spatial and non-spatial factors affecting ADS. We systematically mapped and reviewed the available literature with reference to this area identifying gaps in current GIS-based ADS measurements and developing recommendations for future studies. A threestep, systematic mapping review of the available GIS-related evidence in PubMed, Embase, Web of science, Scopus, Science Direct and IEEE Xplore was performed in May 2016 and the information collected updated October 2017 by two independent selection processes. The quality of the studies was assessed using an informal, mixed-approach scoring system. Out of 1119 literature references identified, 36 were identified and used for final review after removal of duplicates, study screenings and applying inclusion/exclusion criteria. Given the contents of the selected studies, three study groups were identified and 41 factors with potential effects on ADS determined. These studies mainly addressed the potential and/or spatial aspects of ADS. Our systematic mapping review of the evidence revealed that current GIS-based measures of ADS tend to calculate potential ADS instead of a realized one. It was also noted that listed factors affecting ADS were mainly nonspatial bringing forth the hypothesis that designing an integrated ADS index could possibly produce better ADS score than those currently advocated. Some primary and secondary research suggestions are made and a list of recommendations offered.

  12. Access to dialysis services: A systematic mapping review based on geographical information systems

    Directory of Open Access Journals (Sweden)

    Benyamin Hoseini

    2018-05-01

    Full Text Available Equitable access to healthcare services constitutes one of the leading priorities of healthcare provision and access to dialysis services (ADS has an essential impact on patients depending on renal dialysis. The many existing GIS-based ADS evaluations include various spatial and non-spatial factors affecting ADS. We systematically mapped and reviewed the available literature with reference to this area identifying gaps in current GIS-based ADS measurements and developing recommendations for future studies. A threestep, systematic mapping review of the available GIS-related evidence in PubMed, Embase, Web of science, Scopus, Science Direct and IEEE Xplore was performed in May 2016 and the information collected updated October 2017 by two independent selection processes. The quality of the studies was assessed using an informal, mixed-approach scoring system. Out of 1119 literature references identified, 36 were identified and used for final review after removal of duplicates, study screenings and applying inclusion/exclusion criteria. Given the contents of the selected studies, three study groups were identified and 41 factors with potential effects on ADS determined. These studies mainly addressed the potential and/or spatial aspects of ADS. Our systematic mapping review of the evidence revealed that current GIS-based measures of ADS tend to calculate potential ADS instead of a realized one. It was also noted that listed factors affecting ADS were mainly nonspatial bringing forth the hypothesis that designing an integrated ADS index could possibly produce better ADS score than those currently advocated. Some primary and secondary research suggestions are made and a list of recommendations offered.

  13. 28 CFR 16.70 - Exemption of the Office of the Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ....70 Exemption of the Office of the Attorney General System—limited access. (a) The following system of...); and (g): (1) General Files System of the Office of the Attorney General (JUSTICE/OAG-001). These... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Office of the Attorney...

  14. Creating a Front Porch in Systems of Care: Improving Access to Behavioral Health Services for Diverse Children and Families

    Science.gov (United States)

    Callejas, Linda M.; Hernandez, Mario; Nesman, Teresa; Mowery, Debra

    2010-01-01

    Despite recognition of the central role that service accessibility (and availability) should assume within a system of care, the definition proposed in the feature article of this special issue does not identify specific factors that systems of care must take into account in order to serve diverse children with serious emotional disturbance and…

  15. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    Science.gov (United States)

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being poured...

  16. User-Based Information Retrieval System Interface Evaluation: An Examination of an On-Line Public Access Catalog.

    Science.gov (United States)

    Hert, Carol A.; Nilan, Michael S.

