WorldWideScience

Sample records for access denial systems

  1. 41 CFR 51-9.303-4 - Denials of access.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Denials of access. 51-9...-Individual Access to Records § 51-9.303-4 Denials of access. (a) The Executive Director may deny any individual access to his record only on the grounds that the Committee has published rules in the...

  2. 4 CFR 83.14 - Denial of access requests.

    Science.gov (United States)

    2010-01-01

    ... review of a denial of access within 10 working days after receipt of the request. If it is not possible to reach a decision within an additional 10 working days, the requester shall be informed of the approximate date (within 30 working days) when such a decision may be expected. (d) In reaching a...

  3. 24 CFR 16.6 - Initial denial of access.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Initial denial of access. 16.6 Section 16.6 Housing and Urban Development Office of the Secretary, Department of Housing and Urban... consideration, including the identity and address of the appropriate Privacy Appeals Officer. If no...

  4. Operational Reconnaissance for the Anti-Access /Area Denial environment

    Science.gov (United States)

    2015-04-01

    computational power equivalent to two supercomputers.20 This impressive analytical capacity gives the pilot a coherent, real -time understanding of...performing Operational Reconnaissance in Anti-Access/Area Denial (A2/AD) environments. Contested battlespace is radically different from the permissive...AD environment. After gaining access to this airspace, fighters can use a variety of sensors to provide commanders with a real -time understanding of

  5. Automated Image Intelligence Adaptive Sensor Management System for High Altitude Long Endurance UAVs in a Dynamic and Anti-Access Area Denial Environment

    Science.gov (United States)

    Kim, Gi Young

    The problem we investigate deals with an Image Intelligence (IMINT) sensor allocation schedule for High Altitude Long Endurance UAVs in a dynamic and Anti-Access Area Denial (A2AD) environment. The objective is to maximize the Situational Awareness (SA) of decision makers. The value of SA can be improved in two different ways. First, if a sensor allocated to an Areas of Interest (AOI) detects target activity, then the SA value will be increased. Second, the SA value increases if an AOI is monitored for a certain period of time, regardless of target detections. These values are functions of the sensor allocation time, sensor type and mode. Relatively few studies in the archival literature have been devoted to an analytic, detailed explanation of the target detection process, and AOI monitoring value dynamics. These two values are the fundamental criteria used to choose the most judicious sensor allocation schedule. This research presents mathematical expressions for target detection processes, and shows the monitoring value dynamics. Furthermore, the dynamics of target detection is the result of combined processes between belligerent behavior (target activity) and friendly behavior (sensor allocation). We investigate these combined processes and derive mathematical expressions for simplified cases. These closed form mathematical models can be used for Measures of Effectiveness (MOEs), i.e., target activity detection to evaluate sensor allocation schedules. We also verify these models with discrete event simulations which can also be used to describe more complex systems. We introduce several methodologies to achieve a judicious sensor allocation schedule focusing on the AOI monitoring value. The first methodology is a discrete time integer programming model which provides an optimal solution but is impractical for real world scenarios due to its computation time. Thus, it is necessary to trade off the quality of solution with computation time. The Myopic Greedy

  6. Understanding the Anti-Access and Area Denial Threat: An Army Perspective

    Science.gov (United States)

    2015-05-21

    use. Defeat is not defined in JP 1-02, the Joint Dictionary of Military and Associated Terms. 13Matthew E. Davin, Anti-Access/Area Denial: Time to...Robert and Michael D. Cohen. Harnessing Complexity: Organizational Implications of a Scientific Frontier. New York, NY: Basic Books. 2000...Massachusetts Institute of Technology Security Studies Program. 2010. Council on Foreign Relations. “Richard N. Haass: Biography .” Accessed November

  7. Networked control of nonlinear systems under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, C.; Tesi, P.

    2016-01-01

    We investigate the analysis and design of a control strategy for nonlinear systems under Denial-of-Service attacks. Based on an ISS-Lyapunov function analysis, we provide a characterization of the maximal percentage of time that feedback information can be lost without resulting in instability of th

  8. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    2014-01-01

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  9. Denial Logic

    CERN Document Server

    Lengyel, Florian

    2012-01-01

    We define Denial Logic DL, a system of justification logic that models an agent whose justified beliefs are false, who cannot avow his own propositional attitudes and who can believe contradictions but not tautologies of classical propositional logic. Using Artemov's natural semantics for justification logic JL, in which justifications are interpreted as sets of formulas, we provide an inductive construction of models of DL, and prove soundness and completeness results for DL. Some logical notions developed for JL, such as constant specifications and the internalization property, are inconsistent with DL. This leads us to define negative constant specifications for DL, which can be used to model agents with justified false beliefs. Denial logic can therefore be relevant to philosophical skepticism. We use DL with what we call coherent negative constant specifications to model a Putnamian brain in a vat with the justified false belief that it is not a brain in a vat, and derive a model of JL in which "I am a b...

  10. Detection of Denial of Service Attacks against Domain Name System Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Mohd Fadlee A. Rasid

    2009-11-01

    Full Text Available In this paper we introduce an intrusion detection system for Denial of Service (DoS attacks against Domain Name System (DNS. Our system architecture consists of two most important parts: a statistical preprocessor and a neural network classifier. The preprocessor extracts required statistical features in a short-time frame from traffic received by the target name server. We compared three different neural networks for detecting and classifying different types of DoS attacks. The proposed system is evaluated in a simulated network and showed that the best performed neural network is a feed-forward backpropagation with an accuracy of 99%.

  11. Land Based Anti-Ship Missiles: A Complementary Capability for Maintaining Access in an Anti-Access/Area Denial Environment

    Science.gov (United States)

    2014-12-01

    Complete, ebscohost (accessed august 15, 2014). Chandrashekar, S., N. Genesh, C.R. Raghunath, Rajaram Nagappa, N. Ramani, and Lalitha Sundaresan...Corporation, 2013. Hailan, Ye. "Safe Seas." Beijing Review 52, no. 13 (April 2009): 10-11. Accessed on July 29, 2014 from EBSCOhost Hastings, Max and...History and Life with Full Text, EBSCOhost . Accessed July 10, 2014, http://people.reed.edu/~ahm/Courses/Reed-POL-359-2011- S3_WTW/Syllabus/EReadings/03.2

  12. Airpower Projection in the Anti-Access/Area Denial Environment: Dispersed Operations

    Science.gov (United States)

    2015-02-01

    Force briefly employed small teams for the Ground Launched Cruise Missiles ( GLCM ) in Europe in the 1980s. These teams were comprised of the operations... GLCM – From Concept to Mission Complete,” 3. 38 Misiak to the author, email. 39Bowie, The Anti-Access Threat and Theater Air Bases, 53-56. 40 Schanz...202015/February %2020%202015/Places,-Bases,-and-Faces-in-the-Asia-Pacific.aspx (Accessed 21 February 2015). Simpson, Charlie. “ GLCM – From Concept

  13. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  14. ACCESS Pointing Control System

    Science.gov (United States)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  15. Towards Accessible Search Systems

    NARCIS (Netherlands)

    Serdyukov, Pavel; Hiemstra, Djoerd; Ruthven, Ian

    2010-01-01

    The SIGIR workshop Towards Accessible Search Systems was the first workshop in the field to raise the discussion on how to make search engines accessible for different types of users. We report on the results of the workshop that was held on 23 July 2010 in conjunction with the 33rd Annual ACM SIGIR

  16. 76 FR 51120 - Denial of Motor Vehicle Defect Petition

    Science.gov (United States)

    2011-08-17

    ... National Highway Traffic Safety Administration Denial of Motor Vehicle Defect Petition AGENCY: National Highway Traffic Safety Administration (NHTSA), Department of Transportation. ACTION: Denial of motor... System (FARS) tracks all fatal crashes involving motor vehicles in the United States. An analysis...

  17. Imprisoned and imperiled: access to HIV and TB prevention and treatment, and denial of human rights, in Zambian prisons

    Directory of Open Access Journals (Sweden)

    Todrys Katherine W

    2011-02-01

    Full Text Available Abstract Background Although HIV and tuberculosis (TB prevalence are high in prisons throughout sub-Saharan Africa, little research has been conducted on factors related to prevention, testing and treatment services. Methods To better understand the relationship between prison conditions, the criminal justice system, and HIV and TB in Zambian prisons, we conducted a mixed-method study, including: facility assessments and in-depth interviews with 246 prisoners and 30 prison officers at six Zambian prisons; a review of Zambian legislation and policy governing prisons and the criminal justice system; and 46 key informant interviews with government and non-governmental organization officials and representatives of international agencies and donors. Results The facility assessments, in-depth interviews and key informant interviews found serious barriers to HIV and TB prevention and treatment, and extended pre-trial detention that contributed to overcrowded conditions. Disparities both between prisons and among different categories of prisoners within prisons were noted, with juveniles, women, pre-trial detainees and immigration detainees significantly less likely to access health services. Conclusions Current conditions and the lack of available medical care in Zambia's prisons violate human rights protections and threaten prisoners' health. In order to protect the health of prisoners, prison-based health services, linkages to community-based health care, general prison conditions and failures of the criminal justice system that exacerbate overcrowding must be immediately improved. International donors should work with the Zambian government to support prison and justice system reform and ensure that their provision of funding in such areas as health services respect human rights standards, including non-discrimination. Human rights protections against torture and cruel, inhuman or degrading treatment, and criminal justice system rights, are

  18. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  19. Environmental Denial

    Directory of Open Access Journals (Sweden)

    Tomaž Grušovnik

    2013-03-01

    Full Text Available Even though today reliable information about the negative impact of humans on the environment is only two clicks away, a considerable number of people still deny it. Why? Research shows that what we might call 'environmental denial' is a consequence of specific social and psychological factors: if we were to admit the negative impact of our lifestyles on the environment, we would have to change our way of life founded on consumerism. However, consumerism is not simply a way of exchanging goods; it is also something around which we organize the meaning of our lives, as consumer research clearly shows. Therefore we deny the information on the negattive impact of human activity on the environment because admitting it would lead to a conflict between cognition (attitudes, beliefs and actions (behaviour around which we organize the meaning of our lives. Such an exposition points to wider sociopolitical effects. Firstly, it raises questions about education that have to take into account the non-rational nature of human beings, and secondly it raises questions about the directions and possible outcomes of social action.

  20. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  1. Remotely Accessible Management System (RAMS).

    Science.gov (United States)

    Wood, Rex

    Oakland Schools, an Intermediate School District for Administration, operates a Remotely Accessible Management System (RAMS). RAMS is composed of over 100 computer programs, each of which performs procedures on the files of the 28 local school districts comprising the constituency of Oakland Schools. This regional service agency covers 900 square…

  2. 伪造接入点技术的智能手机拒绝服务攻防策略%Strategy of Denial of Service Attack and Defense to Smart Phones of Faked Access Point

    Institute of Scientific and Technical Information of China (English)

    杨雄; 朱宇光

    2013-01-01

    With the popularization of smart phone,the denial of service attack regard to this platform has been an important research direc-tion in wireless security field. With the disadvantage on security mechanism of Android mobile phones,respectively introduce the strategy on denial of service attack and defense for the platform from two different perspectives. The denial of service with faked WiFi access point is introduced and dual channel authentication model against such attacks are proposed. The executed experiments indicate that it is effec-tive for setting up a faked WiFi access point can simply prompt attack of smartphone with denial of service,the dual channel authentica-tion model can prove the validation for WiFi access point.%随着智能手机的普及化,面向该平台的拒绝服务攻击已经成为了无线安全研究领域的一个重要研究方向。针对目前智能Android手机网络安全防护措施研究的不足,从攻击与防御两个不同角度阐述了针对该平台的拒绝服务攻击方案和防御策略。引入了伪造无线WiFi接入点技术的拒绝服务攻击方案,并且提出了应对该攻击方案的双通道验证防御模型。实验结果表明,虚假的WiFi接入点技术可轻易地对智能手机发起有效的拒绝服务攻击,同时双通道验证模型可高效验证无线接入点的网络连通性。

  3. Denial: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  4. Construction of AHP-based information systems against denial of service attacks Performance Ev aluation System%基于层次分析法的抗拒绝服务攻击性能体系研究

    Institute of Scientific and Technical Information of China (English)

    梁祥波; 湛宁

    2012-01-01

    通过考察多种拒绝服务攻击的实际攻击效果,并按攻击效果对各种拒绝服务攻击方法进行了分类,并深入研究了信息系统抗拒绝服务攻击性能评价方法,构建了基于层次分析法的信息系统抗拒绝服务攻击性能指标体系,提出了抗拒绝服务攻击评价算法,考虑了指标数据归一化等问题。%This denial of service attacks by examining a variety of actual attack effect,according to results of a variety of denial of service attack attack methods are classified,and in-depth study of information systems against denial of service performance evaluation methods,to build the information based on AHP system performance against system denial of service attacks,denial of service attack against proposed evaluation algorithm,taking into account indicators such as data normalization problem.

  5. Radio access selection in multi-radio access systems

    NARCIS (Netherlands)

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  6. Limited Denial of Participation

    Data.gov (United States)

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  7. Implementation of Flexible Access System

    Science.gov (United States)

    Wu, Chen-Hsiang; Peng, Jan-Wen; Shao, Shou-Kuo; Chen, Tzooming E.; Chen, Shih Chang; Lee, Meng-Shu; Yen, K.-Y.; Chen, Tsung-Mao; Wang, Ching Sheu; Tu, Yuan-Kuang

    1998-06-01

    In this paper we present the architecture, operation, and the implementation of a prototype system, flexible access system (FAS), developed by CHT T.L. for FITL applications. FAS adopts fiber to the curb (FTTC) topology and provides POTS, ISDN BRA, and T1 services. The system consists of three main parts, namely, fiber central office terminal (FCOT) at switch side, fiber nodes (FN) at customer side, and a monitor station. FCOT and FNs are connected through an STM-1 fiber distribution ring. The hardware structure and the operation principle for each module are described. FAS contains the mux-demux module, POTS, ISDN, and T1 central office/customer service modules, operation modules, and power module. In the design, each central office service module in FCOT simulates as a CPE to terminate signals from switch, and will separate the data and signaling and map them into DS1 format. Mux/demux module will add/drop these DS1, put the operation information in data communication channel (DCC), and convert them to STM-1 optical link. Each customer service module in FN simulates switch line cart to regenerate the signal for customers. The prototype system implementation confirms the benefits of introducing SDH add/drop technologies to FITL system to provide basic telecommunication services. The design experience reveals that the clock synchronization method and noise reduction technique can significantly influence the performance in such a system. The test results that demonstrate and verify the designed functionality and the service quality of the prototype system will be presented.

  8. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  9. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  10. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  11. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  12. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  13. 47 CFR 1.1403 - Duty to provide access; modifications; notice of removal, increase or modification; petition for...

    Science.gov (United States)

    2010-10-01

    ... and information relate to a denial of access for reasons of lack of capacity, safety, reliability or... a cable television system or any telecommunications carrier with nondiscriminatory access to any... utility may deny a cable television system or any telecommunications carrier access to its poles,...

  14. Resilient Control under Denial-Of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2014-01-01

    We investigate resilient control strategies for linear systems under Denial-of-Service (DoS) attacks. By DoS attacks we mean interruptions of communication on measurement (sensor-to-controller) and control (controller-to-actuator) channels carried out by an intelligent adversary. We characterize the

  15. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  16. 17 CFR 240.19d-3 - Applications for review of final disciplinary sanctions, denials of membership, participation or...

    Science.gov (United States)

    2010-04-01

    ... limitations of access to services imposed by self-regulatory organizations. 240.19d-3 Section 240.19d-3... sanctions, denials of membership, participation or association, or prohibitions or limitations of access to... disciplinary sanction, denial or conditioning of membership, participation, bar from association,...

  17. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  18. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  19. Democracy and the Twin Challenges of Climate Denial

    Science.gov (United States)

    Norgaard, K. M.

    2012-12-01

    Climate change poses major challenges to the operation of "modern" political, economic and social systems, making visible assumptions and raising questions about how scientific information can and should operate in a modern globalized democracy. Alongside the serious threat to democracy posed by the phenomenon of "literal denial" (the e.g. so called skeptic challenges of scientific information for political reasons) is "implicatory denial" or the more pervasive and everyday problem of how and why people who believe climate change is occurring nevertheless manage to ignore it. Instead, disturbing information about climate change is normalized through a variety of everyday social practices from changing the subject, controlling exposure to information or the use of humor. The blatant and more readily identifiable processes of literal denial can work together with the less visible (and to date less studied) process of implicatory denial to hamper public response to climate change.

  20. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  1. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  2. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  3. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Directory of Open Access Journals (Sweden)

    João José Costa Gondim

    2016-11-01

    Full Text Available Concerns about security on Internet of Things (IoT cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests. After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  4. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  5. Rebalancing to the Asia-Pacific Region, and Challenges of Anti-Access/Area Denial & the Air-Sea Battle Strategy

    Science.gov (United States)

    2013-04-05

    have made great strides in developing “kinetic and non-kinetic anti-satellite ( ASAT ) weapons, space launch and space surveillance infrastructure...of Intelligence testified to Congress that the Chinese would have substantial ASAT capabilities by 2015. A year after his testimony, he revised the...had arrived on the scene as a serious space competitor.19 The PLA has also developed ground-based ASAT laser systems. In the near future China can

  6. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  7. Nihilism: a benign denial.

    Science.gov (United States)

    Skandalakis, John E; Mirilas, Petros

    2003-06-01

    Nihilism is the belief that all possible knowledge on a given topic has been amassed and codified. Ranging from benign denial to deliberate attempts at excommunication, nihilism is often encountered in the history of medicine. Eustachius, Columbus, and Sylvius strongly criticized Vesalius and defended the authority of Galen. Riolan fervently rejected Harvey's monumental work on the circulation of blood. Gross stated that no honest and sensible surgeon would ever sanction thyroidectomy. Sandstrom's discovery of the parathyroids was met with silence. Transplantation of parathyroids by Mandl was not appreciated when announced. Aristotle's dictum that the heart cannot withstand serious injury led to Paget's statement that cardiac surgery had reached the limits set by nature, which no new techniques could overcome. The first Billroth I operation was welcomed as, "Hopefully, also the last." Pancreatic surgery was opposed because the organ was of no clinical interest and was impossible for surgeons to reach. Pancreatic transplantation was rejected for many years, despite good results. When Blundell used blood transfusion for postpartum hemorrhage, critics averred that his next exploit would be radical removal of the spleen. Bassini stated that it could be risky to publish more about radical treatment of inguinal hernias. Carcinomas of the lower sigmoid and upper rectum were deemed untreatable because of their inaccessibility. Colostomy during pediatric surgery was rejected many times. Although it is difficult for the human mind to move from a familiar point of view, this propensity should not infect science, thereby impeding advancement.

  8. Science information systems: Archive, access, and retrieval

    Science.gov (United States)

    Campbell, William J.

    1991-01-01

    The objective of this research is to develop technology for the automated characterization and interactive retrieval and visualization of very large, complex scientific data sets. Technologies will be developed for the following specific areas: (1) rapidly archiving data sets; (2) automatically characterizing and labeling data in near real-time; (3) providing users with the ability to browse contents of databases efficiently and effectively; (4) providing users with the ability to access and retrieve system independent data sets electronically; and (5) automatically alerting scientists to anomalies detected in data.

  9. Internet-accessible real-time weather information system

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.

    An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...

  10. Decentralized energy systems for clean electricity access

    Science.gov (United States)

    Alstone, Peter; Gershenson, Dimitry; Kammen, Daniel M.

    2015-04-01

    Innovative approaches are needed to address the needs of the 1.3 billion people lacking electricity, while simultaneously transitioning to a decarbonized energy system. With particular focus on the energy needs of the underserved, we present an analytic and conceptual framework that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. A historical analysis shows that the present day is a unique moment in the history of electrification where decentralized energy networks are rapidly spreading, based on super-efficient end-use appliances and low-cost photovoltaics. We document how this evolution is supported by critical and widely available information technologies, particularly mobile phones and virtual financial services. These disruptive technology systems can rapidly increase access to basic electricity services and directly inform the emerging Sustainable Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, inclusive energy systems.

  11. Defending Science Denial in Cyberspace

    Science.gov (United States)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  12. Digital Autonomous Terminal Access Communication (DATAC) system

    Science.gov (United States)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  13. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  14. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  15. Resilient control under Denial-of-Service: Robust design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not dest

  16. Resilient Control under Denial-of-Service:Robust Design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not dest

  17. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  18. Denial Denied: Freedom of Speech

    Directory of Open Access Journals (Sweden)

    Glen Newey

    2009-12-01

    Full Text Available Free speech is a widely held principle. This is in some ways surprising, since formal and informal censorship of speech is widespread, and rather different issues seem to arise depending on whether the censorship concerns who speaks, what content is spoken or how it is spoken. I argue that despite these facts, free speech can indeed be seen as a unitary principle. On my analysis, the core of the free speech principle is the denial of the denial of speech, whether to a speaker, to a proposition, or to a mode of expression. Underlying free speech is the principle of freedom of association, according to which speech is both a precondition of future association (e.g. as a medium for negotiation and a mode of association in its own right. I conclude by applying this account briefly to two contentious issues: hate speech and pornography.

  19. A Digitally Addressable Random-Access Image Selector and Random-Access Audio System.

    Science.gov (United States)

    Bitzer, Donald L.; And Others

    The requirements of PLATO IV, a computer based education system at the University of Illinois, have led to the development of an improved, digitally addressable, random access image selector and a digitally addressable, random access audio device. Both devices utilize pneumatically controlled mechanical binary adders to position the mecahnical…

  20. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  1. Ultrasound-fluoroscopy guided access to the intrarenal excretory system.

    Science.gov (United States)

    Montanari, E; Serrago, M; Esposito, N; Rocco, B; Kartalas-Goumas, I; Del Nero, A; Zanetti, G; Trinchieri, A; Pisani, E

    1999-01-01

    The access to the collecting system can be performed under fluoroscopy computerized tomography, ultrasonographic, mixed ultrasonographic and fluoroscopic guidance. In this paper the creation of a percutaneous transparenchymal ultrasound-fluoroscopy guided access to the intrarenal collecting system completely performed by urologist for different purposes is presented. In five years 297 patients underwent 330 percutaneous kidney accesses to perform derivative nephrostomies (217 pts), percutaneous nephrolithotomies (37 pts), antegrade ureteral manoeuvres (34 pts), antegrade endopyelotomies (7 pts), transitional cell carcinoma of the upper tract resection (2 pts). 11 patients out of these had a percutaneous kidney access in a transplanted kidney. The percutaneous access was successful in 98% of the attemps. A posterior calyx of the lower group (74%), of the medium group (25%) or of the upper group (1%) was accessed. In 73 accesses the mean target calyx diameter was 12.8 mm (range 5-45 mm), the mean operative time 5.4 minutes and the mean fluoroscopy time 5.1 seconds. In 84.5% of the patients the access was performed under local anesthesia when a dilation of the tract was not required. Gross haematuria was observed in 3.9% of the accesses and an arterial lesion treated by embolization in 0.9% of the accesses. Blood transfusion was required in 0.3% of the patients. The ultrasound-fluoroscopy guided access is at least as precise as the fluoroscopy guided one moreover it makes the procedure less invasive and it makes more precise the surgical planning.

  2. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  3. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  4. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  5. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  6. Paradox of Denials in All My Sons

    Institute of Scientific and Technical Information of China (English)

    雷慧慧

    2014-01-01

    Arthur Miller, who was one of the greatest American playwrights of the 20th century. In All My Sons, different sorts of denials lead to the family’s collapse and Keller’s death. Paradoxically, the very denial that is designed to protect him from prose-cution and incarceration is followed by a chain of events that lead to Keller’s own self-imprisonment and self-imposed execu-tion. Denial also exists in the history of some countries, such as Germany, Japan and America and so on. My paper aims to ex-plore the paradox of denial both in our history and in literature works. My paper will demonstrate that denial has some negative effects both on the outer-world and the inner-world through thorough analysis on the characters in All My Sons.

  7. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Science.gov (United States)

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  8. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  9. ACCESS: Design and Sub-System Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; McCandliss, Stephan R.; Rasucher, Bernard J.; Kimble, Randy A.; Kruk, Jeffrey W.; Pelton, Russell; Mott, D. Brent; Wen, Hiting; Foltz, Roger; Quijada, Manuel A.; Gum, Jeffery S.; Gardner, Jonathan P.; Kahle, Duncan M.; Benford, Dominic J.; Woodgate, Bruce E.; Wright, Edward L.; Feldman, Paul D.; Hart, Murdock; Moos, H. Warren; Reiss, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, W. V.; Sahnow, David J.

    2012-01-01

    Establishing improved spectrophotometric standards is important for a broad range of missions and is relevant to many astrophysical problems. ACCESS, "Absolute Color Calibration Experiment for Standard Stars", is a series of rocket-borne sub-orbital missions and ground-based experiments designed to enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 -1.7 micrometer bandpass.

  10. Denial of shipments - myth or reality

    Energy Technology Data Exchange (ETDEWEB)

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  11. A secure network access system for mobile IPv6

    Science.gov (United States)

    Zhang, Hong; Yuan, Man; He, Rui; Jiang, Luliang; Ma, Jian; Qian, Hualin

    2004-03-01

    With the fast development of Internet and wireless and mobile communication technology, the Mobile Internet Age is upcoming. For those providing Mobile Internet services, especially from the view of ISP (Internet Service Provider), current mobile IP protocol is insufficient. Since the Mobile IPv6 protocol will be popular in near future, how to provide a secure mobile IPv6 service is important. A secure mobile IPv6 network access system is highly needed for mobile IPv6 deployment. Current methods and systems are still inadequate, including EAP, PANA, 802.1X, RADIUS, Diameter, etc. In this paper, we describe main security goals for a secure mobile IPv6 access system, and propose a secure network access system to achieve them. This access system consists of access router, attendant and authentication servers. The access procedure is divided into three phases, which are initial phase, authentication and registration phase and termination phase. This system has many advantages, including layer two independent, flexible and extensible, no need to modify current IPv6 address autoconfiguration protocols, binding update optimization, etc. Finally, the security of the protocol in this system is analyzed and proved with Extended BAN logic method, and a brief introduction of system implementation is given.

  12. Rumor spreading models with random denials

    Science.gov (United States)

    Giorno, Virginia; Spina, Serena

    2016-11-01

    The concept of denial is introduced on rumor spreading processes. The denials occur with a certain rate and they reset to start the initial situation. A population of N individuals is subdivided into ignorants, spreaders and stiflers; at the initial time there is only one spreader and the rest of the population is ignorant. The denials are introduced in the classic DK model and in its generalization, in which a spreader can transmit the rumor at most to k ignorants. The steady state densities are analyzed for these models. Finally, a numerical analysis is performed to study the rule of the involved parameters and to compare the proposed models.

  13. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  14. Access to fertility services by transgender persons: an Ethics Committee opinion.

    Science.gov (United States)

    2015-11-01

    This statement explores the ethical considerations surrounding the provision of fertility services to transgender individuals and concludes that denial of access to fertility services is not justified.

  15. Climate change denial, freedom of speech and global justice

    Directory of Open Access Journals (Sweden)

    Trygve Lavik

    2016-10-01

    Full Text Available In this paper I claim that there are moral reasons for making climate denialism illegal . First I define climate denialism, and then I discuss its impact on society and its reception in the media.  I build my philosophical arguments mainly on John Stuart Mill and Thomas M. Scanlon.  According to Mill’s utilitarian justification of free speech, even untrue opinions are valuable in society’s pursuit of more truth. Consequently one might think that Mill’s philosophy would justify climate denialists’ right to free speech.  A major section of the paper argues against that view. The main arguments are: Climate denialism is not beneficial because its main goal is to produce doubt, and not truth. Climate denialism is not sincerely meant, which is a necessary condition for Mill to accept utterances. Climate denialists bring harm, by blocking necessary action on climate change.  Primarily they harm future generations and people in developing countries. Hence the case can be made in terms of global justice: Would future generations and people in developing countries support my claim? I think so, or so I argue. My argument from global justice is built on Scanlon’s distinction between the interests of participants, the interests of audiences, and the interests of bystanders.  The climate denialists have participant interests ‘in being able to call something to the attention of a wide audience’. Audience interests consist in ‘having access to expressions that we wish to hear or read, and even in being exposed to some degree to expressions we have not chosen’. Future generations and people in poor countries are bystanders to the climate debate. If the debate postpones necessary actions, it is the bystanders who must pay the price. I argue that bystanders’ costs outweigh participants’ and audiences’ interests, and that this is an argument for a statutory ban on climate denialism.Article first published online: 21 DEC 2015 

  16. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial-of-service...... security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  17. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  18. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  19. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  20. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  1. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  2. 8 CFR 214.4 - Denial of certification, denial of recertification or withdrawal of SEVP certification.

    Science.gov (United States)

    2010-01-01

    ... HOMELAND SECURITY IMMIGRATION REGULATIONS NONIMMIGRANT CLASSES § 214.4 Denial of certification, denial of...(a)(15)(F)(i) and/or 101(a)(15)(M)(i) of the Immigration and Nationality Act, will be withdrawn on... consider the impact that such date will have upon SEVP, the school, and the school's nonimmigrant...

  3. Organizational crisis-denial strategy: the effect of denial on public framing

    NARCIS (Netherlands)

    van der Meer, T.G.L.A.

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames em

  4. ISAIA: Interoperable Systems for Archival Information Access

    Science.gov (United States)

    Hanisch, Robert J.

    2002-01-01

    The ISAIA project was originally proposed in 1999 as a successor to the informal AstroBrowse project. AstroBrowse, which provided a data location service for astronomical archives and catalogs, was a first step toward data system integration and interoperability. The goals of ISAIA were ambitious: '...To develop an interdisciplinary data location and integration service for space science. Building upon existing data services and communications protocols, this service will allow users to transparently query hundreds or thousands of WWW-based resources (catalogs, data, computational resources, bibliographic references, etc.) from a single interface. The service will collect responses from various resources and integrate them in a seamless fashion for display and manipulation by the user.' Funding was approved only for a one-year pilot study, a decision that in retrospect was wise given the rapid changes in information technology in the past few years and the emergence of the Virtual Observatory initiatives in the US and worldwide. Indeed, the ISAIA pilot study was influential in shaping the science goals, system design, metadata standards, and technology choices for the virtual observatory. The ISAIA pilot project also helped to cement working relationships among the NASA data centers, US ground-based observatories, and international data centers. The ISAIA project was formed as a collaborative effort between thirteen institutions that provided data to astronomers, space physicists, and planetary scientists. Among the fruits we ultimately hoped would come from this project would be a central site on the Web that any space scientist could use to efficiently locate existing data relevant to a particular scientific question. Furthermore, we hoped that the needed technology would be general enough to allow smaller, more-focused community within space science could use the same technologies and standards to provide more specialized services. A major challenge to searching

  5. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    White David

    2008-01-01

    Full Text Available Abstract A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel's synchrony hypothesis, or remotely along several of Esterel's execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel's facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs' utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot's controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse's floor layout into account, both of which are stored in a MySQL database.

  6. Embedded Systems Programming: Accessing Databases from Esterel

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available A current limitation in embedded controller design and programming is the lack of database support in development tools such as Esterel Studio. This article proposes a way of integrating databases and Esterel by providing two application programming interfaces (APIs which enable the use of relational databases inside Esterel programs. As databases and Esterel programs are often executed on different machines, result sets returned as responses to database queries may be processed either locally and according to Esterel’s synchrony hypothesis, or remotely along several of Esterel’s execution cycles. These different scenarios are reflected in the design and usage rules of the two APIs presented in this article, which rely on Esterel’s facilities for extending the language by external data types, external functions, and procedures, as well as tasks. The APIs’ utility is demonstrated by means of a case study modelling an automated warehouse storage system, which is constructed using Lego Mindstorms robotics kits. The robot’s controller is programmed in Esterel in a way that takes dynamic ordering information and the warehouse’s floor layout into account, both of which are stored in a MySQL database.

  7. Access Safety Systems – New Concepts from the LHC Experience

    CERN Document Server

    Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E

    2011-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...

  8. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  9. HIPPO Experiment Data Access and Subseting System

    Science.gov (United States)

    Krassovski, Misha; Hook, Les; Christensen, Sigurd; Boden, Tom

    2014-05-01

    atmospheric species from nearly pole-to-pole over the Pacific Ocean across all seasons. The suite of atmospheric trace gases and aerosols is pertinent to understanding the carbon cycle and challenging global climate models. This dataset will provide opportunities for research across a broad spectrum of Earth sciences, including those analyzing the evolution in time and space of the greenhouse gases that affect global climate. The Carbon Dioxide Information Analysis Center (CDIAC) at Oak Ridge National Laboratory (ORNL) provides data management support for the HIPPO experiment including long-term data storage and dissemination. CDIAC has developed a relational database to house HIPPO merged 10-second meteorology, atmospheric chemistry, and aerosol data. This data set provides measurements from all Missions, 1 through 5, that took place from January of 2009 to September 2011. This presentation introduces newly build database and web interface, reflects the present state and functionality of the HIPPO Database and Exploration System as well as future plans for expansion and inclusion of combined discrete flask and GC sample GHG, Halocarbon, and hydrocarbon data.

  10. 32 CFR 1636.10 - Statement of reasons for denial.

    Science.gov (United States)

    2010-07-01

    ... CLASSIFICATION OF CONSCIENTIOUS OBJECTORS § 1636.10 Statement of reasons for denial. (a) Denial of a conscientious objector claim by a board must be accompanied by a statement specifying the reason(s) for...

  11. Accessing and Sharing Data Using the CUAHSI Hydrologic Information System

    Science.gov (United States)

    Tarboton, D. G.; Horsburgh, J. S.; Whiteaker, T. L.; Maidment, D. R.; Zaslavsky, I.

    2008-12-01

    The Consortium of Universities for the Advancement of Hydrologic Science, Inc (CUAHSI) has a Hydrologic Information System (HIS) project, which is developing infrastructure to support the sharing of hydrologic data through web services and tools for data discovery, access and publication. Centralized data services support access to National Datasets such as the USGS National Water Information System (NWIS) and SNOTEL, in a standard way. Distributed data services allow users to establish their own server and publish their data through CUAHSI HIS web services. Once such a data service is registered within HIS Central, it becomes searchable and accessible through the centralized discovery and data access tools. The HIS is founded upon an information model for observations at stationary points that supports its data services. This is implemented as both XML and relational database schema for transmission and storage of data respectively. WaterML is the XML based data transmission model that underlies the machine to machine communications, while the Observations Data Model (ODM) is a relational database model for persistent data storage. Web services support access to hydrologic data stored in ODM and transmitted using WaterML directly from applications software such as Excel, MATLAB and ArcGIS that have Simple Object Access Protocol (SOAP) capability. A significant value of web services derives from the capability to use them from within a user's preferred analysis environment, rather than requiring a user to learn new software. This allows a user to work with data from national and academic sources, almost as though it was on their local disk. This poster will be computer-based with internet access for demonstration of HIS tools and functionality.

  12. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  13. Access and Use of Federal Data through NSF's CASPAR System.

    Science.gov (United States)

    Firnberg, James W.

    1991-01-01

    The National Science Foundation's Computer-Aided Science Policy and Research database system provides microcomputer-based access and manipulation of multiple national databases for federal and now institutional use. Applications at West Virginia University, Portland State University, and the State University of New York at Buffalo pilot tested the…

  14. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  15. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  16. Access Control Framework Based on Mobile P2P System%一种基于移动P2P系统的访问控制框架

    Institute of Scientific and Technical Information of China (English)

    方芳; 陈世平; 裘慧奇; 王佳炳

    2011-01-01

    针对移动P2P网络中的对等端容易耗尽系统资源、受到拒绝服务攻击等问题,提出了一种访问控制框架.在RBAC模型的基础上提出MT-RBAC访问控制框架,模型使用了空间上下文、信任约束和资源控制来实现移动P2P系统的访问控制机制.有效地避免了恶意节点的资源请求对系统资源的消耗,提高了系统可用性.%In order to solve the problem which has existed in the mobile p2p network, for example, the excessive consumption of system resources and the attacks of denial service, a new access control is proposed in this paper. Based on RB AC access control framework, MT-RB AC access control framework adopts the techniques of spatial context, trust constraint and resource control to achieve the access control mechanism of the Mobile P2P System. The new access control framework can effectively and efficiently increase the usability of the system, and prevent the system from the irrational resource request from spite nodes.

  17. Personal Access Satellite System (PASS) study. Fiscal year 1989 results

    Science.gov (United States)

    Sue, Miles K. (Editor)

    1990-01-01

    The Jet Propulsion Laboratory is exploring the potential and feasibility of a personal access satellite system (PASS) that will offer the user greater freedom and mobility than existing or currently planned communications systems. Studies performed in prior years resulted in a strawman design and the identification of technologies that are critical to the successful implementation of PASS. The study efforts in FY-89 were directed towards alternative design options with the objective of either improving the system performance or alleviating the constraints on the user terminal. The various design options and system issues studied this year and the results of the study are presented.

  18. Input-to-State Stabilizing Control Under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2015-01-01

    The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service (DoS) attacks, namely attacks that prevent transmissions over the network. We characterize frequency an

  19. Detection of denial-of-service attacks based on computer vision techniques

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Hu, Jiankun

    2014-01-01

    Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed system treats traffic records as images and detec

  20. Formalized Description of Distributed Denial of Service Attack

    Institute of Scientific and Technical Information of China (English)

    杜彦辉; 马锐; 刘玉树

    2004-01-01

    The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.

  1. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  2. Data denial experiments for extratropical transition

    Directory of Open Access Journals (Sweden)

    Doris Anwender

    2012-11-01

    Full Text Available Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF model are designed to investigate the value of targeted observations for historical extratropical transition (ET cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC environment is, on average, as important as denying data in mid-latitude sensitive regions determined using extratropical singular vectors (SV. The impact of data denial over TC regions propagates downstream from the Atlantic towards Europe, with a maximum degradation at day 4. This degradation is mainly attributed to the data denial at the TC stage, i.e. before ET is completed. When data are denied on mid-latitude sensitive regions, the largest degradation is found around day 2 and also after the day 4 forecast. In general, the loss of information content is larger when data are denied in mid-latitude sensitive areas because these identify dynamically active regions. In both denial experiments, aircraft and satellite radiance data are the most influential observations. For the selected case of Hurricane Irene, the largest degradations are found for forecasts initialised while Irene reached its peak intensity. If observations are denied in the near storm environment, the TC mostly disappears from the analysis and the subsequent forecast. This allows the impact of Irene on the formation of the downstream cut-off low to be investigated.

  3. Inferring Internet Denial-of-Service Activity

    Science.gov (United States)

    2007-11-02

    Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego dmoore@caida.org...the local network topology. kc claffy and Colleen Shannon at CAIDA provided support and valuable feed- back throughout the project. David Wetherall

  4. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  5. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  6. Licensed Shared Access System Possibilities for Public Safety

    Directory of Open Access Journals (Sweden)

    Kalle Lähetkangas

    2016-01-01

    Full Text Available We investigate the licensed shared access (LSA concept based spectrum sharing ideas between public safety (PS and commercial radio systems. While the concept of LSA has been well developed, it has not been thoroughly investigated from the public safety (PS users’ point of view, who have special requirements and also should benefit from the concept. Herein, we discuss the alternatives for spectrum sharing between PS and commercial systems. In particular, we proceed to develop robust solutions for LSA use cases where connections to the LSA system may fail. We simulate the proposed system with different failure models. The results show that the method offers reliable LSA spectrum sharing in various conditions assuming that the system parameters are set properly. The paper gives guidelines to set these parameters.

  7. A Rewritable, Random-Access DNA-Based Storage System

    Science.gov (United States)

    Tabatabaei Yazdi, S. M. Hossein; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-01

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  8. Self-triggered Coordination over a Shared Network under Denial-of-Service

    NARCIS (Netherlands)

    Mohammadi Senejohnny, Danial; Tesi, Pietro; De Persis, Claudio

    2015-01-01

    The issue of security has become ever more prevalent in the analysis and design of cyber-physical systems. In this paper, we analyze a consensus network in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent communication among the network agents. By introducing a notion of

  9. The Marley hypothesis: denial of racism reflects ignorance of history.

    Science.gov (United States)

    Nelson, Jessica C; Adams, Glenn; Salter, Phia S

    2013-02-01

    This study used a signal detection paradigm to explore the Marley hypothesis--that group differences in perception of racism reflect dominant-group denial of and ignorance about the extent of past racism. White American students from a midwestern university and Black American students from two historically Black universities completed surveys about their historical knowledge and perception of racism. Relative to Black participants, White participants perceived less racism in both isolated incidents and systemic manifestations of racism. They also performed worse on a measure of historical knowledge (i.e., they did not discriminate historical fact from fiction), and this group difference in historical knowledge mediated the differences in perception of racism. Racial identity relevance moderated group differences in perception of systemic manifestations of racism (but not isolated incidents), such that group differences were stronger among participants who scored higher on a measure of racial identity relevance. The results help illuminate the importance of epistemologies of ignorance: cultural-psychological tools that afford denial of and inaction about injustice.