    1991-01-01

    Presents preliminary data that characterizes the relationship between what users say they are trying to accomplish when using an online public access catalog (OPAC) and their perceptions of what input to give the system. Human-machine interaction is discussed, and appropriate methods for evaluating information retrieval systems are considered. (18…

  17. Database Quality and Access Issues Relevant to Research Using Anesthesia Information Management System Data.

    Science.gov (United States)

    Epstein, Richard H; Dexter, Franklin

    2018-07-01

    For this special article, we reviewed the computer code, used to extract the data, and the text of all 47 studies published between January 2006 and August 2017 using anesthesia information management system (AIMS) data from Thomas Jefferson University Hospital (TJUH). Data from this institution were used in the largest number (P = .0007) of papers describing the use of AIMS published in this time frame. The AIMS was replaced in April 2017, making this finite sample finite. The objective of the current article was to identify factors that made TJUH successful in publishing anesthesia informatics studies. We examined the structured query language used for each study to examine the extent to which databases outside of the AIMS were used. We examined data quality from the perspectives of completeness, correctness, concordance, plausibility, and currency. Our results were that most could not have been completed without external database sources (36/47, 76.6%; P = .0003 compared with 50%). The operating room management system was linked to the AIMS and was used significantly more frequently (26/36, 72%) than other external sources. Access to these external data sources was provided, allowing exploration of data quality. The TJUH AIMS used high-resolution timestamps (to the nearest 3 milliseconds) and created audit tables to track changes to clinical documentation. Automatic data were recorded at 1-minute intervals and were not editable; data cleaning occurred during analysis. Few paired events with an expected order were out of sequence. Although most data elements were of high quality, there were notable exceptions, such as frequent missing values for estimated blood loss, height, and weight. Some values were duplicated with different units, and others were stored in varying locations. Our conclusions are that linking the TJUH AIMS to the operating room management system was a critical step in enabling publication of multiple studies using AIMS data. Access to this and

  18. Teenage sexuality and rights in Chile: from denial to punishment.

    Science.gov (United States)

    Casas, Lidia; Ahumada, Claudia

    2009-11-01

    While Chile sees itself as a country that has fully restored human rights since its return to democratic rule in 1990, the rights of teenagers to comprehensive sexuality education are still not being met. This paper reviews the recent history of sexuality education in Chile and related legislation, policies and programmes. It also reports a 2008 review of the bylaws of 189 randomly selected Chilean schools, which found that although such bylaws are mandatory, the absence of bylaws to prevent discrimination on grounds of pregnancy, HIV and sexuality was common. In relation to how sexual behaviour and discipline were addressed, bylaws that were non-compliant with the law were very common. Opposition to sexuality education in schools in Chile is predicated on the denial of teenage sexuality, and many schools punish sexual behaviour where transgression is perceived to have taken place. While the wider Chilean society has been moving towards greater recognition of individual autonomy and sexual diversity, this cultural shift has yet to be reflected in the government's political agenda, in spite of good intentions. Given this state of affairs, the Chilean polity needs to recognise its youth as having human rights, or will continue to fail in its commitment to them.

  19. Words as masks: About the importance of denial in management

    Directory of Open Access Journals (Sweden)

    Agnès Vandevelde-Rougale

    2017-03-01

    Full Text Available This article draws on a socio-anthropological research, which questions the effects of managerial discourse on the individual by considering experiences of workplace bullying. It studies the observation that despite the gap between what management says and what management does, words of managerial discourse are still widely used, by managers and employees alike. French philosopher, ethnologist and psychoanalyst Octave Mannoni (1899-1989, reworking Freud’s concept of fetishism, showed in an article entitled “I know very well, but nonetheless…” that a belief can survive the denial (disavowal of reality. Recognizing fantasy as a fantasy is not sufficient to reduce its power over the individual. Based on a case study, the present article demonstrates that the paradoxical logic phrased by Octave Mannoni can help us understand how managerial discourse can exercise its influence on individuals, despite discrepancies between what is said and what is implemented in the organisations. It presents the hypothesis that words can work as “masks” do in some traditional tribes, thus being the means supporting a belief that sustains management authority.

  20. A multi-agent conversational system with heterogeneous data sources access

    KAUST Repository

    Eisman, Eduardo M.

    2016-01-28

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  1. Performance analysis of commercial multiple-input-multiple-output access point in distributed antenna system.