  10. Use of CDMA access technology in mobile satellite systems

    Science.gov (United States)

    Ramasastry, Jay; Wiedeman, Bob

    1995-01-01

    Use of Code Division Multiple Access (CDMA) technology in terrestrial wireless systems is fairly well understood. Similarly, design and operation of Power Control in a CDMA-based system in a terrestrial environment is also well established. Terrestrial multipath characteristics, and optimum design of the CDMA receiver to deal with multipath and fading conditions are reliably established. But the satellite environment is different. When the CDMA technology is adopted to the satellite environment, other design features need to be incorporated (for example; interleaving, open-loop and closed-loop power control design, diversity characteristics) to achieve comparable level of system performance. In fact, the GLOBALSTAR LEO/MSS system has incorporated all these features. Contrary to some published reports, CDMA retains the advantages in the satellite environment that are similar to those achieved in the terrestrial environment. This document gives a description of the CDMA waveform and other design features adopted for mobile satellite applications.

  11. Towards Voluntary Interoperable Open Access Licenses for the Global Earth Observation System of Systems (GEOSS)

    NARCIS (Netherlands)

    Onsrud, H.; Campbell, J.; Van Loenen, B.

    2010-01-01

    Access to earth observation data has become critically important for the wellbeing of society. A major impediment to achieving widespread sharing of earth observation data is lack of an operational web-wide system that is transparent and consistent in allowing users to legally access and use the ear

  12. Access Control in Decentralised Publish/Subscribe Systems

    Directory of Open Access Journals (Sweden)

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  13. Accessibility of a Destination-Based Transportation System: A Large Airport Study

    Institute of Scientific and Technical Information of China (English)

    SHI Jing; YING Xiwen

    2008-01-01

    The accessibility of a destination-based transportation system is defined to quantify the perform-ance of transportation systems which access a distinct destination. The access cost is used to reflect the utility of the transportation system including the fatigue and inconvenience in the total cost. The cost is quan-tified by two coefficients which represent the different characteristics of various people. The average cost and the income-relative accessibility are used to describe various aspects of the accessibility and to evaluate the accessibility of a destination-based system. A case study uses data from the Kunming transpor-tation system to evaluate the accessibility of the present city airport. The calibrated coefficients are then used to evaluate the transportation system to the new Kunming international airport. The results show that this transportation accessibility evaluation can be combined with transportation planning to study transporta-tion sub-systems.

  14. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  15. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    Science.gov (United States)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  16. Hentschel random access tracking system HSG 84.30

    Science.gov (United States)

    Zamzow, Heinz

    1990-08-01

    The development of the Random Access Tracking System was initiated at the University of Muenster, Department of Orthopaedic Physiology by Dr. Theysohn. This system is a real-time high-speed and high-resolution multi-point tracking system. The moving objects are identified with retro-reflective markers which are illuminated by halogen spotlights placed around the camera lens. The video interface generates deflection signals which are fed to unique Random Access Cameras manufactured by Hamamatsu Corporation. These signals perform high speed window scanning and can sample up to 7,500 markers per second. Under certain circumstances this can be increased to 15,000 markers per second. From 1 to 126 markers can be detected in a line scan search mode. Window size may be varied in steps from 0.5% to 4.0% of the field of view. Using a small window it is possible to obtain 1 part in 32,768 in each direction of the field of view. The raw data are reduced to 2-D centroids of the targets. On-line data storage and display are possible using an industry-standard ATPC with DMA interface. Real-time feed-back is also possible. The video interface provides for off-line 3-D reconstructions using the data from two or more synchronized cameras. The system can be adapted to meet the needs of particular applications by modifying sample-rate, data transfer rate, and the number and the dimensions of the windows.

  17. Bluetooth Navigation System using Wi-Fi Access Points

    CERN Document Server

    Agrawal, Rohit

    2012-01-01

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most of these use only a single technology for positioning but using more than one in cooperation with each other is always advantageous for obtaining greater accuracy. Particularly, the ones which use Bluetooth are better since they would enhance the scalability of such a system because of the fact that this technology is in use by the common people so it would always be easy to track them. Moreover it would also reduce the hardware installation cost to some extent. The system that has been introduced here uses Bluetooth primarily for positioning and tracking in combination with Wi-Fi access points. The reason that makes the commercial application of such a system easier and ch...

  18. 19 CFR 122.183 - Denial of access.

    Science.gov (United States)

    2010-04-01

    ...; (xxxiii) Illegal use or possession of firearms or explosives; (xxxiv) Any violation of a U.S. immigration... property; (H) Aggravated assault; (I) Bribery; or (J) Illegal possession of a controlled...

  19. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design.

  20. Detecting Distributed Denial of Service Attacks Using Data Mining Techniques

    Directory of Open Access Journals (Sweden)

    Mouhammd Alkasassbeh

    2016-01-01

    Full Text Available Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks. The intrusion-detection system (IDS is one of the solutions to detecting and classifying any anomalous behavior. The IDS system should always be updated with the latest intruder attack deterrents to preserve the confidentiality, integrity and availability of the service. In this paper, a new dataset is collected because there were no common data sets that contain modern DDoS attacks in different network layers, such as (SIDDoS, HTTP Flood. This work incorporates three well-known classification techniques: Multilayer Perceptron (MLP, Naïve Bayes and Random Forest. The experimental results show that MLP achieved the highest accuracy rate (98.63%.

  1. LAPAROSCOPIC SALPINGECTOMY IN TWO CAPTIVE LEOPARDS (PANTHERA PARDUS) USING A SINGLE PORTAL ACCESS SYSTEM.

    Science.gov (United States)

    Hartman, Marthinus J; Monnet, Eric; Kirberger, Robert M; Schoeman, Johan P

    2015-12-01

    Laparoscopic salpingectomy was performed in two adult leopards (Panthera pardus) using a single portal access system, with a multicannulated single-incision laparoscopic surgery port, without any complications. The poorly developed ovarian bursa provided easy access to the uterine tube for salpingectomy. Laparoscopic salpingectomy can be safely performed in the leopard using a single portal access system.

  2. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  3. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  4. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  5. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Access Control Systems (Update to DO-230B): Agenda March 10, 2011 Welcome/Introductions/Administrative... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access...

  6. LINEAR-DISPERSION DIVISION MULTIPLE-ACCESS FOR MIMO SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    Deng Dan; Lv Xingzai; Zhu Jinkang

    2008-01-01

    Comprehensive study on novel Linear-Dispersion Division Multiple-Access (LDDMA) for multi-user uplink Multiple-Input Multiple-Output (MIMO) systems is proposed. In the new multi- plexing scheme, each user's information symbol is dispersed by a User-Specific Matrix (USM) both in space and time domain and linearly combined at base-station side. And a simple random search al- gorithm, based on capacity maximization criteria, is developed to generate a bank of USMs. Simulation results are presented to demonstrate the advantages of LDDMA. When the Bit Error Rate (BER) reaches 10, the performance gains are 3dB and 5dB, compared with Time-Division Linear Dispersion Codes (TD-LDC) and BLAST, respectively.

  7. Access to Papanicolaou Test by the Unified Health System users

    Directory of Open Access Journals (Sweden)

    Vanessa Franco de Carvalho

    2016-05-01

    Full Text Available Objective: to understand how is the access to the public health service users in the Papanicolaou Test. Methods: qualitative study, with 52 women who have changes in the Pap smear exam, questioning the exam achievement frequency and the difficulties of its access and the consultations. It was developed a thematic analysis based on the Fekete accessibility reference. Results: three categories emerged: access to information on the frequency of Pap smears, highlighting the completion of the examination linked only to the professional application; access to Pap smears, in which most women do not have difficulty; access to a return visit, showing the difficulty of women getting back into service after the exam. Conclusion: most women have easy access to the Pap smear. However, there are limitations on the return visit, hindering to establish immediate actions to the beginning of treatment.

  8. Access to Papanicolaou Test by the Unified Health System users

    Directory of Open Access Journals (Sweden)

    Vanessa Franco de Carvalho

    2016-01-01

    Full Text Available Objective: to understand how is the access to the public health service users in the Papanicolaou Test. Methods: qualitative study, with 52 women who have changes in the Pap smear exam, questioning the exam achievement frequency and the difficulties of its access and the consultations. It was developed a thematic analysis based on the Fekete accessibility reference. Results: three categories emerged: access to information on the frequency of Pap smears, highlighting the completion of the examination linked only to the professional application; access to Pap smears, in which most women do not have difficulty; access to a return visit, showing the difficulty of women getting back into service after the exam. Conclusion: most women have easy access to the Pap smear. However, there are limitations on the return visit, hindering to establish immediate actions to the beginning of treatment.

  9. Development of a Denial Scale for Male Incest Offenders.

    Science.gov (United States)

    Guthrie, James T.; Canada, Richard M.; Lim, Mee-Gaik; Jennings, Glen H.

    1998-01-01

    A scale to measure denial among sexual offenders was developed for male incest offenders (N=265). Validity and reliability were tested. Four subscales correspond to the domains of denial: facts, awareness, impact, and responsibility. Development strategy and psychometric analysis are reported. Recommendations for further research are included.…

  10. 44 CFR 71.3 - Denial of flood insurance.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance. 71... OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program IMPLEMENTATION OF COASTAL BARRIER LEGISLATION § 71.3 Denial of flood insurance. (a) No new flood insurance...

  11. Compact Wireless Access Nodes for WDM Bidirectional Radio-over-Fiber System Based on RSOA

    DEFF Research Database (Denmark)

    Yu, Xianbin; Gibbon, Timothy Braidwood; Tafur Monroy, Idelfonso

    2009-01-01

    We demonstrate a RSOA based WDM radio-over-fiber, bidirectional system for wireless access networks. The multi-functionalities of a RSOA, such as colorless operation, re-modulation and envelope detection, make wireless access nodes more compact.......We demonstrate a RSOA based WDM radio-over-fiber, bidirectional system for wireless access networks. The multi-functionalities of a RSOA, such as colorless operation, re-modulation and envelope detection, make wireless access nodes more compact....

  12. Denial of Service Prevention for 5G

    DEFF Research Database (Denmark)

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology...

  13. Software interface system for Geophysical Data Access and Management System (GPDAMS-CD)

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.

    -friendly access to large volume of data and means to visualize and extract selected data as per need. The software requires a minimum of computing expertise as it is controlled by a system of `pull down' menus, backed up by a context-sensitive system...

  14. "What Page, Miss?" Enhancing Text Accessibility with DAISY (Digital Accessible Information SYstem)

    Science.gov (United States)

    Spooner, Sue

    2014-01-01

    Introduction: The provision of specially formatted materials is a complex and increasingly difficult task, given the extensive and burgeoning range of texts and resources available for classroom use. The need to extend the provision of accessible formats to include digital resources (in addition to braille, audio, and large print) led to a study…

  15. The role of CRIS systems in measuring Open Access publications

    NARCIS (Netherlands)

    Scharnhorst, A.M.; Dijk, E.M.S.; Doorn, P.K.; van Berchum, M.

    2016-01-01

    Open Access to scientific results - from publications to data - is high on the agenda of science policy drivers. Since long there is no doubt that making your own research available on the web is the best way to gain visibility and impact (Lawrence 2001). The Open Access movement started with calls

  16. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    Science.gov (United States)

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.

  17. Single port access surgery with a novel Port Camera system.

    Science.gov (United States)

    Terry, Benjamin S; Schoen, Jonathan; Mills, Zachary; Rentschler, Mark E

    2012-06-01

    In this work, the authors designed, built, and tested a novel port camera system for single port access (SPA) laparoscopic surgery. This SPA Port Camera device integrates the monitor, laparoscopic camera, and light source into an inexpensive, portable cannula port. The device uses a 2-channel SPA port inserted through an umbilical incision, similar to traditional SPA. After insertion into a channel, the device deploys a small camera module and LED lamp in vivo. An integrated, on-patient LCD provides the view of the surgical site. The design intent of the port camera is to enhance SPA by (a) reducing the size of the SPA port through the elimination of the dedicated laparoscope channel; (b) reducing equipment cost by integrating an inexpensive CMOS sensor and LED lamp at the port tip; (c) eliminating the need for an assistant who operates the laparoscope; and (d) mechanically coupling the camera, tool port, and on-patient LCD screen. The effectiveness of the device was evaluated by comparing the video performance with a leading industry laparoscope and by performing a user evaluation study and live porcine surgery with the device. Effectiveness of the device was mixed. Overall video system performance of the device is better than an industry standard high-definition laparoscope, implying that significant cost savings over a traditional system are possible. Participant study results suggest that simulated laparoscopic tasks are as efficient with the SPA Port Camera as they are with a typical SPA configuration. However, live surgery revealed several shortcomings of the SPA Port Camera.

  18. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  19. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    OpenAIRE

    Duangporn Prasertsubpakij; Vilas Nitivattananon

    2012-01-01

    Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR) transportation has increasingly relied on the role of two mass rapid transport syst...

  20. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  1. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  2. A review of workers' compensation claims: the frequency of claim denial and medical treatment delay.

    Science.gov (United States)

    Kelley, C R; Amparo, J M

    2000-01-01

    A retrospective chart review of 257 patients who presented between January to March 1998, was conducted to identify the frequency of workers' compensation claim denial among patients who reported to Straub Clinic and Hospital. Results showed that 12.8% of claims were either "denied" or temporarily "denied pending investigation". Analysis of all the claims found that only 2% resulted in delayed medical care. Further analysis of the denied claims revealed the vast majority of claims (78.8%) were denied because the medical provider and the patient had incorrect workers' compensation carrier information. Other independent variables studied (size of the employer, category of employer, injury type, status of case, length of case and number of visits) did not predict either denial of the claim or treatment delay. This study suggests that the efficiency of our State's Workers' Compensation system would be greatly improved by developing a system to provide medical care providers with accurate insurance information.

  3. Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory

    CERN Document Server

    Singh, Neetu; Chaudhuri, Pranay

    2010-01-01

    Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.

  4. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  5. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data System-Public access to data. 504.602-71 Section 504.602-71 Federal Acquisition Regulations System... Procurement Data System—Public access to data. (a) The FPDS database. The General Services...

  6. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  7. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  8. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  9. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  10. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  11. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  12. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held July 15, 2011, from 10 a.m. to 1 p.m....

  13. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  14. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  15. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held February 8, 2011, from 10 a.m. to 5...

  16. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held December 9, 2010, from 10 a.m. to 5...

  17. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  18. From System Expansion to System Contraction: Access to Higher Education in Poland

    Science.gov (United States)

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  19. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  20. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  1. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  2. 27 CFR 479.65 - Denial of application.

    Science.gov (United States)

    2010-04-01

    ... EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION MACHINE GUNS, DESTRUCTIVE DEVICES, AND CERTAIN OTHER FIREARMS Tax on Making Firearms Application to Make A Firearm § 479.65 Denial of application....

  3. 33 CFR 151.08 - Denial of entry.

    Science.gov (United States)

    2010-07-01

    ... BALLAST WATER Implementation of MARPOL 73/78 and the Protocol on Environmental Protection to the Antarctic Treaty as it Pertains to Pollution from Ships General § 151.08 Denial of entry. (a) Unless a ship...

  4. 33 CFR 136.307 - Denial of designation.

    Science.gov (United States)

    2010-07-01

    ... Section 136.307 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... PROCEDURES; DESIGNATION OF SOURCE; AND ADVERTISEMENT Designation of Source and Advertisement § 136.307 Denial... Designation. Advertisement...

  5. 7 CFR 205.405 - Denial of certification.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) ORGANIC FOODS PRODUCTION ACT PROVISIONS NATIONAL ORGANIC PROGRAM Certification § 205.405 Denial of certification. (a) When the...

  6. 7 CFR 205.507 - Denial of accreditation.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) ORGANIC FOODS PRODUCTION ACT PROVISIONS NATIONAL ORGANIC PROGRAM Accreditation of Certifying Agents § 205.507 Denial of accreditation....

  7. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  8. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... circumvention of copyright protection systems for access control technologies which was published July 27, 2010... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final...

  9. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): November 2, 2010 Welcome/Introductions/Administrative Remarks Agenda... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access...

  10. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda April 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access...

  11. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda January 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access...

  12. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  13. Upper Bound for Energy Efficiency in Multi-Cell Fibre-Wireless Access Systems

    DEFF Research Database (Denmark)

    Koonen, A. M. J.; Popov, M.; Wessing, Henrik

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  14. Managing the Threat of Denial-of-Service Attacks

    Science.gov (United States)

    2001-10-01

    Cooperative Association for Internet Data Analysis ( CAIDA ) address this question in their paper, “Inferring Internet Denial-of-Service Activity.” (see...belonging to more than 2,000 distinct organizations during a three-week period.” In addition, CAIDA reports that 90% of attacks last for one hour or less...Engineering Task Force http://www.ietf.org/html.charters/ipngwg-charter.html Inferring Internet Denial-of-Service Activity CAIDA , University of

  15. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  16. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  17. A CDMA architecture for a Ka-band Personal Access Satellite System

    Science.gov (United States)

    Motamedi, Masoud; Sue, Miles K.

    1990-01-01

    A Code Division Multiple Access (CDMA) architecture is currently being studied for use in a Ka-band Personal Access Satellite System (PASS). The complete architecture consisting of block diagrams of the user terminal, the supplier station, the network management center, and the satellite is described along with the access methods and frequency/time plans. The complexity of developing this system using the CDMA architecture is compared to that of a Frequency Division Multiple Access (FDMA) architecture. The inherent advantages and disadvantages of the two architectures are compared and their respective capacities are discussed.

  18. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems

    DEFF Research Database (Denmark)

    Handlos, Line Neerup; Olwig, Karen Fog; Bygbjerg, Ib Christian

    2016-01-01

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely...... unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia...

  19. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru Miyauchi; Yanjun Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirmlow optical loss and environmental stabilities.

  20. High-Speed Optical Local Access Network System Using Bi-Directional Polarization Multiplexing

    Institute of Scientific and Technical Information of China (English)

    Mitsuru; Miyauchi; Yanjun; Sun

    2003-01-01

    A high-speed and economical optical local access network system is proposed where bi-directional polarization multiplexing is applied to a bi-directional transmission. Experimental results using a prototype system confirm low optical loss and environmental stabilities.

  1. Applying the Earth System Grid Security System in a Heterogeneous Environment of Data Access Services

    Science.gov (United States)

    Kershaw, Philip; Lawrence, Bryan; Lowe, Dominic; Norton, Peter; Pascoe, Stephen

    2010-05-01

    CEDA (Centre for Environmental Data Archival) based at STFC Rutherford Appleton Laboratory is host to the BADC (British Atmospheric Data Centre) and NEODC (NERC Earth Observation Data Centre) with data holdings of over half a Petabyte. In the coming months this figure is set to increase by over one Petabyte through the BADC's role as one of three data centres to host the CMIP5 (Coupled Model Intercomparison Project Phase 5) core archive of climate model data. Quite apart from the problem of managing the storage of such large volumes there is the challenge of collating the data together from the modelling centres around the world and enabling access to these data for the user community. An infrastructure to support this is being developed under the US Earth System Grid (ESG) and related projects bringing together participating organisations together in a federation. The ESG architecture defines Gateways, the web interfaces that enable users to access data and data serving applications organised into Data Nodes. The BADC has been working in collaboration with US Earth System Grid team and other partners to develop a security system to restrict access to data. This provides single sign-on via both OpenID and PKI based means and uses role based authorisation facilitated by SAML and OpenID based interfaces for attribute retrieval. This presentation will provide an overview of the access control architecture and look at how this has been implemented for CEDA. CEDA has developed an expertise in data access and information services over several years through a number of projects to develop and enhance these capabilities. Participation in CMIP5 comes at a time when a number of other software development activities are coming to fruition. New services are in the process of being deployed alongside services making up the system for ESG. The security system must apply access control across this heterogeneous environment of different data services and technologies. One strand

  2. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  3. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  4. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  5. 77 FR 48199 - Privacy Act; System of Records: State-35, Information Access Programs Records

    Science.gov (United States)

    2012-08-13

    ... user must first be granted access to the Department of State computer system. All employees of the... trails of access from the computer media, thereby permitting regular and ad hoc monitoring of computer usage. RETENTION AND DISPOSAL: Records are retired and destroyed in accordance with published...

  6. Evaluation on the Occupational Information Access System as Used at Churchill High School. A Project Report.

    Science.gov (United States)

    McKinlay, Bruce; Adams, Daniel

    The Occupational Information Access System (OIAS) improves the accessibility of occupational labor market information for career planning. Its operation at Churchill High School is evaluated from several angels: the likes and dislikes of users; the effect of OIAS on users' knowledge of occupational information and on their career plans; why other…

  7. TECHNOLOGY FOR ADMINISTERING OF THE ACCESS TO INFORMATION RESOURCES IN MANAGEMENT SYSTEM ON THE AVIATION ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Andrey V. Degtyarev

    2015-01-01

    Full Text Available The task of administering software-information complex occurs duringthe development of application systems for managing business-processes and is connected with the organization of access forusers to information resources in conditions of multi-user information systems for management. For solution of this problem proposed theapproach, which is based on a hierarchical system of access rightsto information resources on the levels: tool, object and procedural.Keywords: software-information complex, information resources,administering, permissions, separation of powers, access model.

  8. The storage system of PCM based on random access file system

    Science.gov (United States)

    Han, Wenbing; Chen, Xiaogang; Zhou, Mi; Li, Shunfen; Li, Gezi; Song, Zhitang

    2016-10-01

    Emerging memory technologies such as Phase change memory (PCM) tend to offer fast, random access to persistent storage with better scalability. It's a hot topic of academic and industrial research to establish PCM in storage hierarchy to narrow the performance gap. However, the existing file systems do not perform well with the emerging PCM storage, which access storage medium via a slow, block-based interface. In this paper, we propose a novel file system, RAFS, to bring about good performance of PCM, which is built in the embedded platform. We attach PCM chips to the memory bus and build RAFS on the physical address space. In the proposed file system, we simplify traditional system architecture to eliminate block-related operations and layers. Furthermore, we adopt memory mapping and bypassed page cache to reduce copy overhead between the process address space and storage device. XIP mechanisms are also supported in RAFS. To the best of our knowledge, we are among the first to implement file system on real PCM chips. We have analyzed and evaluated its performance with IOZONE benchmark tools. Our experimental results show that the RAFS on PCM outperforms Ext4fs on SDRAM with small record lengths. Based on DRAM, RAFS is significantly faster than Ext4fs by 18% to 250%.

  9. Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Kim, Tai-Hoon

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  10. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  11. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  12. 78 FR 71028 - Combi USA, Inc., Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ... not require the Agency to grant the petition.\\2\\ \\2\\ See Dorel Juvenile Group; Denial of Appeal of... risk.'' See Dorel Juvenile Group; 75 FR at 510, quoting Cosco, Inc., denial of Application for Decision... there will not be failures in the future. See Dorel Juvenile Group, Denial of Petition for Decision...

  13. 2 CFR 801.1105 - Cause for a limited denial of participation.

    Science.gov (United States)

    2010-01-01

    ... (Department of Veterans Affairs Optional Subpart for OMB Guidance at 2 CFR Part 180). § 801.1105 Cause for a limited denial of participation. (a) Causes. A limited denial of participation shall be based upon... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Cause for a limited denial of...

  14. Distributed Denial of Service Tools, Trin00, Tribe Flood Network, Tribe Flood Network 2000 and Stacheldraht.

    Energy Technology Data Exchange (ETDEWEB)

    Criscuolo, P. J.

    2000-02-14

    One type of attack on computer systems is know as a Denial of Service (DoS) attack. A DoS attack is designed to prevent legitimate users from using a system. Traditional Denial of Service attacks are done by exploiting a buffer overflow, exhausting system resources, or exploiting a system bug that results in a system that is no longer functional. In the summer of 1999, a new breed of attack has been developed called Distributed Denial of Service (DDoS) attack. Several educational and high capacity commercial sites have been affected by these DDoS attacks. A DDoS attack uses multiple machines operating in concert to attack a network or site. There is very little that can be done if you are the target of a DDoS. The nature of these attacks cause so much extra network traffic that it is difficult for legitimate traffic to reach your site while blocking the forged attacking packets. The intent of this paper is to help sites not be involved in a DDoS attack. The first tools developed to perpetrate the DDoS attack were Trin00 and Tribe Flood Network (TFN). They spawned the next generation of tools called Tribe Flood Network 2000 (TFN2K) and Stacheldraht (German for Barb Wire). These DDoS attack tools are designed to bring one or more sites down by flooding the victim with large amounts of network traffic originating at multiple locations and remotely controlled by a single client. This paper discusses how these DDoS tools work, how to detect them, and specific technical information on each individual tool. It is written with the system administrator in mind. It assumes that the reader has basic knowledge of the TCP/IP Protocol.

  15. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  16. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  17. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  18. Towards a Reference Model for Open Access and Knowledge Sharing, Lessons from Systems Research

    CERN Document Server

    Di Maio, Paola

    2011-01-01

    The Open Access Movement has been striving to grant universal unrestricted access to the knowledge and data outputs of publicly funded research. leveraging the real time, virtually cost free publishing opportunities offered by the internet and the web. However, evidence suggests that in the systems engineering domain open access policies are not widely adopted. This paper presents the rationale, methodology and results of an evidence based inquiry that investigates the dichotomy between policy and practice in Open Access (OA) of systems engineering research in the UK, explores entangled dimensions of the problem space from a socio-technical perspective, and issues a set of recommendations, including a reference model outline for knowledge sharing in systems research

  19. Application of Attribute Based Access Control Model for Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Erkan Yalcinkaya

    2017-02-01

    Full Text Available The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.

  20. Measuring the Gap Between Car and Transit Accessibility : Estimating Access Using a High-Resolution Transit Network Geographic Information System

    NARCIS (Netherlands)

    Benenson, I.; Martens, C.J.C.M.; Rofé, Y.

    2010-01-01

    Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,

  1. Socially desirable responding in Chinese university students: denial and enhancement?

    Science.gov (United States)

    Li, Feng; Li, Yongjuan; Wang, Yong

    2015-04-01

    This study examined the Balanced Inventory of Desirable Responding (BIDR) with one-, two-, three-, and four-dimensional models and tested the BIDR's discriminant validity with personality variables. A confirmatory and exploratory factor analysis of responses from 600 Chinese university students (314 men, 282 women, 4 missing; M age=20.0 yr.) provided results indicating that the four-factor model fit the data best; i.e., self-deception and impression management split into denial and enhancement. The Denial and Enhancement subscales with personality variables show significant differences, confirming the four-factor model. The cultural differences as a possible reason for the split were discussed.

  2. China to Create an Access System for the Reproductive Health Industry Based on Quality Accreditation

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ Zhang Weiqing, director of the National Population and Family Planning Commission (NPFPC), disclosed at the inaugural meeting of the China Reproductive Health Industry Association (CRIA), held on March 26, 2007, that China will create an inspection system, a quality accreditation system, and an industry access system for better population structure and family planning.

  3. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Science.gov (United States)

    2010-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical...

  4. A portable marine geophysical data access and management system

    Digital Repository Service at National Institute of Oceanography (India)

    Kunte, P.D.; Narvekar, P.

    on Windows PC. GPDAMS consists of four modules, namely data import module, query builder or search module, data visualization and download module, and data management (administration) module. GPDAMS is a complete marine geophysical data management system...

  5. Massive M2M Access with Reliability Guarantees in LTE Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir;

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals...... approach, based on a standard operation of the cellular access. The access procedure is divided into two phases, an estimation phase and a serving phase. In the estimation phase the number of arrivals is estimated and this information is used to tune the amount of resources allocated in the serving phase...

  6. Study of LANs access technologies in wind power system

    DEFF Research Database (Denmark)

    Wei, Mu; Chen, Zhe

    2010-01-01

    Due to the energy challenges in the world, new types of generation technologies, such as renewable energy based generators, attract great attention and are being quickly developed, which results in the dramatic developments and changes in modern power systems, the communication technologies play...... a increasingly important role in guaranteeing the power system’s stability, reliability, and security. In this paper the necessity of communication technologies employed in wind power system are introduced. According the International Standards Organization (ISO) reference 7-layered model, the communication...... power environment are explained and discussed. Furthermore the simulation of application of Ethernet in an offshore wind farm communication network by a software, OPNET, is elaborated. With the investigation of the communication technologies in this paper, the offshore wind farm SCADA system can...

  7. Labeling and Rating Systems: Greater Access or Censorship?

    Science.gov (United States)

    Martin, Ann M.

    2015-01-01

    This article asks the question: How well versed are school librarians on issues related to labeling and rating systems? As school librarians continue to design and implement resource location schemes to assist patrons, they must recognize the difference between using labels to create interest in books or implementing labeling and rating systems…

  8. Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    2000-01-01

    We present an approach to bus access optimization and schedulability analysis for the synthesis of hard real-time distribution embedded systems. The communication model is based on a time-triggered protocol. We have developed an analysis for the communication delays proposing four different message...... scheduling policies over a time-triggered communication channel. Optimization strategies for the bus access scheme are developed, and the four approaches to message scheduling are compared using extensive experiments....

  9. Asymmetry in Maritime Access and Undersea Anti-Access/Area-Denial Strategies

    Science.gov (United States)

    2007-08-31

    A corollary to the second criterion states that the threat involves a weapon, tactic, or strategy that the United States would not comnat by...Strategies and Their Implications for the United States," RAND Corporation , 2007. 32. Montgomery C. Meigs, "Unorthodox Thoughts about Asymmetric Warfare

  10. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  11. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Eles, Petru; Doboli, Alex; Pop, Paul;

    2000-01-01

    In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow...... of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have...... have to be considered during scheduling but also the parameters of the communication protocol should be adapted to fit the particular embedded application. The optimization algorithm, which implies both process scheduling and optimization of the parameters related to the communication protocol...

  12. AN ANALYSIS OF CURRENT COMPUTER NETWORK ATTACK PROCEDURES, THEIR MITIGATION MEASURES AND THE DEVELOPMENT OF AN IMPROVED DENIAL OF SERVICE (DoS ATTACK MODEL

    Directory of Open Access Journals (Sweden)

    IHEKWEABA OGECHI

    2013-04-01

    Full Text Available This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as a proof of concept, and then applied in the development of a model for an adaptive intelligent multi-agent for network protection, against denial of service attacks.

  13. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  14. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  15. Multi-tag content access control in RFID system

    OpenAIRE

    2010-01-01

    Radio Frequency Identification (RFID) makes great flexibility and high efficiency for data acquisition in industry and daily life. At the other side, it brings the privacy risks and multiple tags collision issue. Current research in RFID system focuses on the security and privacy issue which is based on authentication protocols between a tag and a Reader. There is a need to design a reasonable protocol which takes care of both multi-tag anti-collision and security issue. This thesis presen...

  16. Geoculture world system, access to Balkan and Albania

    Directory of Open Access Journals (Sweden)

    Ilirjan Çukaj

    2015-03-01

    Full Text Available If culture as a term covers a broad range of relations and social behavior, mutually implicated in influential and economic cycles of the global system, then it becomes wordy geoculture. Geoculture system is used as a term by Wallerstein (2004 who had treated it as a concept largely unused and under a theory of geoculture which plays an important role in the present world system. The theses that is presented in this article is that the global trajectory in the Balkan region is increasing from culture and that, it is imperative to establish a strategic culture direction and management, which, in turn, should be formed not only as a principal need, but also as an obligation of social state institutions to find the viable solutions of the global market policy, economy and culture. And in response to the challenging question the culture of integration becomes imperative now facing nationalism. Albania will have to manage perceptions, fears and realities arising from the above mentioned phenomenon, to establish a balance between the “inside” and “outside” views. In this sense main challenge of Albania is the management of cultural globalization to get the most of opportunities despite the risk of losing ground globally

  17. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  18. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  19. Rules and access rights of the Estonian integrated e-Health system.

    Science.gov (United States)

    Tiik, Madis

    2010-01-01

    There should be a clear understanding that when implementing an electronic health record system (EHR), one of the hardest problems we have to solve is the access rights. In Estonia this process lasted for three years and involved all stakeholders of the healthcare sector. Special ethical committee was established to advise the decision makers and doctors to help them understand the ethical dilemmas from the patient's and society's point of view. In this article you will find a short overview of the access rights of the system, roles of the healthcare systems' employees. Descriptions of some specific situations like underage patients and representation of patient with restricted active legal capacity.

  20. An Information System to Access Status Information of the LHCb Online

    Science.gov (United States)

    Frank, M.; Gaspar, C.

    2012-12-01

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  1. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  2. 45 CFR 1701.6 - Form of denial.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Form of denial. 1701.6 Section 1701.6 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL COMMISSION ON LIBRARIES AND... Libraries and Information Science, Suite 601, 1717 K Street NW., Washington, DC 20036, and (d) that...

  3. On climate change skepticism and denial in tourism

    NARCIS (Netherlands)

    Hall, C.M.; Amelung, B.; Cohen, S.; Eijgelaar, E.; Gössling, S.; Higham, J.; Leemans, R.; Peeters, P.; Ram, Y.; Scott, D.

    2015-01-01

    The period leading to and immediately after the release of the IPCC’s fifth series of climate change assessments saw substantial efforts by climate change denial interests to portray anthropogenic climate change (ACC) as either unproven theory or a negligible contribution to natural climate variabil

  4. 76 FR 76481 - Denial of Motor Vehicle Defect Petition

    Science.gov (United States)

    2011-12-07

    ... National Highway Traffic Safety Administration Denial of Motor Vehicle Defect Petition AGENCY: National... requesting that the agency initiate an investigation to determine whether a motor vehicle or item of replacement equipment does not comply with an applicable motor vehicle safety standard or contains a...

  5. 7 CFR 946.123 - Denial and appeals.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... WASHINGTON Rules and Regulations Special Purpose Certificates § 946.123 Denial and appeals. The committee may rescind a special purpose certificate issued to a handler for the purpose specified in § 946.120(a),...

  6. The Child with Cancer: Patterns of Communication and Denial.

    Science.gov (United States)

    Spinetta, John J.; Maloney, Lorrie J.

    1978-01-01

    Examines the role of communication and denial in coping efforts of children with cancer. Results indicate level of family communication about cancer expressed by mother's communication is correlated with hypothesized responses in child. Usefulness of three instruments as effective tools in measuring child's reactions is demonstrated. (Author/BEF)

  7. 45 CFR 5.34 - Appeal of denials.

    Science.gov (United States)

    2010-10-01

    ... give any explanation. (c) Review process. Before making a decision on an appeal of a denial, the designated review official will consult with the General Counsel to ensure that the rights and interests of... reasons why you believe that the FOIA exemption(s) we cited do not apply to the records that you...

  8. 42 CFR 433.148 - Denial or termination of eligibility.

    Science.gov (United States)

    2010-10-01

    ... Assignment of Rights to Benefits § 433.148 Denial or termination of eligibility. In administering the assignment of rights provision, the agency must: (a) Deny or terminate eligibility for any applicant or recipient who— (1) Refuses to assign his own rights or those of any other individual for whom he can...

  9. Experimental grid access for dynamic discovery and data transfer in distributed interactive simulation systems

    NARCIS (Netherlands)

    A. Tirado-Ramos; K. Zajac; Z. Zhao; P.M.A. Sloot; G.D. van Albada; M. Bubak

    2003-01-01

    Interactive Problem Solving Environments (PSEs) offer an integrated approach for constructing and running complex systems, such as distributed simulation systems. New distributed infrastructures, like the Grid, support the access to a large variety of core services and resources that can be used by

  10. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to b

  11. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2007-01-01

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  12. 28 CFR 16.99 - Exemption of the Immigration and Naturalization Service Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Immigration and....99 Exemption of the Immigration and Naturalization Service Systems-limited access. (a) The following systems of records of the Immigration and Naturalization Service are exempt from 5 U.S.C. 552a (c) (3)...

  13. 28 CFR 16.73 - Exemption of Office of Legal Policy System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Office of Legal Policy System—limited access. (a) The following system of records is exempt from 5 U.S.C..., or legal obligations or duties. (4) From subsections (e)(4)(G) and (H) because this system is exempt... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of Office of Legal...

  14. A Distributed Metadata Management, Data Discovery and Access System

    CERN Document Server

    Palanisamy, Giriprakash; Green, Jim; Wilson, Bruce

    2010-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, among other features. Mercury provides a single portal to information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fa...

  15. A High Speed Mobile Courier Data Access System That Processes Database Queries in Real-Time

    Science.gov (United States)

    Gatsheni, Barnabas Ndlovu; Mabizela, Zwelakhe

    A secure high-speed query processing mobile courier data access (MCDA) system for a Courier Company has been developed. This system uses the wireless networks in combination with wired networks for updating a live database at the courier centre in real-time by an offsite worker (the Courier). The system is protected by VPN based on IPsec. There is no system that we know of to date that performs the task for the courier as proposed in this paper.

  16. Environmental Information Management For Data Discovery and Access System

    Science.gov (United States)

    Giriprakash, P.

    2011-01-01

    Mercury is a federated metadata harvesting, search and retrieval tool based on both open source software and software developed at Oak Ridge National Laboratory. It was originally developed for NASA, and the Mercury development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury was developed during 2007 and released in early 2008. This new version provides orders of magnitude improvements in search speed, support for additional metadata formats, integration with Google Maps for spatial queries, support for RSS delivery of search results, and ready customization to meet the needs of the multiple projects which use Mercury. For the end users, Mercury provides a single portal to very quickly search for data and information contained in disparate data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow ! the users to perform simple, fielded, spatial and temporal searches across these metadata sources. This centralized repository of metadata with distributed data sources provides extremely fast search results to the user, while allowing data providers to advertise the availability of their data and maintain complete control and ownership of that data.

  17. Accessing Multi-Source Geological Data through Network in MORPAS Software System

    Institute of Scientific and Technical Information of China (English)

    Mei Hongbo; Hu Guangdao; Chen Jianguo; Li Zhenhua

    2003-01-01

    MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.

  18. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  19. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway.

    Science.gov (United States)

    García, Carmelo R; Quesada-Arencibia, Alexis; Cristóbal, Teresa; Padrón, Gabino; Pérez, Ricardo; Alayón, Francisco

    2015-08-18

    The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  20. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  1. Transparent image access in a distributed picture archiving and communications system: The master database broker

    OpenAIRE

    Cox, R D; Henri, C. J.; Rubin, R. K.

    1999-01-01

    A distributed design is the most cost-effective system for small- to medium-scale picture archiving and communications systems (PACS) implementations. However, the design presents an interesting challenge to developers and implementers: to make stored image data, distributed throughout the PACS network, appear to be centralized with a single access point for users. A key component for the distributed system is a central or master database, containing all the studies that have been scanned int...

  2. Quality Test Template toward Multi-user Access Control of Internet-Based System

    Directory of Open Access Journals (Sweden)

    Nan Nie

    2011-06-01

    Full Text Available Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

  3. Error correction coding for frequency-hopping multiple-access spread spectrum communication systems

    Science.gov (United States)

    Healy, T. J.

    1982-01-01

    A communication system which would effect channel coding for frequency-hopped multiple-access is described. It is shown that in theory coding can increase the spectrum utilization efficiency of a system with mutual interference to 100 percent. Various coding strategies are discussed and some initial comparisons are given. Some of the problems associated with implementing the type of system described here are discussed.

  4. 49 CFR 37.185 - Fleet accessibility requirement for OTRB fixed-route systems of large operators.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Fleet accessibility requirement for OTRB fixed....185 Fleet accessibility requirement for OTRB fixed-route systems of large operators. Each large... percent of the buses in its fleet with which it provides fixed-route service are readily accessible to...

  5. Using geographic information system tools to improve access to MS specialty care in Veterans Health Administration.

    Science.gov (United States)

    Culpepper, William J; Cowper-Ripley, Diane; Litt, Eric R; McDowell, Tzu-Yun; Hoffman, Paul M

    2010-01-01

    Access to appropriate and timely healthcare is critical to the overall health and well-being of patients with chronic diseases. In this study, we used geographic information system (GIS) tools to map Veterans Health Administration (VHA) patients with multiple sclerosis (MS) and their access to MS specialty care. We created six travel-time bands around VHA facilities with MS specialty care and calculated the number of VHA patients with MS who resided in each time band and the number of patients who lived more than 2 hours from the nearest specialty clinic in fiscal year 2007. We demonstrate the utility of using GIS tools in decision-making by providing three examples of how patients' access to care is affected when additional specialty clinics are added. The mapping technique used in this study provides a powerful and valuable tool for policy and planning personnel who are evaluating how to address underserved populations and areas within the VHA healthcare system.

  6. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  7. 28 CFR 16.92 - Exemption of Environment and Natural Resources Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ....92 Exemption of Environment and Natural Resources Division Systems—limited access. (a)(1) The...) Environment and Natural Resources Division Case and Related Files System, JUSTICE/ENRD-003. (ii) (2) These..., the applicable exemption may be waived by the Environment and Natural Resources Division. (b)...

  8. An API-based search system for one click access to information

    NARCIS (Netherlands)

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    2013-01-01

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  9. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  10. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Rotger, Gabriel Pons; Sick Nielsen, Thomas

    2015-01-01

    and Metro system due to the construction of a new terminal Metro station connecting southern townships to the city centre of Copenhagen. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...

  11. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    Science.gov (United States)

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  12. The integration of open access journals in the scholarly communication system: Three science fields

    DEFF Research Database (Denmark)

    Faber Frandsen, Tove

    2009-01-01

    The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences...