    Science.gov (United States)

    Fan, Yuting; Aighobahi, Anthony E; Gomes, Nathan J; Xu, Kun; Li, Jianqiang

    2015-03-23

    In this paper, we experimentally investigate the throughput of IEEE 802.11n 2x2 multiple-input-multiple-output (MIMO) signals in a radio-over-fiber-based distributed antenna system (DAS) with different fiber lengths and power imbalance. Both a MIMO-supported access point (AP) and a spatial-diversity-supported AP were separately employed in the experiments. Throughput measurements were carried out with wireless users at different locations in a typical office environment. For the different fiber length effect, the results indicate that MIMO signals can maintain high throughput when the fiber length difference between the two remote antenna units (RAUs) is under 100 m and falls quickly when the length difference is greater. For the spatial diversity signals, high throughput can be maintained even when the difference is 150 m. On the other hand, the separation of the MIMO antennas allows additional freedom in placing the antennas in strategic locations for overall improved system performance, although it may also lead to received power imbalance problems. The results show that the throughput performance drops in specific positions when the received power imbalance is above around 13 dB. Hence, there is a trade-off between the extent of the wireless coverage for moderate bit-rates and the area over which peak bit-rates can be achieved.

  2. A multi-agent conversational system with heterogeneous data sources access

    KAUST Repository

    Eisman, Eduardo M.; Navarro, Marí a; Castro, Juan Luis

    2016-01-01

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  3. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems.

    Science.gov (United States)

    Shehzad, Danish; Bozkuş, Zeki

    2016-01-01

    Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.

  4. The Earth System Grid Federation : an Open Infrastructure for Access to Distributed Geospatial Data

    Science.gov (United States)

    Cinquini, Luca; Crichton, Daniel; Mattmann, Chris; Harney, John; Shipman, Galen; Wang, Feiyi; Ananthakrishnan, Rachana; Miller, Neill; Denvil, Sebastian; Morgan, Mark; hide

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  5. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems

    Directory of Open Access Journals (Sweden)

    Danish Shehzad

    2016-01-01

    Full Text Available Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.

  6. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  7. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  8. EMODnet Physics: One-stop Portal to access Multiplatform Observing Systems

    Science.gov (United States)

    Novellino, Antonio; Benedetti, Giacomo; D'Angelo, Paolo; Gorringe, Patrick; Thjisse, Peter; Schaap, Dick; Pouliquen, Sylvie; Manzella, Giuseppe

    2016-04-01

    The EMODnet Physics is being developed through a stepwise approach in three major stages and is currently in its second phase of development (2013 - 2016). It is a one-stop portal to access to near real time and historical achieved data sets. It provides a combined array of services and functionalities (such as dynamic map facility for viewing and downloading, dashboard reporting and machine-to-machine communication services) to users for obtaining free of charge data, meta-data and data products on the physical conditions of European sea basins and oceans. Moreover, the system provides full interoperability with third-party software through WMS service, Web Service and Web catalogues in order to exchange data and products according to the most recent standards. In particular, interoperability is assured with the IODE Ocean Data Portal with which EMODnet Physics is collaborating. EMODnet Physics is built on and it is working in coordination and cooperation EuroGOOS-ROOSs, CMEMS and the SeaDataNet network of NODCs. By means of joint activities with its three pillars and with the most relevant Organizations and associations within the sector, EMODnet is undergoing significant improvements and expansion. In the last year, EMODnet Physics has steadily enhanced the number and type of platforms covered providing high quality data integrating sources from a growing network. In particular, a major step forward sees the integration of emerging measuring systems such as HF radars, which are able to provide the resolution of surface current speeds and directions covering large regions of the coastal oceans, and that now do populate the EMODnet Platform. Nowadays the system does integrate information by more than 7.300 stations, among which 2915 moorings, 2728 drifting buoys and around 1200 ARGO floats. EMODnet Physics was also updated with two ready-to-use data products: the Ice (Copernicus CMEMS - SEAICE_GLO_SEAICE_L4_NRT_OBSERVATIONS_011_001) and Sea Level Trends (produced

  9. Advanced physical protection systems for nuclear materials

    International Nuclear Information System (INIS)

    Jones, O.E.