  13. Accessibility Evaluation of Online Learning Management System for Persons with Visual Impairment

    Science.gov (United States)

    Suwannawut, Nantanoot

    2014-01-01

    Many academic institutions around the world are utilizing and investing in online learning management systems (LMS). While several research studies have examined the functionality of this type of technology, little attention has been paid to accessibility issues, in particular to the complex web-based interfaces for learners with disabilities,…

  14. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  15. Design and Implementation of File Access and Control System Based on Dynamic Web

    Institute of Scientific and Technical Information of China (English)

    GAO Fuxiang; YAO Lan; BAO Shengfei; YU Ge

    2006-01-01

    A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained.

  16. Closed Catheter Access System Implementation in Reducing Bloodstream Infection Rate in Low Birth Weight Preterm Infants

    Directory of Open Access Journals (Sweden)

    Lily eRundjan

    2015-03-01

    Full Text Available Background Bloodstream infection (BSI is one of the significant causes of morbidity and mortality encountered in a neonatal intensive care unit (NICU, especially in developing countries. Despite the implementation of infection control practices, such as strict hand hygiene, the BSI rate in our hospital is still high. The use of a closed catheter access system to reduce BSI related to intravascular catheter has hitherto never been evaluated in our hospital. Objective To determine the effects of closed catheter access system implementation in reducing the BSI rate in preterm neonates with low birth weight.Methods Randomized clinical trial was conducted on 60 low birth weight preterm infants hospitalized in the neonatal unit at Cipto Mangunkusumo Hospital, Jakarta, Indonesia from June to September, 2013. Randomized subjects either received a closed or non-closed catheter access system. Subjects were monitored for 2 weeks for the development of BSI based on clinical signs, abnormal infection parameters, and blood culture. Results Closed catheter access system implementation gave a protective effect towards the occurrence of culture-proven BSI (relative risk 0.095, 95% CI 0.011 to 0.85, p=0.026. Risk of culture-proven BSI in the control group was 10.545 (95% CI 1.227 to 90.662, p=0.026. BSI occurred in 75% of neonates without risk factors of infection in the control group compared to none in the study group.Conclusions The use of a closed catheter access system reduced the BSI in low birth weight preterm infants. Choosing the right device design, proper disinfection of device and appropriate frequency of connector change should be done simultaneously.

  17. Combinatory Spread—Spectrum Multiple—Access Based on Residue Number System:System and Performance

    Institute of Scientific and Technical Information of China (English)

    YangLieliang; LiChengshu

    1995-01-01

    A combinatory direct-sequence based on residue number system(RNS),spread spec-trum multiple-access communication system model is presented.Under this communication envi-ronment,each user is assigned a set of∑i=1lmi(when i≠j,gcd(mi,mj)=1)othogonal sequences;Each receiver has ∑i=1l micorrelators used for despread,log2(пi=1lmi) information bits can be trans-mitted in a symbol period.We obtain approximations for the multiuser probability of error when the channel noise is a combination of additive white Gaussian noise (AWGN)and multiple-access interference .In section4,we compare the performance such as transmission capability,system structure,and the probability of error with the system proposed by P.K.Enge.

  18. Impact Analysis of Denial of Service (DoS due to Packet Flooding

    Directory of Open Access Journals (Sweden)

    Dr. Deepak Arora

    2014-06-01

    Full Text Available In the current scenario, it is noticed that when a server reached to its threshold value then there is situation of packet flooding. Flooding can arise in two ways first when many user make request to the server at same instant of time and other when a single user makes a huge number of requests intentionally to jam the network traffic for that particular server. This intentionally arise situation is called as Denial of Service (DoS attack. DoS attacks are gigantic threat to internet users and websites. Distributed Denial of Service (DDoS is an improvised approach for restricting the legitimate users to use intended service. DDoS attacker uses software vulnerabilities of other computer system on the network in order to setup the attacking network for the victim. In this paper, the focus will be on the behavior of server or victim machine regarding various parameters under DoS attack by using LAN network simulated on OPNET Modeler. It provides model families, that can be used for simulation and record various parameters as realistic value.

  19. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  20. Research and teaching access to a large clinical picture archiving and communication system

    OpenAIRE

    Harrison, Marc; Koh, Justin; Tran, Steven; Mongkolwat, Patanasak; Channin, David S.

    2001-01-01

    Purpose: To identify practical issues surrounding delivering digital images from picture archiving and communication systems (PACS) for research and teaching purposes. The complexity of Digital Imaging and Communications in Medicine (DICOM) access methods, security, patient confidentiality, PACS database integrity, portability, and scalability are discussed. A software prototype designed to resolve these issues is described.System Architecture: A six-component, three-tier, client server softw...

  1. Building a foundation for systems change: increasing access to physical activity programs for older adults.

    Science.gov (United States)

    Lachenmayr, Sue; Mackenzie, Geraldine

    2004-10-01

    Although 25% of U.S. adults are physically inactive, this percentage increases dramatically for older adults. Organizational change theory guided a state health department in identifying system gaps and developing strategies to expand programming for seniors. A survey of provider agencies in New Jersey assessed (a) capacity for physical activity programs for older adults, (b) accessibility of programs, and (c) barriers to providing programs. One hundred sixty agencies provided physical activity programs to almost 184,000 individuals annually. Fewer than one half of the agencies provided exercise programs for people with disabilities, and only 44% provided in-home programs. Eighty-two percent of program providers wanted to expand programming but cited lack of trained instructors and peer leaders, inadequate facility space, insufficient funding, and limited transportation resources as barriers. Sustaining older adult behavior change requires infrastructure that will ensure access to diverse physical activities. This article provides strategies to expand access to physical activity programs for older adults.

  2. A Novel Memory Structure for Embedded Systems: Flexible Sequential and Random Access Memory

    Institute of Scientific and Technical Information of China (English)

    Ying Chen; Karthik Ranganathan; Vasudev V. Pai; David J. Lilja; Kia Bazargan

    2005-01-01

    The on-chip memory performance of embedded systems directly affects the system designers' decision about how to allocate expensive silicon area. A novel memory architecture, flexible sequential and random access memory (FSRAM),is investigated for embedded systems. To realize sequential accesses, small "links" are added to each row in the RAM array to point to the next row to be prefetched. The potential cache pollution is ameliorated by a small sequential access buffer (SAB). To evaluate the architecture-level performance of FSRAM, we ran the Mediabench benchmark programs on a modified version of the SimpleScalar simulator. Our results show that the FSRAM improves the performance of a baseline processor with a 16KB data cache up to 55%, with an average of 9%; furthermore, the FSRAM reduces 53.1% of the data cache miss count on average due to its prefetching effect. We also designed RTL and SPICE models of the FSRAM, which show that the FSRAM significantly improves memory access time, while reducing power consumption, with negligible area overhead.

  3. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  4. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    Science.gov (United States)

    2001-10-01

    digital commerce , but some researchers have also looked at the use of payment schemes as a means of mitigating denials of service. Fungible (or...transferable) digital payment schemes range from anonymous cash schemes such as David Chaum’s Digicash [Digi] [Cha83], to electronic checks and...Markup WGs, www.w3.org/ ECommerce /Micro-payments/ [Milli] Compaq Millicent, www.millicent.digital.com [Pay] PayPal, www.paypal.com [NS2] NS-2

  5. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    Science.gov (United States)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  6. Discovery of abundant, accessible hydrocarbons nearly everywhere in the solar system

    Energy Technology Data Exchange (ETDEWEB)

    Zuppero, A.

    1996-05-01

    analysis of the data gathered during the Comet Halley encounter during 1987 resulted in a body of literature asserting that all comets contain substantial percentages of hydrocarbon solids. These solids appear to have a strong similarity to petrochemicals. Arguments are made that the amount of hydrocarbon material in the accessible comets of the inner Solar system can substantially exceed the known reserves of hydrocarbons on Earth. An example is given of at least one conceptually simple method to use comet material as feedstock for space transportation schemes that can move masses through the solar system comparable to the mass carried by oil supertankers. The presentation concludes we need to send prospecting and assay probes to a sampling of the accessible comets to determine the amount of hydrocarbons and the form and location of materials needed for space transportation systems.

  7. Open Access Intellectual Property Systems: A Comparison to Commercial Solutions in Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    Jan Cerny

    2016-07-01

    Full Text Available ICT/IS management plays an important role within the framework of innovation management, and one of the key elements of this role is the support of Competitive Intelligence in the context of innovation processes. The strategic information needs of innovation management are also directed towards different kinds of intellectual property (IP information entities and commercialization. The purpose of this paper is to define these entities and IP information systems as an important part of a company’s Competitive Intelligence Unit for competitor analysis and technology trends. The open access IP information systems will be analysed together with commercial solutions.. The aim of this paper is to underline the importance of open access IP systems compared to added value commercial solutions for competitive intelligence purposes for SMEs. The comparison will be carried out using examples of patent searches within a concrete dataset.

  8. Performance Analysis of Slotted Random Access DS-CDMA Systems with Multipacket Reception

    Institute of Scientific and Technical Information of China (English)

    ZHANGJidong; XULi; ZHENGBaoyu; XIAOHaiyong

    2004-01-01

    Multiple packets reception (MPR) is a new method to improve the network performance. If a node in the network has the capability of MPR, the node can receive multiple packets simultaneously, not to discard all the packets like the traditional method. In this paper, Bit error rate (BER) for direct-sequence spread spectrum multiple access system over Rice fading channel is considered, based on the standard Gaussian approximation, and the explicit close-form expression for BER is provided, which is expressed by a single integral. Moreover, the performance of random multiple access in the Direct-sequence code division multiple access (DS-CDMA) system with the capability of multiple packets reception is analyzed over Gaussian channel Rayleigh fading channel and Rice fad-ing channel, respectively, where the multiple packets reception is obtained by the method of match filter. The simulation results show that the MPR capability improves the throughput of DS-CDMA system greatly, compared with the conventional single packet reception. The system has the maximum throughput when signals are transmitted over the Gaussian channel. Also, the impact of Signal-to-noise ratio (SNR), channel coding and the traffic arrival model on the throughput of DS-CDMA system is given in the simulation and the analysis for the simulation results is provided.

  9. Greece's health crisis: from austerity to denialism.

    Science.gov (United States)

    Kentikelenis, Alexander; Karanikolos, Marina; Reeves, Aaron; McKee, Martin; Stuckler, David

    2014-02-22

    Greece's economic crisis has deepened since it was bailed out by the international community in 2010. The country underwent the sixth consecutive year of economic contraction in 2013, with its economy shrinking by 20% between 2008 and 2012, and anaemic or no growth projected for 2014. Unemployment has more than tripled, from 7·7% in 2008 to 24·3% in 2012, and long-term unemployment reached 14·4%. We review the background to the crisis, assess how austerity measures have affected the health of the Greek population and their access to public health services, and examine the political response to the mounting evidence of a Greek public health tragedy.

  10. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, C.L.; O' Rourke, J.E.; Allirot, D.; O' Connor, K.

    1980-09-01

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report.

  11. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-01-01

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption. PMID:27657096

  12. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  13. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Directory of Open Access Journals (Sweden)

    Line Neerup Handlos

    2016-09-01

    Full Text Available Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  14. What’s blocking sustainability? Human nature, cognition, and denial

    Directory of Open Access Journals (Sweden)

    William Rees

    2010-10-01

    Full Text Available In 1992, 1,700 of the world’s top scientists issued a public statement titled The World Scientists’ Warning to Humanity. They reported that “a great change in our stewardship of the Earth and the life on it is required if vast human misery is to be avoided and our global home on this planet is not to be irretrievably mutilated.” More than a decade later, the authors of the Millennium Ecosystem Assessment were moved to echo the scientists’ warning asserting that “[h]uman activity is putting such a strain on the natural functions of the Earth that the ability of the planet’s ecosystems to sustain future generations can no longer be taken for granted.” Ours is allegedly a science-based culture. For decades, our best science has suggested that staying on our present growth-based path to global development implies catastrophe for billions of people and undermines the possibility of maintaining a complex global civilization. Yet there is scant evidence that national governments, the United Nations, or other official international organizations have begun seriously to contemplate the implications for humanity of the scientists’ warnings, let alone articulate the kind of policy responses the science evokes. The modern world remains mired in a swamp of cognitive dissonance and collective denial seemingly dedicated to maintaining the status quo. We appear, in philosopher Martin Heidegger’s words, to be “in flight from thinking.” Just what is going on here? I attempt to answer this question by exploring the distal, biosocial causes of human economic behavior. My working hypothesis is that modern H. sapiens is unsustainable by nature—unsustainability is an inevitable emergent property of the systemic interaction between contemporary technoindustrial society and the ecosphere. I trace this conundrum to humanity’s once-adaptive, subconscious, genetic predisposition to expand (shared with all other species, a tendency reinforced by

  15. Face Recognition Based Door Lock System Using Opencv and C# with Remote Access and Security Features

    Directory of Open Access Journals (Sweden)

    Prathamesh Timse

    2014-04-01

    Full Text Available This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition system when an unknown person is being detected, wherein the system will send an email to the owner of the system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a Dropbox [8] account.

  16. Retention in a public health care system with free access to treatment

    DEFF Research Database (Denmark)

    Helleberg, Marie; Engsig, Frederik N; Kronborg, Gitte;

    2012-01-01

    OBJECTIVE:: We aimed to assess retention of HIV infected individuals in the Danish health care system over a 15-year period. METHODS:: Loss to follow-up (LTFU) was defined as 365 days without contact to the HIV care system. Data were obtained from the nationwide Danish HIV Cohort study, The Danis......, especially after initiation of HAART. Absence from HIV care is associated with increased mortality. We conclude that high rates of retention can be achieved in a health care system with free access to treatment and is associated with a favorable outcome....

  17. Can a self-referral system help improve access to psychological treatments?

    Science.gov (United States)

    Brown, June S L; Boardman, Jed; Whittinger, Naureen; Ashworth, Mark

    2010-05-01

    Referrals for psychological treatment have been problematic for many years. Even though GPs have attempted to limit access into the small psychological treatment services, long waiting lists have developed which have deterred referrals and deferred psychological care. GPs have understandably been frustrated. In addition, the consultation rate for psychological problems is low when compared with the rate of identified mental health problems in population surveys. Possible reasons include patients' failure to recognise the problem as psychological and thus not consulting one's GP, and/or the problem not being detected by the GP. While a self-referral system may be seen as a way of trying to allow non-consulters to receive treatment, this has been viewed with some scepticism since it may allow the 'worried well' to access already limited services. However, a study has shown that those self-referring to advertised psychological workshops had high levels of psychological morbidity and also were more representative of the population, in terms of ethnicity, than GP referrals. The government has set up the Increasing Access to Psychological Therapies (IAPT) programme to address some of the service shortfalls by expanding the provision of psychological therapists. Notably, the IAPT programme is allowing self-referrals such that any member of the public can access the service directly, bypassing general practice. Although not available at all the sites, this represents a radical shift from the present system in which access to talking therapy is generally only available through direct referral by the GP. The implications of this new development are discussed.

  18. Security Camera System can be access into mobile with internet from remote place

    Directory of Open Access Journals (Sweden)

    Dr. Khanna SamratVivekanand Omprakash

    2012-01-01

    Full Text Available This paper represents how camera can captured the images and video into the database and then it may transformed to the mobile with help of Internet. Developing mobile applications how the data can be viewed on the mobile from the remote place. By assigning real IP to the storage device from ISP and connected to the internet . Developing mobile applications on windows mobile which runs only on the windows mobile . Wireless camera in terms of 4 , 8, 12, 16 are connected with the system. Windows based application develop for 4 , 8 , 12,16 channels to see at a time on desktop computer . The PC is connected with internet and having Client server application which is connected to the Windows Web hosting Server through the internet. With the help of ISP server we can assign IP to the Window Web Server with domain name . Domain name will be access from the world. By developing mobile applications on web we can access it on mobile . Separate setup of windows .exe develop for the Windows Mobile phone to access the information from the server. Client setup can be installed on the mobile and it fetches the data from server and server is based on real IP with domain name and connected with Internet . Digital Wireless cameras are connected & data is stored in Digital Video Recorder having 1 Terabyte of hard disk with different channel like 4, 8, 12,16. We can see Video output in mobile by installing the client setup or by accessing directly from web browser which supports the application for mobile. The beauty of this software is that we can access security camera system into the mobile with internet from remote place.

  19. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  20. A web accessible scientific workflow system for vadoze zone performance monitoring: design and implementation examples

    Science.gov (United States)

    Mattson, E.; Versteeg, R.; Ankeny, M.; Stormberg, G.

    2005-12-01

    Long term performance monitoring has been identified by DOE, DOD and EPA as one of the most challenging and costly elements of contaminated site remedial efforts. Such monitoring should provide timely and actionable information relevant to a multitude of stakeholder needs. This information should be obtained in a manner which is auditable, cost effective and transparent. Over the last several years INL staff has designed and implemented a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition from diverse sensors (geophysical, geochemical and hydrological) with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic javascript and html/css) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This system has been implemented and is operational for several sites, including the Ruby Gulch Waste Rock Repository (a capped mine waste rock dump on the Gilt Edge Mine Superfund Site), the INL Vadoze Zone Research Park and an alternative cover landfill. Implementations for other vadoze zone sites are currently in progress. These systems allow for autonomous performance monitoring through automated data analysis and report generation. This performance monitoring has allowed users to obtain insights into system dynamics, regulatory compliance and residence times of water. Our system uses modular components for data selection and graphing and WSDL compliant webservices for external functions such as statistical analyses and model invocations. Thus, implementing this system for novel sites and extending functionality (e.g. adding novel models) is relatively straightforward. As system access requires a standard webbrowser

  1. Low-Cost Encoding Device for Optical Code Division Multiple Access System

    OpenAIRE

    Mohammad S. Ab-Rahman; Boonchuan Ng; Norshilawati M. Ibrahim; Sahbudin Shaari

    2009-01-01

    Problem statement: Instead of using Fiber Bragg Grating (FBG) to develop the coded spectrums, which consist of expensive elements, the grating also are highly sensitive to environmental changes and this will contribute to the increment of capital and operational expenditures (CAPEX and OPEX). Approach: This study presented the development of low-cost 16-ports encoding device for Optical Code Division Multiple Access (OCDMA) systems based on Arrayed Waveguide Grating (AWG) devices and optical ...

  2. Osiris: accessible and reproducible phylogenetic and phylogenomic analyses within the Galaxy workflow management system

    OpenAIRE

    2014-01-01

    Background Phylogenetic tools and ‘tree-thinking’ approaches increasingly permeate all biological research. At the same time, phylogenetic data sets are expanding at breakneck pace, facilitated by increasingly economical sequencing technologies. Therefore, there is an urgent need for accessible, modular, and sharable tools for phylogenetic analysis. Results We developed a suite of wrappers for new and existing phylogenetics tools for the Galaxy workflow management system that we call Osiris. ...

  3. An Acquisition Performance Analysis of DS-MC-CDMA System under Multiple Access Interference Conditions

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Multi-Access Interference's (MAI's) effect on parallel acquisition performance of DS-Multi-carrier CDMA system under the typical indoor radio channel is discussed in the paper. Moreover, a comparison of acquisition performance impairment produced by the MAI in DS-MC-CDMA and DS-Single-carrier CDMA is also made. Results are given in terms of average acquisition time obtained by means of simulations and theory analysis.

  4. Frequency-selective design of wireless power transfer systems for controlled access applications

    Science.gov (United States)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  5. GAPforAPE: an augmented browsing system to improve Web 2.0 accessibility

    Science.gov (United States)

    Mirri, Silvia; Salomoni, Paola; Prandi, Catia; Muratori, Ludovico Antonio

    2012-09-01

    The Web 2.0 evolution has spread more interactive technologies which affected accessibility for users who navigate the Web by using assistive technologies. In particular, the partial download of new data, the continuous refreshing, and the massive use of scripting can represent significant barriers especially for people with visual impairments, who enjoy the Web by means of screen readers. On the other hand, such technologies can be an opportunity, because they can provide a new means of transcoding Web content, making the Web more accessible. In this article we present GAPforAPE, an augmented browsing system (based on Web browsers extensions) which offers a user's profiling system and transcodes Web content according to constrains declared by users: the same Web page is provided to any user, but GAPforAPE computes adequate customizations, by exploiting scripting technologies which usually affect Web pages accessibility. GAPforAPE imitates screen readers behavior: it applies a specific set of transcoding scripts devoted to a given Web site, when available, and a default set of transcoding operations otherwise. The continuous and quick evolution of the Web has shown that a crowdsourcing system is a desirable solution, letting the transcoding scripts evolve in the same way.