    1975-10-01

    Because of the increasing incidence of terrorism, there is growing concern that nuclear materials and facilities need improved physical protection against theft, diversion, or sabotage. Physical protection systems for facilities or transportation which have balanced effectiveness include information systems, access denial systems, adequate and timely response, recovery capability, and use denial methods for despoiling special nuclear materials (SNM). The role of these elements in reducing societal risk is described; however, it is noted that, similar to nuclear war, the absolute risks of nuclear theft and sabotage are basically unquantifiable. Sandia Laboratories has a major Energy Research and Development Administration (ERDA) role in developing advanced physical protection systems for improving the security of both SNM and facilities. These activities are surveyed. A computer simulation model is being developed to assess the cost-effectiveness of alternative physical protection systems under various levels of threat. Improved physical protection equipment such as perimeter and interior alarms, secure portals, and fixed and remotely-activated barriers is being developed and tested. In addition, complete prototype protection systems are being developed for representative nuclear facilities. An example is shown for a plutonium storage vault. The ERDA safe-secure transportation system for highway shipments of all significant quantities of government-owned SNM is described. Adversary simulation as a tool for testing and evaluating physical protection systems is discussed. A list of measures is given for assessing overall physical protection system performance. (auth)

  10. Advanced physical protection systems for nuclear materials

    International Nuclear Information System (INIS)

    Jones, O.E.

    1976-01-01

    Because of the increasing incidence of terrorism, there is growing concern that nuclear materials and facilities need improved physical protection against theft, diversion, or sabotage. Physical protection systems for facilities or transportation which have balanced effectiveness include information systems, access denial systems, adequate and timely response, recovery capability, and use denial methods for despoiling special nuclear materials (SNM). The role of these elements in reducing societal risk is described; however, it is noted that, similar to nuclear war, the absolute risks of nuclear theft and sabotage are basically unquantifiable. Sandia Laboratories has a major US Energy Research and Development Administration (ERDA) role in developing advanced physical protection systems for improving the security of both SNM and facilities. These activities are surveyed in this paper. A computer simulation model is being developed to assess the cost-effectiveness of alternative physical protection systems under various levels of threat. Improved physical protection equipment such as perimeter and interior alarms, secure portals, and fixed and remotely activated barriers is being developed and tested. In addition, complete prototype protection systems are being developed for representative nuclear facilities. An example is shown for a plutonium storage vault. The ERDA safe-secure transportation system for highway shipments of all significant quantities of government-owned SNM is described. Adversary simulation as a tool for testing and evaluating physical protection systems is discussed. Finally, a list of measures is given for assessing overall physical protection system performance. (author)

  11. Land Based Anti-Ship Missiles: A Complementary Capability for Maintaining Access in an Anti-Access/Area Denial Environment

    Science.gov (United States)

    2014-12-01

    expense of naval aviation , anti-submarine, and amphibious warfare. The Army Air Corps overemphasized bombing at the expense of close air support for...oil and natural gas pipelines in Myanmar . An aggressive air and sea campaign against the PLA Navy and the Second Artillery Corps is conducted in an...These include an “Asian Panama Canal” through Kra Isthmus in Thailand and developing an oil pipeline through Myanmar . Over the course of the last year

  12. Access to fertility services by transgender persons: an Ethics Committee opinion.

    Science.gov (United States)

    2015-11-01

    This statement explores the ethical considerations surrounding the provision of fertility services to transgender individuals and concludes that denial of access to fertility services is not justified. Copyright © 2015 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  13. "But I didn't do it!": ethical treatment of sex offenders in denial.

    Science.gov (United States)

    Levenson, Jill S

    2011-09-01

    This article addresses ethical questions and issues related to the treatment of sex offenders in denial, using the empirical research literature and the ethical codes of American Psychological Association (APA) and National Association of Social Workers (NASW) to guide the ethical decision-making process. The empirical literature does not provide an unequivocal link between denial and recidivism, though some studies suggest that decreased denial and increased accountability appear to be associated with greater therapeutic engagement and reduced recidivism for some offenders. The ethical codes of APA and NASW value the client's self-determination and autonomy, and psychologists and social workers have a duty to empower individual well-being while doing no harm to clients or others. Clinicians should view denial not as a categorical construct but as a continuum of distorted cognitions requiring clinical attention. Denial might also be considered as a responsivity factor that can interfere with treatment progress. Offering a reasonable time period for therapeutic engagement might provide a better alternative than automatically refusing treatment to categorical deniers.

  14. Climate Change Denial Books and Conservative Think Tanks: Exploring the Connection.

    Science.gov (United States)

    Dunlap, Riley E; Jacques, Peter J

    2013-06-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites.

  15. Silence and Denial in Everyday Life—The Case of Animal Suffering

    Directory of Open Access Journals (Sweden)

    Deidre Wicks

    2011-02-01

    Full Text Available How can we make sense of the fact that we live in a world where good people co-exist in silence about widespread animal suffering. How is it that sites of suffering such as laboratories, factory farms, abattoirs and animal transportation are all around us and yet we ‘do not, in a certain sense, know about them’ [1]. This ‘not knowing’ is one of the most difficult barriers for animal activists who must constantly develop new strategies in an attempt to catch public attention and translate it into action. Recent contributions from the ‘sociology of denial’ have elucidated many of the mechanisms involved in ‘not knowing’ in relation to human atrocities and genocide. In this context, ‘denial’ refers to the maintenance of social worlds in which an undesirable situation is unrecognized, ignored or made to seem normal [2]. These include different types of denial: personal, official and cultural, as well as the process of normalization whereby suffering becomes invisible through routinization, tolerance, accommodation, collusion and cover up. Denial and normalization reflect both personal and collective states where suffering is not acknowledged [3]. In this paper, I will examine insights from the sociology of denial and apply them to human denial and normalization of animal suffering. This will include an examination of denial which is both individual and social and the implications of these insights for theory and practice in the human/animal relationship.

  16. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  17. Current status of the European contribution to the Remote Data Access System of the ITER Remote Experimentation Centre

    International Nuclear Information System (INIS)

    De Tommasi, G.; Manduchi, G.; Muir, D.G.; Ide, S.; Naito, O.; Urano, H.; Clement-Lorenzo, S.; Nakajima, N.; Ozeki, T.; Sartori, F.

    2015-01-01

    The ITER Remote Experimentation Centre (REC) is one of the projects under implementation within the BA agreement. The final objective of the REC is to allow researchers to take part in the experimentation on ITER from a remote location. Before ITER first operations, the REC will be used to evaluate ITER-relevant technologies for remote participation. Among the different software tools needed for remote participation, an important one is the Remote Data Access System (RDA), which provides a single software infrastructure to access data stored at the remotely participating experiment, regardless of the geographical location of the users. This paper introduces the European contribution to the RDA system for the REC.

  18. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2011-09-29

    ... ``access'' to copyrighted works, e.g., decryption or hacking of access controls such as passwords or serial... availability for use of copyrighted works is whether the measure supports a distribution model that benefits... work, those limitations may benefit the public by providing ``use-facilitating'' models that allow...

  19. Overview of Radio Resource Management (RRM) issues in multi-radio access systems

    NARCIS (Netherlands)

    Jorguseski, L.; Prasad, R.

    2004-01-01

    The concept of multi-radio access networks is currently considered as a strong candidate for the next generation wireless access networks. This concept incorporates conventional cellular networks such as GERAN or UTRAN for wide area coverage while local-area networks such as IEEE 802.11, HIPERLAN/2,

  20. System Design and Cataloging Meet the User: User Interfaces to Online Public Access Catalogs.

    Science.gov (United States)

    Yee, Martha M.