  6. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Directory of Open Access Journals (Sweden)

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  7. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  8. Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization Along With Password Authentication And Billing System

    Directory of Open Access Journals (Sweden)

    Asst.Prof.T.A.More

    2015-03-01

    Full Text Available In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.

  9. The optimal access system for future far-offshore wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  10. ANOMALY BASED APPROACH FOR DEFENDING DENIAL OF SERVICE ATTACK IN WEB TRAFFIC

    Directory of Open Access Journals (Sweden)

    R. Ramkumar

    2015-10-01

    Full Text Available Distributed Denial of Service (DDOS attacks has become a great threat for internet security. This attackis an advanced form of DOS (Denial of Service attack. This attack changes its whole origin ID and it gives trouble to find it out and it has become a serious threat for internet security.

  11. 34 CFR 5.80 - Review of denial of a record.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Review of denial of a record. 5.80 Section 5.80 Education Office of the Secretary, Department of Education AVAILABILITY OF INFORMATION TO THE PUBLIC PURSUANT TO PUB. L. 90-23 (Eff. until 7-14-10) Administrative Review § 5.80 Review of denial of a...

  12. 77 FR 56701 - Morgan Olson, LLC, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2012-09-13

    ... Administration [Docket No. NHTSA-2012-0028; Notice 2] Morgan Olson, LLC, Denial of Petition for Decision of... Petition Denial. SUMMARY: Morgan Olson, LLC (Morgan Olson),\\1\\ has determined that certain model year 2009, 2010, and 2011 Morgan Olson walk-in van-type trucks having a gross vehicle weight rating (GVWR) over...

  13. Cognitive dissonance as an explanation of the genesis, evolution and persistence of Thabo Mbeki's HIV denialism.

    Science.gov (United States)

    Kenyon, Chris

    2008-05-01

    The ongoing damage that the newer forms of HIV denialism are visiting upon our country is evidenced by the recent firing of Nozizwe Madlala-Routledge, the South African Deputy Minister of Health. It is widely believed that the underlying reason for her dismissal was her support of orthodox HIV treatment and prevention strategies and her disdain for HIV denialism. This paper seeks to understand the origins, spread and metamorphosis of President Thabo Mbeki's HIV denialism in South Africa. Using the theory of cognitive dissonance, I argue that, given the structural beliefs of the African National Congress (ANC) and the pattern of emergence of HIV in the 1980s, a degree of scepticism around the putative science of HIV was probable in ANC circles. On assuming the Presidency in 1999, Mbeki tapped into this scepticism to formulate his initial biological version of HIV denialism, which claimed that 'a virus can't cause a syndrome.' The steady erosion of support for this flagrant HIV denialism, together with the rise of neoliberal thinking in the ANC, would lead to the evolution of this biological denialism into a form of treatment denialism. This ideology argued against the widespread provision and use of antiretroviral treatment. Empirical evidence is presented to demonstrate the extent to which ongoing HIV denial in the general population is continuing to fuel the spread of HIV.

  14. 76 FR 48887 - Liddy's Pharmacy, L.L.C. Denial of Application

    Science.gov (United States)

    2011-08-09

    ... Enforcement Administration Liddy's Pharmacy, L.L.C. Denial of Application On September 15, 2008, the Deputy...''), issued an Order to Show Cause to ] Liddy's Pharmacy, L.L.C. (Respondent), of Lakeland, Florida. The Show... retail pharmacy, and the denial of any pending applications for renewal or modification of...

  15. 26 CFR 1.585-5 - Denial of bad debt reserves for large banks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Denial of bad debt reserves for large banks. 1...) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions § 1.585-5 Denial of bad debt... other section for an addition to a reserve for bad debts. However, for these years, except as...

  16. Hate in the Classroom: Free Expression, Holocaust Denial, and Liberal Education

    Science.gov (United States)

    Cohen-Almagor, Raphael

    2008-01-01

    This article is concerned with a specific type of hate speech: Holocaust denial. It is concerned with the expression of this idea by educators. Should we allow Holocaust deniers to teach in schools? This article attempts to answer this question through a close look at the Canadian experience. First, I will establish that Holocaust denial is a…

  17. 42 CFR 431.223 - Denial or dismissal of request for a hearing.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Denial or dismissal of request for a hearing. 431.223 Section 431.223 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND... Fair Hearings for Applicants and Recipients Right to Hearing § 431.223 Denial or dismissal of...

  18. Power and Channel Allocation for Non-orthogonal Multiple Access in 5G Systems: Tractability and Computation

    OpenAIRE

    Lei, Lei; Yuan, Di; Ho, Chin Keong; Sun, Sumei

    2016-01-01

    Network capacity calls for significant increase for 5G cellular systems. A promising multi-user access scheme, non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC), is currently under consideration. In NOMA, spectrum efficiency is improved by allowing more than one user to simultaneously access the same frequency-time resource and separating multi-user signals by SIC at the receiver. These render resource allocation and optimization in NOMA different from orth...

  19. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    Science.gov (United States)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  20. Denial of reward in the neonate shapes sociability and serotonergic activity in the adult rat.

    Directory of Open Access Journals (Sweden)

    Anastasia Diamantopoulou

    Full Text Available BACKGROUND: Manipulations of the early environment are linked to long-lasting alterations of emotionality and social capabilities. Denial of rewarding mother-pup interactions in early life of rats could serve as model for child neglect. Negative consequences for social competence in later life, accompanied by changes in the serotonergic system would be expected. In contrast, rewarding mother-pup contact should promote adequate social abilities. METHODOLOGY/PRINCIPAL FINDINGS: Male Wistar rats trained in a T-maze during postnatal days 10-13 under denial (DER or permission (RER of maternal contact were tested for play behavior in adolescence and for coping with defeat in adulthood. We estimated serotonin (5-HT levels in the brain under basal conditions and following defeat, as well as serotonin receptor 1A (5-HT1A and serotonin transporter (SERT expression. DER rats exhibited increased aggressive-like play behavior in adolescence (i.e. increased nape attacks, p<0.0001 and selected a proactive coping style during defeat in adulthood (higher sum of proactive behaviors: number of attacks, flights, rearings and defensive upright posture; p = 0.011, p<0.05 vs RER, non-handled-NH. In adulthood, they had lower 5-HT levels in both the prefrontal cortex (p<0.05 vs RER and the amygdala (p<0.05 vs NH, increased 5-HT levels following defeat (PFC p<0.0001 and decreased serotonin turnover (amygdala p = 0.008. The number of 5-HT1A immunopositive cells in the CA1 hippocampal area was increased (p<0.05 DER, vs RER, NH; SERT levels in the amygdala were elevated (p<0.05 vs RER, NH, but were lower in the prefrontal cortex (p<0.05 vs NH. CONCLUSIONS/SIGNIFICANCE: Denial of expected maternal reward early in life negatively affects sociability and the serotonergic system in a complex manner. We propose that our animal model could contribute to the identification of the neurobiological correlates of early neglect effects on social behavior and coping with challenges, but

  1. The FODA-TDMA satellite access scheme - Presentation, study of the system, and results

    Science.gov (United States)

    Celandroni, Nedo; Ferro, Erina

    1991-12-01

    A description is given of FODA-TDMA, a satellite access scheme designed for mixed traffic. The study of the system is presented and the choice of some parameters is justified. A simplified analytic solution is found, describing the steady-state behavior of the system. Some results of the simulation tests for an already existing hardware environment are also presented for the channel speeds of 2 and 8 Mb/s, considering both the stationary and the transient cases. The results of the experimentation at 2 Mb/s on the satellite Eutelsat-F2 are also presented and compared with the results of the simulation.

  2. Adaptive radio resource allocation for multiple traffic OFDMA broadband wireless access system

    Institute of Scientific and Technical Information of China (English)

    LU Yan-hui; LUO Tao; YIN Chang-chuan; YUE Guang-xin

    2006-01-01

    In this article, an adaptive radio resource allocation algorithm applied to multiple traffic orthogonal frequency division multiple access (OFDMA) system is proposed, which distributes subcarriers and bits among users according to their different quality of service requirements and traffic type. By classifying and prioritizing the users based on their traffic characteristic and ensuring resource for higher priority users, the new scheme decreases tremendously the outage probability of the users requiting a real-time transmission without impact on the spectrum efficiency of system, as well as the outage probability of data users is not increased compared with the radio resource allocation methods published.

  3. Analysis and Simulation for Capacity of Time Division-Synchronous Code Division Multiple Access System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Capacity both in uplink and downlink of TD-SCDMA (time division-synchronous code division multiple access)system is studied in a multi-cell environment. The theoretical expressions of the mean of intercell interference in uplinkand the mean of sum of power allocation in downlink are given, by which uplink and downlink capacity is analyzed.Furthermore, we give the simulation models for both uplink and downlink capacity. The results from theoretical analysisand simulation fit very well. In the end, the maximum number of users that TD-SCDMA system can serve for 12.2kspeech service is given.

  4. Design and performance evaluation of a wideband FM spread-spectrum multiple-access system

    Science.gov (United States)

    Wachsman, R. H.; Ghais, A. F.

    1971-01-01

    The system described performs the tracking and communications functions of a tracking and data relay satellite system (TDRS). The spread-spectrum signal format is achieved through wide deviation FM by a sinusoidal subcarrier unique to each multiple-access user. A compound phase-locked loop tracks carrier and subcarrier and demodulates data and ranging signals. Design parameters of user and ground terminals for TDRS are given. Acquisition procedures are described. Performance analyses are presented including the effects of noise, RFI, multipath and other users.

  5. U-Access: a web-based system for routing pedestrians of differing abilities

    Science.gov (United States)

    Sobek, Adam D.; Miller, Harvey J.

    2006-09-01

    For most people, traveling through urban and built environments is straightforward. However, for people with physical disabilities, even a short trip can be difficult and perhaps impossible. This paper provides the design and implementation of a web-based system for the routing and prescriptive analysis of pedestrians with different physical abilities within built environments. U-Access, as a routing tool, provides pedestrians with the shortest feasible route with respect to one of three differing ability levels, namely, peripatetic (unaided mobility), aided mobility (mobility with the help of a cane, walker or crutches) and wheelchair users. U-Access is also an analytical tool that can help identify obstacles in built environments that create routing discrepancies among pedestrians with different physical abilities. This paper discusses the system design, including database, algorithm and interface specifications, and technologies for efficiently delivering results through the World Wide Web (WWW). This paper also provides an illustrative example of a routing problem and an analytical evaluation of the existing infrastructure which identifies the obstacles that pose the greatest discrepancies between physical ability levels. U-Access was evaluated by wheelchair users and route experts from the Center for Disability Services at The University of Utah, USA.

  6. The denial of death thesis: sociological critique and implications for palliative care.

    Science.gov (United States)

    Zimmermann, Camilla; Rodin, Gary

    2004-03-01

    It has become commonplace to say that contemporary western society is 'death-denying'. This characterization, which sociologists have termed the 'denial of death thesis', first arose in the social science, psychological and clinical medical literature in the period between 1955 and 1985. During the same time period, the hospice and palliative care movements were developing and in part directed themselves against the perceived cultural denial of death in western society. While the denial of death has been taken for granted by the lay public as well as by clinicians, in the sociological literature it has been increasingly questioned. In this paper we use sociological critiques of the denial of death thesis to raise critical questions about the theory and practice of contemporary palliative care. In particular, we argue that the emphasis of palliative care should not be on extinguishing the denial of death but on the relief of suffering.

  7. Defense and cleaning system for Distributed Denial of Service (DDoS) attacks%大规模拒绝服务(DDoS)攻击的防御与清洗系统

    Institute of Scientific and Technical Information of China (English)

    李振兴; 王萌; 李光程; 陈炫慧; 卢文静

    2016-01-01

    Firstly, the selection, representation, analysis and model solution of DDoS attack feature are established. Then, proceeding from this, the DDoS attack defense method based on the variable threshold constraint of sensitive access parameters is also provided. Finally, the DDoS attack traffic cleaning technique based on the variable probability mark is studied.%首先建立DDoS攻击特征的选择、表示、分析以及模型求解。然后,在此基础上研究基于敏感访问参数可变阈值约束的DDoS攻击防御方法。最后,研究基于可变概率标记的DDoS攻击流量清洗技术。

  8. Towards the Adoption of Open Source and Open Access Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Ilias Maglogiannis

    2012-01-01

    Full Text Available As the Electronic Health Record (EHR systems constantly expand to support more clinical activities and their implementations in healthcare organizations become more widespread, several communities have been working intensively for several years to develop open access and open source EHR software, aiming at reducing the costs of EHR deployment and maintenance. In this paper, we describe and evaluate the most popular open source electronic medical records such as openEMR, openMRS and patientOS, providing their technical features and potentials. These systems are considered quite important due to their prevalence. The article presents the key features of each system and outlines the advantages and problems of Open Source Software (OSS Systems through a review of the literature, in order to demonstrate the possibility of their adoption in modern electronic healthcare systems. Also discussed are the future trends of OS EHRs in the context of the Personal Health Records and mobile computing paradigm.

  9. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  10. Open-Access, Low-Magnetic-Field MRI System for Lung Research

    Science.gov (United States)

    Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William

    2009-01-01

    An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.

  11. The Consent Solution to Punishment and the Explicit Denial Objection

    Directory of Open Access Journals (Sweden)

    Miroslav Imbrisevic

    2010-06-01

    Full Text Available Recently, David Boonin has put forward several objections to Carlos S. Nino's 'Consensual Theory of Punishment'. In this paper I will defend Nino against the 'explicit denial objection'. I will discuss whether Boonin's interpretation of Nino as a tacit consent theorist is right. I will argue that the offender's consent is neither tacit nor express, but a special category of implicit consent. Further, for Nino the legal-normative consequences of an act (of crime are 'irrevocable', i.e. one cannot (expressly and successfully deny liability to them. I will suggest an explanation for Nino's irrevocability claim.

  12. Access to the energy system network simulator (ESNS), via remote computer terminals. [BNL CDC 7600/6600 computer facility

    Energy Technology Data Exchange (ETDEWEB)

    Reisman, A W

    1976-08-15

    The Energy System Network Simulator (ESNS) flow model is installed on the Brookhaven National Laboratory (BNL) CDC 7600/6600 computer facility for access by off-site users. The method of access available to outside users is through a system called CDC-INTERCOM, which allows communication between the BNL machines and remote teletype terminals. This write-up gives a brief description of INTERCOM for users unfamiliar with this system and a step-by-step guide to using INTERCOM in order to access ESNS.

  13. A Frequency—Diversity Spread—Spectrum Multiple Access System with Random Signature Sequences

    Institute of Scientific and Technical Information of China (English)

    CaoYewen; XiangHaige

    1995-01-01

    A new scheme for the spread-spectrum multiple access system named Frequency-Diver-sity Spread-Spectrum Multiple Access(FD-DDMA)system,is proposed.In this FD-SSMA sys-tem,the same information will be modulated on a group of mutually orthogonal frequency compo-nents(carriers)with a random signature sequence at the same time,and it will be demodulated by a coherent receiver for every component and then incorporated (ad if using frequency diversity)on the basis of this random sequence.The spectrum of the modulated signal is very close to that of a white-noise in a wider frequency band due to orthogonality for all frequency components and prop-erty of the random sequence,the system becomes a spread-spectrum one.The (Inverse)Fast Froier Transform(IFFT,FFT)can be applied in the system ,which provides additional flexibility.The performance in an asynchronous mode,such as ability of multiusers,anti-interferences ,is an-alyzed.

  14. An Entropy Architecture for Defending Distributed Denial-of-service Attacks

    Directory of Open Access Journals (Sweden)

    S. K. Srivatsa

    2009-10-01

    Full Text Available The goal of intrusion detection is to identify entities attempting to destabilize the security controls. Network based intrusion detection techniques are used to identify unauthorized, illicit and anomalous behavior based on the network traffic. Identifying the network intruders is the most significant problem for network administrators and network security experts. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. New threats are emerging at an increasing rate. Distributed Denial-of-Service (DDoS attacks have emerged as a popular means of causing mass damage. The impacts of DoS attack will cause greater collateral damage. DoS attacks remain a serious threat to the users, organizations, and infrastructures of the Internet. The approaches used in the existing defense techniques are based on traffic characteristics such as traffic deviation, attack pattern matching etc, which may not yield accurate detection and involves high complexity. In this paper, the router based entropy algorithm has been designed to improve the performance and protection from the distributed denial-of-service attacks. This work includes attack tree construction, attacks detection and clustering of alerts. By calculating the predicted entropy for a router, alerts are raised for flows in which the predicted entropy is more than a threshold value. Then the alerts are grouped into different clusters according to their source, target, time and attack-type. It helps to avoid group redundant alerts and to associate alerts that are of the same nature. By Simulation results, it has been shown that the proposed architecture improves the detection accuracy and throughput while reducing the alert overhead. In this paper, we have explored the current research potential in terms of security, throughput performance of the router and impact of DoS attack technology based on intruder activity and attack tools.

  15. Accessibility patterns and community integration among previously homeless adults: a Geographic Information Systems (GIS) approach.

    Science.gov (United States)

    Chan, Dara V; Gopal, Sucharita; Helfrich, Christine A

    2014-11-01

    Although a desired rehabilitation goal, research continues to document that community integration significantly lags behind housing stability success rates for people of a variety of ages who used to be homeless. While accessibility to resources is an environmental factor that may promote or impede integration activity, there has been little empirical investigation into the impact of proximity of community features on resource use and integration. Using a Geographic Information Systems (GIS) approach, the current study examines how accessibility or proximity to community features in Boston, United States related to the types of locations used and the size of an individual's "activity space," or spatial presence in the community. Significant findings include an inverse relationship between activity space size and proximity to the number and type of community features in one's immediate area. Specifically, larger activity spaces were associated with neighborhoods with less community features, and smaller activity spaces corresponded with greater availability of resources within one's immediate area. Activity space size also varied, however, based on proximity to different types of resources, namely transportation and health care. Greater community function, or the ability to navigate and use community resources, was associated with better accessibility and feeling part of the community. Finally, proximity to a greater number of individual identified preferred community features was associated with better social integration. The current study suggests the ongoing challenges of successful integration may vary not just based on accessibility to, but relative importance of, specific community features and affinity with one's surroundings. Community integration researchers and housing providers may need to attend to the meaning attached to resources, not just presence or use in the community.

  16. National Geothermal Data System (USA): an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. Lee; Richard, Stephen; Blackman, Harold; Anderson, Arlene; Patten, Kim

    2014-05-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in April, 2014 will provide open access to millions of data records, sharing -relevant geoscience and longer term to land use data to propel geothermal development and production. NGDS serves information from all of the U.S. Department of Energy's sponsored development and research projects and geologic data from all 50 states, using free and open source software. This interactive online system is opening new exploration opportunities and potentially shortening project development by making data easily discoverable, accessible, and interoperable. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 6 million records online, including 1.72 million well headers (oil and gas, water, geothermal), 670,000 well logs, and 497,000 borehole temperatures and is growing rapidly. There are over 312 interoperable Web services and another 106 WMS (Web Map Services) registered in the system as of January, 2014. Companion projects run by Southern Methodist University and U.S. Geological Survey (USGS) are adding millions of additional data records. The DOE Geothermal Data Repository, currently hosted on OpenEI, is a system node and clearinghouse for data from hundreds of U.S. DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS complies with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with support from the US

  17. On the Performance of One Stage Massive Random Access Protocols in 5G Systems

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Pratas, Nuno; Jacobsen, Thomas

    2016-01-01

    The next generation of cellular system is expected to experience a proliferation in the number of emerging use cases alongside supporting high speed mobile broadband services. Massive Machine Type Communication (mMTC) catering to a large number of low-data rate, low-cost devices is such an emerging...... use case. Smart utility meters, automated sensors in farms, and vehicle tracking nodes for logistics monitoring are all examples of emerging mMTC devices. Ensuring efficient mechanisms to access the wireless channel for such a massive number of densely deployed devices is a key challenge posed by m...

  18. Sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems

    Science.gov (United States)

    Otsuji, Taiichi; Sugawara, Kenta; Tamamushi, Gen; Dobroiu, Adrian; Suemitsu, Tetsuya; Ryzhii, Victor; Iwatsuki, Katsumi; Kuwano, Shigeru; Kani, Jun-ichi; Terada, Jun

    2016-02-01

    This paper reviews advances in sub-THz photonic frequency conversion using optoelectronic transistors for future fully coherent access network systems. Graphene-channel field effect transistors (G-FETs) and InP-based high electron mobility transistors (inP-HEMT) are experimentally examined as photonic frequency converters. Optoelectronic properties and three-terminal functionalities of the G-FETs and InP-HEMTs are exploited to perform single-chip photonic double-mixing operation over the 120 GHz wireless communication band. A single transistor can photomix the optical subcarriers to generate LO and mix down the RF data on the sub-THz carrier to the IF band.