    1991-01-01

    Discusses features of online public access catalogs: (1) demonstration of relationships between records; (2) provision of entry vocabularies; (3) arrangement of multiple entries on the screen; (4) provision of access points; (5) display of single records; and (6) division of catalogs into separate files or indexes. User studies and other research…

  1. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  2. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    Science.gov (United States)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  3. Research on the Design of Visually Impaired Interactive Accessibility in Large Urban Public Transport System

    Science.gov (United States)

    Zhang, Weiru

    2017-12-01

    In medieval times, due to people’s reliance on belief, public space of Christianity came into being. With the rise of secularization, religion gradually turned into private belief, and accordingly public space returned to private space. In the 21st century, due to people’s reliance on intelligent devices, information-interactive public space emerges, and as information interaction is constantly constraining the visually impaired, public space regressed to the exclusive space of limited people[1]. Modernity is marked by technical rationality, but an ensuing basic problem lies in the separation between human action, ethics and public space. When technology fails to overcome obstacles for a particular group, the gap between the burgeoning intelligent phenomena and the increasing ratio of visually impaired is also expanding, ultimately resulting in a growing number of “blind spots” in information-interactive space. Technological innovation not only promotes the development of the information industry, but also promotes the rapid development of the transportation industry. Traffic patterns are diversifying and diverging nowadays, but it’s a fatal blow for people with visually disabilities, Because they still can only experience the most traditional mode of transportation, sometimes even not go out. How to guarantee their interactive accessibility in large urban public transport system right, currently, is a very important research direction.

  4. Robotics and telecommunication systems to provide better access to ultrasound expertise in the OR.

    Science.gov (United States)

    Angelini, L; Papaspyropoulos, V

    2000-01-01

    Surgery has begun to evolve as a result of the intense use of technological innovations. The result of this is better services for patients and enormous opportunities for the producers of biomedical instruments. The surgeon and the technologist are fast becoming allies in applying the latest developments of robotics, image treatment, simulation, sensors and telecommunications to surgery, in particular to the emerging field of minimally-invasive surgery. Ultrasonography is at present utilised both for diagnostic and therapeutic purposes in various fields. Intraoperative US examination can be of primary importance, especially when dealing with space-occupying lesions. The widening use of minimally-invasive surgery has furthered the development of US for use during this type of surgery. The success of a US examination requires not only a correct execution of the procedure, but also a correct interpretation of the images. We describe two projects that combine robotics and telecommunication systems to provide better access to US expertise in the operating room. The Midstep project has as its object the realisation of two robotic arms, one for the distant control of the US probe during laparoscopic surgery and the second to perform tele-interventional US. The second project, part of the Strategic CNR Project-'Robotics in Surgery', involves the realisation of a common platform for tracking and targeting surgical instruments in video-assisted surgery.

  5. An evaluation of the Cortrak Enteral access system in our intensive care.

    LENUS (Irish Health Repository)

    Dolan, A M

    2012-05-01

    Appropriate nutrition is considered a cornerstone of Intensive care; however its successful initiation is frequently impeded by decreased gastric emptying secondary to opiates, sepsis, or ileus. The presence of a postpyloric tube will guarantee delivery of calories while reducing the incidence of reflux and aspiration. Enteral nutrition is approximately 100 fold cheaper than parenteral nutrition. A nasojejunal tube may be placed blindly (success 15%), by direct vision with a gastroscope, or under fluoroscopic guidance in the X-ray department. This study examines the use of the Cortrak Enteral access system (CEAS) in placement of nasojejunal tubes, a method facilitated by the use of an electromagnet. A retrospective review was conducted to evaluate the effectiveness of the CEAS for establishing nasojejunal feeding in the Intensive Care Unit (ICU) between January and December 2010. Our results found that the CEAS was successful in positioning a nasojejunal tube in ten out of twelve patients (83% success rate). Successful placement was confirmed by portable abdominal \\/ chest x-ray. Placement took an average of 30 minutes, and prokinetic agents were used to facilitate two placements. The duration of successful enteral nutrition varied from 2 to 15 days post placement. The CEAS is a simple bedside tool for placing postpyloric tubes. While there is a learning curve associated with its use, it may confer significant benefits to individual patients and also to those responsible for ever shrinking budgets.

  6. Radiation alarms and access control systems: Recommendations of the National Council on Radiation Protection and Measurements

    International Nuclear Information System (INIS)

    1986-01-01

    In facilities where radioactive materials are handled, or where radiation-producing equipment is used, the building, the equipment, and the associated safety procedures should be designed and developed together to provide a safe work environment. The specific combination of requirements for a given facility is defined by the operational radiation safety program. It should be emphasized that this report describes a range of alarm and access control systems that can provide an acceptable level of safety at many types of facilities. Depending on circumstances, the solutions offered may not be appropriate for certain facilities because they are to restrictive, not restrictive enough, or do not cover all circumstances. The document is offered as a starting point providing ideas that professional health physicists can adapt to meet the needs of a particular situation. Under no circumstances should this report be interpreted in ''cookbook'' fashion, with literal adherence to every recommendation demanded, nor should it be expected to provide adequate protection in every case without consideration of local conditions

  7. Patient-reported denials, appeals, and complaints: associations with overall plan ratings.

    Science.gov (United States)

    Quigley, Denise D; Haviland, Amelia M; Dembosky, Jacob W; Klein, David J; Elliott, Marc N

    2018-03-01

    To assess whether Medicare patients' reports of denied care, appeals/complaints, and satisfactory resolution were associated with ratings of their health plan or care. Retrospective analysis of 2010 Medicare Advantage Consumer Assessment of Healthcare Providers and Systems (CAHPS) survey data. Multivariate linear regression of data from 154,766 respondents (61.1% response rate) tested the association of beneficiary ratings of plan and care with beneficiary reports of denied care, appeals, complaints, and complaint resolution, adjusting for beneficiary demographics. Beneficiaries who reported being denied needed care rated their plans and care significantly less positively, by 17.2 points (on a 100-point scale) and 9.1 points, respectively. Filing an appeal was not statistically significantly associated with further lower ratings. Beneficiaries who filed a complaint that was satisfactorily resolved gave slightly lower ratings of plans (-3.4 points) and care (-2.5 points) than those not filing a complaint (P plans. Our results suggest that beneficiaries may attribute the actions that lead to complaints or denials to plans more than to the care they received. Successful complaint resolution and utilization management review might eliminate most deficits associated with complaints and denied care, consistent with the service recovery paradox. High rates of complaints and denied care might identify areas that need improved utilization management review, customer service, and quality improvement. Among those reporting being denied care, filing an appeal was not associated with lower patient ratings of plan or care.

  8. Proactive Routing Mutation Against Stealthy Distributed Denial of Service Attacks – Metrics, Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat; Halappanavar, Mahantesh; Oehmen, Christopher S.

    2018-04-01

    The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility on enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.

  9. Gaining Access.

    Science.gov (United States)

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  10. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally......We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...

  11. 78 FR 22876 - Rodenticides; Notice of Intent To Cancel Registrations of, and Notice of Denial of Applications...

    Science.gov (United States)

    2013-04-17

    ... ENVIRONMENTAL PROTECTION AGENCY [FIFRA Docket No. 661; FRL-9804-2] Rodenticides; Notice of Intent To Cancel Registrations of, and Notice of Denial of Applications for, Certain Rodenticide Bait... to the Notice of Intent to Cancel Registration of, and Notice of Denial of Application for, Certain...

  12. 78 FR 49411 - Denial of Petitions for Reconsideration of Regulation of Fuels and Fuel Additives: 2013 Biomass...

    Science.gov (United States)

    2013-08-14

    ...-AR55 Denial of Petitions for Reconsideration of Regulation of Fuels and Fuel Additives: 2013 Biomass... Fuel Additives: 2013 Biomass-Based Diesel Renewable Fuel Volume. DATES: EPA's denials of the petitions... requires that EPA determine the applicable volume of biomass-based diesel to be used in setting annual...

  13. 42 CFR 476.93 - Opportunity to discuss proposed initial denial determination and changes as a result of a DRG...