  19. Improved H_∞ filtering for Markov jumping linear systems with non-accessible mode information

    Institute of Scientific and Technical Information of China (English)

    GUO YaFeng; LI ShaoYuan

    2009-01-01

    This paper is concerned with the H_∞ filtering problems for both continuous-and discrete-time Markov jumping linear systems (MJLS) with non-accessible mode Information.A new design method is proposed,which greatly reduces the overdesign Introduced in the derivation process.The desired filters can be obtained from the solution of convex optimization problems in terms of linear matrix inequalities (LMIs),which can be solved via efficient interior-point algorithms.Numerical examples are provided to Illustrate the advantages of the proposed approach.

  20. Design of Nutrition Catering System for Athletes Based on Access Database

    Directory of Open Access Journals (Sweden)

    Hongjiang Wu,

    2015-08-01

    Full Text Available In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO and Structure Query Language (SQL were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring nutrition of common food and recommended of functional nourishing food could be achieved for different events and different level of athletes.

  1. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  2. Measuring access to primary medical care: some examples of the use of geographical information systems.

    Science.gov (United States)

    Parker, E B; Campbell, J L

    1998-06-01

    This paper explores the potential for geographical information system technology in defining some variables influencing the use of primary care medical services. Eighteen general practices in Scotland contributed to a study examining the accessibility of their services and their patients' use of the local Accident and Emergency Department. Geo-referencing of information was carried out through analysis of postcode data relating to practices and patients. This information was analyzed using ARC/INFO GIS software in conjunction with the ORACLE relational database and 1991 census information. The results demonstrate that GIS technology has an important role in defining and analyzing the use of health services by the population.

  3. Power Stabilization Strategy of Random Access Loads in Electric Vehicles Wireless Charging System at Traffic Lights

    Directory of Open Access Journals (Sweden)

    Linlin Tan

    2016-10-01

    Full Text Available An opportunity wireless charging system for electric vehicles when they stop and wait at traffic lights is proposed in this paper. In order to solve the serious power fluctuation caused by random access loads, this study presents a power stabilization strategy based on counting the number of electric vehicles in a designated area, including counting method, power source voltage adjustment strategy and choice of counting points. Firstly, the circuit model of a wireless power system with multi-loads is built and the equation of each load is obtained. Secondly, after the counting method of electric vehicles is stated, the voltage adjustment strategy, based on the number of electric vehicles when the system is at a steady state, is set out. Then, the counting points are chosen according to power curves when the voltage adjustment strategy is adopted. Finally, an experimental prototype is implemented to verify the power stabilization strategy. The experimental results show that, with the application of this strategy, the charging power is stabilized with the fluctuation of no more than 5% when loads access randomly.

  4. Ultrasonic Multiple-Access Ranging System Using Spread Spectrum and MEMS Technology for Indoor Localization

    Directory of Open Access Journals (Sweden)

    Laurent Segers

    2014-02-01

    Full Text Available Indoor localization of persons and objects poses a great engineering challenge. Previously developed localization systems demonstrate the use of wideband techniques in ultrasound ranging systems. Direct sequence and frequency hopping spread spectrum ultrasound signals have been proven to achieve a high level of accuracy. A novel ranging method using the frequency hopping spread spectrum with finite impulse response filtering will be investigated and compared against the direct sequence spread spectrum. In the first setup, distances are estimated in a single-access environment, while in the second setup, two senders and one receiver are used. During the experiments, the micro-electromechanical systems are used as ultrasonic sensors, while the senders were implemented using field programmable gate arrays. Results show that in a single-access environment, the direct sequence spread spectrum method offers slightly better accuracy and precision performance compared to the frequency hopping spread spectrum. When two senders are used, measurements point out that the frequency hopping spread spectrum is more robust to near-far effects than the direct sequence spread spectrum.

  5. Holocaust Denial is a Form of Hate Speech

    Directory of Open Access Journals (Sweden)

    Raphael Cohen-Almagor

    2009-12-01

    Full Text Available

    In this short piece I wish to take issue with the assertion that Holocaust denial is not hateful per se. My aim is to show that it is, and therefore that Facebook should reconsider its position. All Internet providers and web-hosting companies whose terms of service disallow hateful messages on their servers should not host or provide forums for such hate-mongering. This is of urgent need as Holocaust denial is prevalent in Europe, the United States (USA and across the Arab and Muslim parts of the world. 

  6. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Zummo SalamA

    2008-01-01

    Full Text Available Abstract We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  7. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  8. Low Complexity Receiver Structures for Space-Time Coded Multiple-Access Systems

    Directory of Open Access Journals (Sweden)

    Jayaweera Sudharman K

    2002-01-01

    Full Text Available Multiuser detection for space-time coded synchronous multiple-access systems in the presence of independent Rayleigh fading is considered. Under the assumption of quasi-static fading, it is shown that optimal (full diversity achieving space-time codes designed for single-user channels, can still provide full diversity in the multiuser channel. The joint optimal maximum likelihood multiuser detector, which can be implemented with a Viterbi-type algorithm, is derived for such space-time coded systems. Low complexity, partitioned detector structures that separate the multiuser detection and space-time decoding into two stages are also developed. Both linear and nonlinear multiuser detection schemes are considered for the first stage of these partitioned space-time multiuser receivers. Simulation results show that these latter methods achieve performance competitive with the single-user bound for space-time coded systems.

  9. [Accession to the PIC/S and pharmaceutical quality system in Japan].

    Science.gov (United States)

    Katori, Noriko

    2014-01-01

    In March, 2012, Japan made the application for membership of the Pharmaceutical Inspection convention and Pharmaceutical Inspection Co-operation scheme (PIC/S) which is an international body of a GMP inspection. The globalization of pharmaceutical manufacturing and sales has been a driving force behind the decision to become a PIC/S member. For the application for membership, Japan's GMP inspectorate needs to fulfill PIC/S requirements, for example, the inspection organization has to have a quality system as a global standard. One of the other requirements is that the GMP inspectorate can access Official Medicines Control Laboratories (OMCL) having high analytical skills and also have a quality system based on ISO 17025. I would like to describe the process to make up a quality system in the National Institute of Health Sciences and also the circumstances around the PIC/S application in Japan.

  10. Ocean Surface Topography Mission (OSTM) /Jason-2: Near Real-Time Altimetry Validation System (NRTAVS) QA Reports (NODC Accession 0044984)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This accession contains the descriptions for the OSTM/Jason-2 Near Real-Time Altimetry Validation System Quality Reports, which are served through the NOAA/NESDIS...

  11. NATIONAL GEOTHERMAL DATA SYSTEM: AN EXEMPLAR OF OPEN ACCESS TO DATA

    Energy Technology Data Exchange (ETDEWEB)

    Blackman, Harold [Arizona Geological Survey; Blackman, Harold M. [Arizona Geological Survey; Blackman, Harold M. [Arizona Geological Survey; Blackman, Harold [Boise State University; Blackman, Harold [United States Department of Energy; Blackman, Harold

    2013-10-01

    The formal launch of National Geothermal Data System (NGDS – www.geothermaldata.org) in 2014 will provide open access to technical geothermal-relevant data from all of the Department of Energy- sponsored geothermal development and research projects and geologic data from all 50 states. By making data easily discoverable and accessible this system will open new exploration opportunities and shorten project development. The prototype data system currently includes multiple data nodes, and nationwide data online and available to the public, indexed through a single catalog under construction at http://search.geothermaldata.org. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Additional data record is being added by companion projects run by Boise State University, Southern Methodist University, and the USGS. The National Renewable Energy Laboratory is managing the Geothermal Data Repository, an NGDS node that will be a clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational system sustainable after the original implementation will

  12. National Geothermal Data System: an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.

    2013-12-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational

  13. Interface of the transport systems research vehicle monochrome display system to the digital autonomous terminal access communication data bus

    Science.gov (United States)

    Easley, W. C.; Tanguy, J. S.

    1986-01-01

    An upgrade of the transport systems research vehicle (TSRV) experimental flight system retained the original monochrome display system. The original host computer was replaced with a Norden 11/70, a new digital autonomous terminal access communication (DATAC) data bus was installed for data transfer between display system and host, while a new data interface method was required. The new display data interface uses four split phase bipolar (SPBP) serial busses. The DATAC bus uses a shared interface ram (SIR) for intermediate storage of its data transfer. A display interface unit (DIU) was designed and configured to read from and write to the SIR to properly convert the data from parallel to SPBP serial and vice versa. It is found that separation of data for use by each SPBP bus and synchronization of data tranfer throughout the entire experimental flight system are major problems which require solution in DIU design. The techniques used to accomplish these new data interface requirements are described.

  14. Silence and Denial in Everyday Life-The Case of Animal Suffering.

    Science.gov (United States)

    Wicks, Deidre

    2011-02-21

    How can we make sense of the fact that we live in a world where good people co-exist in silence about widespread animal suffering. How is it that sites of suffering such as laboratories, factory farms, abattoirs and animal transportation are all around us and yet we 'do not, in a certain sense, know about them' [1]. This 'not knowing' is one of the most difficult barriers for animal activists who must constantly develop new strategies in an attempt to catch public attention and translate it into action. Recent contributions from the 'sociology of denial' have elucidated many of the mechanisms involved in 'not knowing' in relation to human atrocities and genocide. In this context, 'denial' refers to the maintenance of social worlds in which an undesirable situation is unrecognized, ignored or made to seem normal [2]. These include different types of denial: personal, official and cultural, as well as the process of normalization whereby suffering becomes invisible through routinization, tolerance, accommodation, collusion and cover up. Denial and normalization reflect both personal and collective states where suffering is not acknowledged [3]. In this paper, I will examine insights from the sociology of denial and apply them to human denial and normalization of animal suffering. This will include an examination of denial which is both individual and social and the implications of these insights for theory and practice in the human/animal relationship.

  15. Making Water Chemistry Data From Volcano-Hydrothermal Systems Accessible Using Open Source Tools

    Science.gov (United States)

    Venezky, D. Y.; Mariner, R. H.; Hurwitz, S.; Evans, W. C.

    2004-12-01

    Chemical and isotopic data collected over several decades by the U.S. Geological Survey from volcano-hydrothermal systems were recently organized into a web-accessible database for public use. The data were collected by members of the Barnes and/or Mariner projects and were supplemented with data from samples submitted for analysis by other researchers with similar interests. The data are primarily chemical and isotopic analyses of waters (thermal, mineral, or fresh) and associated gas (free and/or dissolved) collected from hot springs, mineral springs, cold springs, geothermal wells, fumaroles, and gas seeps. Additional data for a few streams, lakes, and oil wells are included. The web site follows a multi-stage design, first allowing for basic access to the MySQL database, then a user-friendly GIS (Geographic Information System) interface, and finally access to additional documentation and searching features. The initial web pages allow the user to choose the type of data (site, physical parameters, major and minor dissolved constituents, dissolved and free gas composition, water isotopes, and other isotopes) and the sample location. The data are then shown in a table that can be downloaded in several formats. The second stage of the project added an open-source GIS package called WorldKit, which gives easy-to-code and easy-to-use clickable icons on a base map using XML (Extensible Markup Language). WorldKit is also adding a zoom interface (zoomify) that uses new technology to reduce the display time. The final stage of the project involves more complex queries, alternative data presentation, and integrated background information. The more complex queries allow users to select multiple types of data from multiple sites. The data can be found at http://hotspringchem.wr.usgs.gov/.

  16. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  17. Tendons, Concentric Tubes, and a Bevel Tip: Three Steerable Robots in One Transoral Lung Access System.

    Science.gov (United States)

    Swaney, Philip J; Mahoney, Arthur W; Remirez, Andria A; Lamers, Erik; Hartley, Bryan I; Feins, Richard H; Alterovitz, Ron; Webster, Robert J

    2015-05-01

    Lung cancer is the most deadly form of cancer, and survival depends on early-stage diagnosis and treatment. Transoral access is preferable to traditional between-the-ribs needle insertion because it is less invasive and reduces risk of lung collapse. Yet many sites in the peripheral zones of the lung or distant from the bronchi cannot currently be accessed transorally, due to the relatively large diameter and lack of sufficient steerablity of current instrumentation. To remedy this, we propose a new robotic system that uses a tendon-actuated device (bronchoscope) as a first stage for deploying a concentric tube robot, which itself is a vehicle through which a bevel steered needle can be introduced into the soft tissue of the lung outside the bronchi. In this paper we present the various components of the system and the workflow we envision for deploying the robot to a target using image guidance. We describe initial validation experiments in which we puncture ex vivo bronchial wall tissue and also target a nodule in a phantom with an average final tip error of 0.72 mm.

  18. FLOSYS--a web-accessible workflow system for protocol-driven biomolecular sequence analysis.

    Science.gov (United States)

    Badidi, E; Lang, B F; Burger, G

    2004-11-01

    FLOSYS is an interactive web-accessible bioinformatics workflow system designed to assist biologists in multi-step data analyses. FLOSYS allows the user to create complex analysis pathways (protocols) graphically, similar to drawing a flowchart: icons representing particular bioinformatics tools are dragged and dropped onto a canvas and lines connecting those icons are drawn to specify the relationships between the tools. In addition, FLOSYS permits to select input-data, execute the protocol and store the results in a personal workspace. The three-tier architecture of FLOSYS has been implemented in Java and uses a relational database system together with new technologies for distributed and web computing such as CORBA, RMI, JSP and JDBC. The prototype of FLOSYS, which is part of the bioinformatics workbench AnaBench, is accessible on-line at http://malawimonas.bcm.umontreal.ca: 8091/anabench. The entire package is available on request to academic groups who wish to have a customized local analysis environment for research or teaching.

  19. A Survey On Various Defense Mechanisms Against Application Layer Distributed Denial Of Service Attack

    Directory of Open Access Journals (Sweden)

    Ms. Anuja R. Zade

    2011-11-01

    Full Text Available The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, revenue loss, and customer churns etc and is one of the most difficult problems to defend against in the internet. The goal of paper is to understand various techniquesproposed recently to defend against specifically application layer Distributed Denial of Service attack. The next step in the path would be to come up with a better solution to solve this problem. Undoubtedly the following discussed techniques are extremely good. A collaborative approach using few of them can be a better solution.

  20. ANM to Perceive and Thwart Denial of Service Attack in WLAN

    Directory of Open Access Journals (Sweden)

    Durairaj M

    2015-05-01

    Full Text Available Wireless infrastructure network is vulnerable to Denial of Service (DoS attack which makes the resources unavailable for its intended user. As an outcome of DoS attack, authenticated user is denied from accessing the network by spoofing legitimate client identity. Reduced protection in management frame led to MAC spoof DoS attack. Though 802.11w was developed to protect the management frame, the network is vulnerable to different DoS attacks and unable to prevent all types of DoS attacks. This motivated us to propose a mechanism to detect and prevent substantial number of DoS attacks. This paper proposes an algorithm called Alternative Numbering Mechanism (ANM which prevents DoS attacks. The proposed solution is simulated in NS2 for experimentation. Packet delivery ratio, control overhead, normalized routing overhead, delay time, throughput and packet drop were measured for experimentation and to evaluate the performance of ANM. The experimental results of ANM demonstrate that the performance of ANM is encouraging and prevents nearly all types of DoS attacks.

  1. Hospital Outpatient Information System Development based on the Access VBA%基于Access VBA的医院门诊信息系统开发

    Institute of Scientific and Technical Information of China (English)

    刘坤彪; 陈姝

    2013-01-01

    以中小医院管理信息系统开发为研究对象,采用Ac-cess VBA技术框架,遵循结构化的程序设计方法和面向对象的程序设计方法,深入地探讨了中小医院门诊信息系统的设计与实现。从而为中小企业信息系统开发的技术选型和解决方案提供了一种实用、快捷的思路和途径。%According to the characteristics of the small and medium-sized database application system and the actual de-mand, this paper proposes a technical framework suitable for small and medium-sized database application system - Ac-cess VBA. Making small and medium-sized hospital man-agement information system development as the research ob-ject, using the Access VBA technology framework, follow-ing a structured programming method and object-oriented programming method, the paper deeply discusses the small and medium-sized hospital outpatient information system design and implementation process. It provides a practical and fast thinking and approach for small and medium enter-prises to select information systems technology.

  2. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose;

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services....... For demonstration, we transmit a 2.5 Gbit/s signal through the proposed system and successfully achieve a bit-error-rate (BER) performance well below the 7% overhead forward error correction limit of the BER of 2 × 10¿3 for both the wireline and the wireless signals in the 60 GHz band after 25 km single-mode fiber...... for each DWDM user can be simultaneously supported. Besides, each baseband channel can be transparently upconverted tomultiple radio-frequency (RF) bands for different wireless standards, which can be flexibly filtered at the end user to select the on-demand RF band, depending on the wireless applications...

  3. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  4. Towards a Next Generation Universally Accessible ‘Online Shopping-for-Apparel’ System

    DEFF Research Database (Denmark)

    Kristensen, Kasper; Borum, Nanna; Christiansen, Line Gad

    2013-01-01

    This paper reports initial research findings from on-going longitudinal participatory design studies within a national (Danish) funded project to realize a gesture-controlled ‘Online shopping-for-apparel’ system – A Virtual Dressing Room (VDR). A product that reduces customer purchase returns......, reportedly up to 40%, which is a huge burden to the clothing industries as shopping percentile of sales online continues to increase, is targeted. Three studies are reported where results cumulate to highlight the need for continued research to realize a next-generation system to improve the user experience...... of online shopping for apparel where conclusions point to the need for adaptive user interface improvements. Unforeseen was that wheelchair-bound public especially responded positively to the potentials for the concept due to their limited mobility in shopping and this accessibility aspect can...

  5. Widened Participation and Unequal Access to the System of Higher Education in Denmark

    DEFF Research Database (Denmark)

    Munk, Martin D.; Thomsen, Jens Peter

    This paper deals with access to Higher Education (HE), more specifically with social differentiation within Danish university field of studies and institutions. We use Danish register data and investigate choice of field of study and choice of university institution while controlling for a range...... of student background variables. Theoretically we draw on notions of forms of capital and of channelling, diversion and effectively maintained inequality in the educational system. We find that it is important to differentiate not only between fields of studies, but also between university institutions......, in explaining the processes of inequality and differentiation in the Danish University system. Here two dimensions are important: the university institutions degree of social selectivity and whether it is has a ‘classic’ university profile (liberal arts) or a more ‘modern’ applied-oriented profile....

  6. Search Hanford Accessible Reports Electronically system test plan and documentation: Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    White, E.L.

    1994-12-07

    The purpose of this document is to describe the following items: the approach, resources, and sequence of the testing activities; identifies the components and features to be tested; the personnel responsible for testing; the risks associated with this plan; and test cases and procedures. This document contains all test documentation for the SHARE system. The Search Hanford Accessible Reports Electronically (SHARE) testing process is based upon WHC-CM-3-10, Software Practices, Section SP-3.3 REV 0, and Appendix J REV 0. These procedures and guidelines are based on IEEE Standard 829-1983. The planning in this document was further influenced through guidance in IEEE Standard 1012-1986. This document contains the System, Acceptance, Integration and Component Test Plans, Designs, Procedures, and Cases for SHARE. The Test Cases and procedures have been attached to the document.

  7. Results of an Iridium-Based Data Communication System Providing Internet Access to Polar Expeditions

    Science.gov (United States)

    Mohammad, A.; Frost, V.; Braaten, D.

    2003-12-01

    ' W) from June 23-July 17, 2003. We measured the reliability, throughput and general performance of this system over periods of up to 24 hours. This included delay, loss, throughput, call drops/up-time, relative signal strengths, connection time and number of connection retries. The system was also successfully tested while moving across the ice sheet at speeds of up to 30 km/h. We were successful in uploading and downloading large files (.2MB to 7.2MB) to the Internet. In combination with a modified Wi-Fi deployment, wireless Internet access was also provided to the entire NorthGRIP camp for a few days. The field experiments have shown that standard Internet protocols combined with MLPPP and Iridium modems can provide Internet access for polar expeditions at useful data rates. The 4-modem configuration we tested was observed to be >90 % efficient, e.g., a 2.5 MB video file was transferred in 35 min. at 9.524 Kb/s. The system had an average up-time of over 90 % and thus is stable and suitable for autonomous operation. Mobile performance results were very similar to that of stationary systems. While the end-to-end network architecture developed to provide Internet access worked well, the system round trip time is significant ( ˜ 1.8 seconds), which can impair real time interactions.