    Science.gov (United States)

    2010-10-01

    ... determination and changes as a result of a DRG validation. 476.93 Section 476.93 Public Health CENTERS FOR... initial denial determination and changes as a result of a DRG validation. Before a QIO reaches an initial denial determination or makes a change as a result of a DRG validation, it must— (a) Promptly notify the...

  14. 42 CFR 476.85 - Conclusive effect of QIO initial denial determinations and changes as a result of DRG validations.

    Science.gov (United States)

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.85 Section 476.85 Public Health CENTERS FOR... denial determinations and changes as a result of DRG validations. A QIO initial denial determination or change as a result of DRG validation is final and binding unless, in accordance with the procedures in...

  15. 42 CFR 476.96 - Review period and reopening of initial denial determinations and changes as a result of DRG...

    Science.gov (United States)

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.96 Section 476.96 Public Health CENTERS FOR... initial denial determinations and changes as a result of DRG validations. (a) General timeframe. A QIO or... initial denial determination or a change as a result of a DRG validation. (b) Extended timeframes. (1) An...

  16. 24 CFR 960.204 - Denial of admission for criminal activity or drug abuse by household members.

    Science.gov (United States)

    2010-04-01

    ... activity or drug abuse by household members. 960.204 Section 960.204 Housing and Urban Development... HOUSING Admission § 960.204 Denial of admission for criminal activity or drug abuse by household members. (a) Required denial of admission—(1) Persons evicted for drug-related criminal activity. The PHA...

  17. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources.

    Directory of Open Access Journals (Sweden)

    Ming-Yueh Tsay

    Full Text Available This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic, two aggregate institutional repositories (OAIster and OpenDOAR, and two physics-related open sources (arXiv.org and Astrophysics Data System. The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.

  18. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources.

    Science.gov (United States)

    Tsay, Ming-Yueh; Wu, Tai-Luan; Tseng, Ling-Li

    2017-01-01

    This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic), two aggregate institutional repositories (OAIster and OpenDOAR), and two physics-related open sources (arXiv.org and Astrophysics Data System). The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.

  19. National Geothermal Data System: Transforming the Discovery, Access, and Analytics of Data for Geothermal Exploration

    Energy Technology Data Exchange (ETDEWEB)

    Patten, Kim [Arizona Geological Survey

    2013-05-01

    Compendium of Papers from the 38th Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California February 11-13, 2013 The National Geothermal Data System (NGDS) is a distributed, interoperable network of data collected from state geological surveys across all fifty states and the nation’s leading academic geothermal centers. The system serves as a platform for sharing consistent, reliable, geothermal-relevant technical data with users of all types, while supplying tools relevant for their work. As aggregated data supports new scientific findings, this content-rich linked data ultimately broadens the pool of knowledge available to promote discovery and development of commercial-scale geothermal energy production. Most of the up-front risks associated with geothermal development stem from exploration and characterization of subsurface resources. Wider access to distributed data will, therefore, result in lower costs for geothermal development. NGDS is on track to become fully operational by 2014 and will provide a platform for custom applications for accessing geothermal relevant data in the U.S. and abroad. It is being built on the U.S. Geoscience Information Network (USGIN) data integration framework to promote interoperability across the Earth sciences community. The basic structure of the NGDS employs state-of-the art informatics to advance geothermal knowledge. The following four papers comprising this Open-File Report are a compendium of presentations, from the 38th Annual Workshop on Geothermal Reservoir Engineering, taking place February 11-13, 2013 at Stanford University, Stanford, California. “NGDS Geothermal Data Domain: Assessment of Geothermal Community Data Needs,” outlines the efforts of a set of nationwide data providers to supply data for the NGDS. In particular, data acquisition, delivery, and methodology are discussed. The paper addresses the various types of data and metadata required and why simple links to existing

  20. A lottery incentive system to facilitate dialogue and social support for ...

    African Journals Online (AJOL)

    Martin Weihs

    2014-07-15

    Jul 15, 2014 ... This is an Open Access article distributed under the terms of the Creative Commons Attribution License ... higher than 45%, due to stigma, denial, fear and ignorance ... performing the non-stigmatised service of blood donation.