  8. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  9. A Hybrid System for Acquisition of and Access to the Data from Foundry Technical Standards

    Directory of Open Access Journals (Sweden)

    A. Macioł

    2007-07-01

    Full Text Available The growing importance of automatized systems for interchange of commercial and technical information prompts searching for new forms of knowledge modelling. One of the possible solutions presented in this article is the use of relational databases for acquisition of information comprised in technical standards and of a rule-based reasoning system providing access to these bases. The study describes the structure of a database created under the assumption that concepts describing knowledge will be recorded in data collecting system and not in relational schema. The user is free to define by himself the structure of the knowledge without the need of introducing any changes to the relational schema. At the same time, the reasoning system enables very efficient knowledge searching. At present, tests are carried out on a software operating on a MS SQL Server. The project work and test performance of the system confirm that the adopted assumptions have been right and correct. The development of a new interface is anticipated using internet techniques. As a next step, the information resources collected in the system will be successively expanded using also information sources other than the technical standards.

  10. A web-accessible content-based cervicographic image retrieval system

    Science.gov (United States)

    Xue, Zhiyun; Long, L. Rodney; Antani, Sameer; Jeronimo, Jose; Thoma, George R.

    2008-03-01

    Content-based image retrieval (CBIR) is the process of retrieving images by directly using image visual characteristics. In this paper, we present a prototype system implemented for CBIR for a uterine cervix image (cervigram) database. This cervigram database is a part of data collected in a multi-year longitudinal effort by the National Cancer Institute (NCI), and archived by the National Library of Medicine (NLM), for the study of the origins of, and factors related to, cervical precancer/cancer. Users may access the system with any Web browser. The system is built with a distributed architecture which is modular and expandable; the user interface is decoupled from the core indexing and retrieving algorithms, and uses open communication standards and open source software. The system tries to bridge the gap between a user's semantic understanding and image feature representation, by incorporating the user's knowledge. Given a user-specified query region, the system returns the most similar regions from the database, with respect to attributes of color, texture, and size. Experimental evaluation of the retrieval performance of the system on "groundtruth" test data illustrates its feasibility to serve as a possible research tool to aid the study of the visual characteristics of cervical neoplasia.

  11. Difficulties in accessing and availing of public health care systems among rural population in Chittoor District, Andhra Pradesh

    Directory of Open Access Journals (Sweden)

    Geetha Lakshmi Sreerama

    2015-01-01

    Full Text Available Context: Despite policies to make health care accessible to all, it is not universally accessible. Frequent evaluation of barriers to accessibility of health care services paves path for improvement. Hence, present study is undertaken to evaluate the factors and public health policies influencing health care access to rural people in Chittoor District, Andhra Pradesh, which can be interpolated for other regions. Aims: To assess knowledge, perceptions, availing of public health care services, barriers to health care access in Chittoor District, Andhra Pradesh. Settings and Design: Cross-sectional, hospital-based survey in the Government Maternity Hospital (GMH, Tirupati, a tertiary care center. Materials and Methods: Fifty women delivered normally in GMH through convenient sampling technique. Data collected on standardized pro forma as per IMS Institute of Healthcare Informatics. Statistical Analysis Used: Is done through MS Excel 2007, Epi Info 7 (of Centres for Disease Control and Prevention, Atlanta, USA and frequencies were described. Results: Distance, waiting hours, societal responsibility, nature of the illness, presumed commercialization of Medicare system, attitudes of health care providers, and loss of wages were not barriers for accessing health care. Accredited Social Health Activist (ASHA and availability of ambulance services made great improvements in health care accessibility. Absenteeism of health care providers is a problem. Conclusions: Expanding the ambulance services and ASHA network will be an effective measure for further accessibility to health care. Absenteeism of health care providers needs correction.

  12. Testing a bedside personal computer Clinical Care Classification System for nursing students using Microsoft Access.

    Science.gov (United States)

    Feeg, Veronica D; Saba, Virginia K; Feeg, Alan N

    2008-01-01

    This study tested a personal computer-based version of the Sabacare Clinical Care Classification System on students' performance of charting patient care plans. The application was designed as an inexpensive alternative to teach electronic charting for use on any laptop or personal computer with Windows and Microsoft Access. The data-based system was tested in a randomized trial with the control group using a type-in text-based-only system also mounted on a laptop at the bedside in the laboratory. Student care plans were more complete using the data-based system over the type-in text version. Students were more positive but not necessarily more efficient with the data-based system. The results demonstrate that the application is effective for improving student nursing care charting using the nursing process and capturing patient care information with a language that is standardized and ready for integration with other patient electronic health record data. It can be implemented on a bedside stand in the clinical laboratory or used to aggregate care planning over a student's clinical experience.

  13. AGRICULTURAL COOPERATIVE FIRMS: BUDGETARY ADJUSTMENTS AND ANALYSIS OF CREDIT ACCESS APPLYING SCORING SYSTEMS

    Directory of Open Access Journals (Sweden)

    Giuseppe Bonazzi

    2014-01-01

    Full Text Available Cooperatives are one of the most important types of companies in the agricultural sector. Cooperatives allow overcoming the limitations of the fragmentation of agricultural property, increasing the level of production of small-sized farms and selling the product so that it reaches a sufficient critical mass. Moreover, cooperatives are often characterized by undercapitalization and even difficult credit access because banks conduct their analysis applying rating systems that do not take into account the typicality of the cooperative budget. To assess this topic, in this article, an analysis has been conducted on a sample of 100 cooperatives, making adjustments to the annual budget in order to consider the typicality of their annual accounts. The results of the analysis show that suggested adjustments allow a more correct expression of the economic results and capital adequacy of the cooperative and that the results, expressed in terms of scoring, are higher than that achieved by a traditional analysis. This methodology could improve the credit access capacity for agricultural cooperatives and then reduce financial constraints, particularly in developing countries.

  14. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  15. 78 FR 53189 - Dorel Juvenile Group, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-08-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Dorel Juvenile Group, Denial of Petition for Decision of... petition. SUMMARY: Dorel Juvenile Group, Inc. (DJG) has determined that certain child restraint...

  16. A Mechanism Denial Study on the Madden-Julian Oscillation

    Directory of Open Access Journals (Sweden)

    In-Sik Kang

    2011-12-01

    Full Text Available A series of Madden-Julian oscillation (MJO mechanism-denial experiments is performed using an atmospheric general circulation model (AGCM. Daily climatological seasonal cycles of i surface latent heat flux, ii net radiative heating rate, and iii surface wind stress are obtained from a control simulation and prescribed in place of the normal interactive computations of these fields in order to turn off the i wind-induced surface heat exchange (WISHE, ii cloud-radiation interaction (CRI, and iii frictional wave-CISK (FWC mechanisms, respectively. Dual and triple mechanism denial experiments are also conducted by switching off multiple mechanisms together. The influence of each mechanism is assessed by comparing experiments with that mechanism turned off to those in which it is not. CRI and WISHE are both found to be important to the simulated MJO amplitude and propagation speed, while FWC has weaker and less systematic effects. The MJO is weakened when CRI is turned off, but strengthened when WISHE is turned off, indicating that CRI amplifies the MJO in the control simulation while WISHE weakens it. The negative influence of WISHE is shown to result from simulated phase relationships between surface winds, surface fluxes and convection which differ significantly from those found in observations, and thus is not interpreted as evidence against a positive role for WISHE in the development and maintenance of the observed MJO. The positive influence of CRI in the model is consistent with a strong simulated relationship between daily grid-point column-integrated radiative and convective heating; the mean ratio of the latter to the former exceeds 0.2 for rain rates less than 14 mm d-1. CRI is also shown to suppress an excessive excitation of the convectively coupled Kelvin wave so that the amplitude and frequency of the MJO is maintained.

  17. 10 CFR 62.12 - Contents of a request for emergency access: General information.

    Science.gov (United States)

    2010-01-01

    ... is requested, including— (1) The characteristics and composition of the waste, including, but not... chemical composition; (iii) Physical state (solid, liquid, gas); (iv) Type of solidification media; and (v..., including— (1) The circumstances that led to the denial of access to existing low-level radioactive...

  18. Wòch nan Soley: the denial of the right to water in Haiti.

    Science.gov (United States)

    Varma, Monika Kalra; Satterthwaite, Margaret L; Klasing, Amanda M; Shoranick, Tammy; Jean, Jude; Barry, Donna; Fawzi, Mary C Smith; McKeever, James; Lyon, Evan

    2008-01-01

    This article combines health and water research results, evidence from confidential documents released under the Freedom of Information Act, legal analysis, and discussion of historical context to demonstrate that actions taken by the international community through the Inter-American Development Bank are directly related to a lack of access to clean water in Haiti. The article demonstrates that these actions constitute a clear violation of Haitians' right to water under both domestic and international law. The article exposes the United States governments role in blocking the disbursal of millions of dollars in international bank loans that would have had life-saving consequences for the Haitian people. The loans were derailed in 2001 by politically-motivated interventions on behalf of the US and other members of the international community in direct violation of the Inter-American Development Bank charter. To demonstrate the impact of these interventions, the article presents data gathered in a study that employed human rights and public health methodologies to assess the right to water in Haiti. The data reveal that Haitians experience obstacles concerning every aspect of the right to water: diffculties with water availability, limited physical and economic accessibility, and poor water quality. The article provides a framework of concrete duties and obligations that should be followed by all actors involved in Haiti in order to realize Haitians' human right to water. In response to the undeniable link between the international community's political interference and the intolerably poor state of potable water in Haiti, the article concludes with a recommendation that all actors in Haiti follow a rights-based approach to the development and implementation of water projects in Haiti. The full report of Wòch nan Soley: The Denial of the Right to Water in Haiti is available online at http://www.pih.org/inforesources/Reports/Hait_Report_FINAL.pdf.

  19. Single-port-access surgery with a novel magnet camera system.

    Science.gov (United States)

    Terry, Benjamin S; Mills, Zachary C; Schoen, Jonathan A; Rentschler, Mark E

    2012-04-01

    In this paper, we designed, built, and tested a novel single-port access laparoscopic surgery (SPA) specific camera system. This device (magnet camera) integrates a light source and video camera into a small, inexpensive, portable package that does not compete for space with the surgical tools during SPA. The device is inserted through a 26-mm incision in the umbilicus, followed by the SPA port, which is used to maintain an insufflation seal and support the insertion of additional tools. The camera, now in vivo, remains separate from the SPA port, thereby removing the need for a dedicated laparoscope, and, thus, allowing for an overall reduction in SPA port size or the use of a third tool through the insertion port regularly reserved for the traditional laparoscope. The SPA camera is mounted to the abdominal ceiling using one of the two methods: fixation to the SPA port through the use of a rigid ring and cantilever bar, or by an external magnetic handle. The purpose of the magnet camera system is to improve SPA by: 1) eliminating the laparoscope SPA channel; 2) increasing the field of view through enhanced camera system mobility; and 3) reducing interference between the camera system and the surgical tools at the port, both in vivo and ex vivo.

  20. Interoperable Medical Instrument Networking and Access System with Security Considerations for Critical Care

    Directory of Open Access Journals (Sweden)

    Deniz Gurkan

    2010-01-01

    Full Text Available The recent influx of electronic medical records in the health care field, coupled with the need of providing continuous care to patients in the critical care environment, has driven the need for interoperability of medical devices. Open standards are needed to support flexible processes and interoperability of medical devices, especially in intensive care units. In this paper, we present an interoperable networking and access architecture based on the CAN protocol. Predictability of the delay of medical data reports is a desirable attribute that can be realized using a tightly-coupled system architecture. Our simulations on network architecture demonstrate that a bounded delay for event reports offers predictability. In addition, we address security issues related to the storage of electronic medical records. We present a set of open source tools and tests to identify the security breaches, and appropriate measures that can be implemented to be compliant with the HIPAA rules.

  1. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    Science.gov (United States)

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning.

  2. Joint robustness security in optical OFDM access system with Turbo-coded subcarrier rotation.

    Science.gov (United States)

    Zhang, Lijia; Liu, Bo; Xin, Xiangjun; Wang, Yongjun

    2015-01-12

    This paper proposes a novel robust physical secure method for optical orthogonal frequency division multiplexing (OFDM) access system based on Turbo-coded subcarrier rotation. It can realize a secure communication while keep robustness to channel noise. The subcarrier rotation is controlled by the interleaver module of Turbo coding, which is under the charge of Logistic map. The random puncturing can further enhance the security. The channel feedback can ensure the puncturing module working at a suitable coding rate. A 72.28 Gb/s encrypted 16QAM-OFDM signal is successfully demonstrated in the experiment. The results show robust performance under different channel noise conditions and good resistance to illegal optical network unit (ONU).

  3. Multiagent -Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Li Husheng

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of -learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the -learning are illustrated using a Metrick-Polak plot, which shows the traces of -values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent -learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  4. Posture-Dependent Human 3He Lung Imaging in an Open Access MRI System: Initial Results

    CERN Document Server

    Tsai, L L; Li, C -H; Rosen, M S; Patz, S; Walsworth, R L

    2007-01-01

    The human lung and its functions are extremely sensitive to orientation and posture, and debate continues as to the role of gravity and the surrounding anatomy in determining lung function and heterogeneity of perfusion and ventilation. However, study of these effects is difficult. The conventional high-field magnets used for most hyperpolarized 3He MRI of the human lung, and most other common radiological imaging modalities including PET and CT, restrict subjects to lying horizontally, minimizing most gravitational effects. In this paper, we briefly review the motivation for posture-dependent studies of human lung function, and present initial imaging results of human lungs in the supine and vertical body orientations using inhaled hyperpolarized 3He gas and an open-access MRI instrument. The open geometry of this MRI system features a "walk-in" capability that permits subjects to be imaged in vertical and horizontal positions, and potentially allows for complete rotation of the orientation of the imaging su...

  5. A comparison of the boomerang wire vascular access management system versus manual compression alone during percutaneous diagnostic and interventional cardiovascular procedures.

    Science.gov (United States)

    Echeverria, Angela; Krajcer, Zvonimir

    2016-01-01

    Vascular closure devices allow for early sheath removal, allowing for earlier patient mobilization The Boomerang vascular access management system does not alter arterial integrity for future interventions Access site complications provide significant morbidity in diagnostic and therapeutic interventions.

  6. Implement Instructions Access Files Directly in Operating Systems%在操作系统实现指令对文件的直接寻址

    Institute of Scientific and Technical Information of China (English)

    刘福岩; 尤晋元

    2000-01-01

    In this paper, the concept and implementation of Instructions Directly Access File are discussed,its advantage and profit are analysed. The author belives Instructions Directly Access File should be adopted in operating system.

  7. Establishment of Security Broadband Access System%一个安全宽带接入系统的建立

    Institute of Scientific and Technical Information of China (English)

    李健; 知俊民; 王晓明; 盖磊

    2012-01-01

    针对原有宽带接入方式缺少安全认证和审计、容易遭受网络攻击等不足,提出一个安全宽带接入方案,建立安全宽带接入系统,包括基于双ISP的接入系统、PPPoE+RADIUS认证系统以及基于JSP的宽带查询系统,应用结果证明,该系统能有效提高宽带接入的安全性和可靠性.%The existing inadequacies of CTBT beijing NDC broadband access system is analyzed in this paper, such as no authentication and audit, being susceptible to network attacks and so on. A new security broadband access solution is designed. The security broadband access system is sec up, including dual ISP access. PPPOE+RADIUS access authentication system and query system based on JSP are realized. The system's security, availability, reliability are proved in application.

  8. ABSTRACT MODELS FOR SYSTEM VIRTUALIZATION

    Directory of Open Access Journals (Sweden)

    M. G. Koveshnikov

    2015-05-01

    Full Text Available The paper is dedicated to issues of system objects securing (system files and user system or application configuration files against unauthorized access including denial of service attacks. We have suggested the method and developed abstract system virtualization models, which are used toresearch attack scenarios for different virtualization modes. Estimation for system tools virtualization technology effectiveness is given. Suggested technology is based on redirection of access requests to system objects shared among access subjects. Whole and partial system virtualization modes have been modeled. The difference between them is the following: in the whole virtualization mode all copies of access system objects are created whereon subjects’ requests are redirected including corresponding application objects;in the partial virtualization mode corresponding copies are created only for part of a system, for example, only system objects for applications. Alternative solutions effectiveness is valued relating to different attack scenarios. We consider proprietary and approved technical solution which implements system virtualization method for Microsoft Windows OS family. Administrative simplicity and capabilities of correspondingly designed system objects security tools are illustrated on this example. Practical significance of the suggested security method has been confirmed.

  9. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  10. A web product data management system based on Simple Object Access Protocol

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the serverside technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture,a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.

  11. Electromagnetic Susceptibility of the Area Denial Weapon System (ADWS)

    Science.gov (United States)

    2006-08-01

    igniter is about to initiate. The high cost of such temperature sensors normally precludes taking the igniter all the way to the ignition point and...Engineering Study”, DSTO Industrial Report, in preparation. [7] S. Baffreau, S. Bendhia, M. Ramdani, E. Sicard , “Characterisation of Microcontroller

  12. Implementation the NASA Planetary Data System PDS4 Providing Access to LADEE Data

    Science.gov (United States)

    Beebe, Reta F.; Huber , Lyle; Neakrase, Lynn; Reese, Shannon; Crichton, Daniel; Hardman, Sean; Delory, Gregory; Neese, Carol

    2014-11-01

    The NASA Planetary Data System (PDS) is responsible for archiving all planetary data acquired by robotic missions, and observational campaigns with ground/space-based observatories. PDS has moved to version 4 of its archive system. PDS4 uses XML to enhance search and retrieval capabilities. Although the efforts are system wide, the Atmospheres Node has acted as the lead node and is presenting a preliminary users interface for retrieval of LADEE data. LADEE provides the first opportunity to test out the end-to-end process of archiving data from an active mission into the new PDS4 architecture. The limited number of instruments, with simple data structures, is an ideal test of PDS4. XML uses schema (analogous to blueprints) to control the structure of the corresponding XML labels. In the case of PDS4, these schemas allow management of the labels and their content by forcing validation dictated by the underlying Information Model (IM). The use of a central IM is a vast improvement over PDS3 because of the uniformity it provides across all nodes. PDS4 has implemented a product-centric approach for archiving data and supplemental documentation. Another major change involves the Central Registry, where all products are registered and accessible to search engines. Under PDS4, documents, data, and other ancillary data are all products that are registered in the system. Together with the XML implementation, the Registry allows the search routines to be more complex and inclusive than they have been in the past. For LADEE, the PDS nodes and LADEE instrument teams worked together to identify data products that LADEE would produce. Documentation describing instruments and data products were produced by the teams and peer reviewed by PDS. XML label templates were developed by the PDS and provided to the instrument teams to integrate into their pipelines. Data from the primary mission (100 days) have been certified and harvested into the registry and are accessible through the

  13. National Geothermal Data System: Transforming the Discovery, Access, and Analytics of Data for Geothermal Exploration

    Energy Technology Data Exchange (ETDEWEB)

    Patten, Kim [Arizona Geological Survey

    2013-05-01

    Compendium of Papers from the 38th Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California February 11-13, 2013 The National Geothermal Data System (NGDS) is a distributed, interoperable network of data collected from state geological surveys across all fifty states and the nation’s leading academic geothermal centers. The system serves as a platform for sharing consistent, reliable, geothermal-relevant technical data with users of all types, while supplying tools relevant for their work. As aggregated data supports new scientific findings, this content-rich linked data ultimately broadens the pool of knowledge available to promote discovery and development of commercial-scale geothermal energy production. Most of the up-front risks associated with geothermal development stem from exploration and characterization of subsurface resources. Wider access to distributed data will, therefore, result in lower costs for geothermal development. NGDS is on track to become fully operational by 2014 and will provide a platform for custom applications for accessing geothermal relevant data in the U.S. and abroad. It is being built on the U.S. Geoscience Information Network (USGIN) data integration framework to promote interoperability across the Earth sciences community. The basic structure of the NGDS employs state-of-the art informatics to advance geothermal knowledge. The following four papers comprising this Open-File Report are a compendium of presentations, from the 38th Annual Workshop on Geothermal Reservoir Engineering, taking place February 11-13, 2013 at Stanford University, Stanford, California. “NGDS Geothermal Data Domain: Assessment of Geothermal Community Data Needs,” outlines the efforts of a set of nationwide data providers to supply data for the NGDS. In particular, data acquisition, delivery, and methodology are discussed. The paper addresses the various types of data and metadata required and why simple links to existing

  14. Detection of Denial of Service Attack in Wireless Network using Dominance based Rough Set

    Directory of Open Access Journals (Sweden)

    N. Syed Siraj Ahmed

    2015-12-01

    Full Text Available Denial-of-service (DoS attack is aim to block the services of victim system either temporarily or permanently by sending huge amount of garbage traffic data in various types of protocols such as transmission control protocol, user datagram protocol, internet connecting message protocol, and hypertext transfer protocol using single or multiple attacker nodes. Maintenance of uninterrupted service system is technically difficult as well as economically costly. With the invention of new vulnerabilities to system new techniques for determining these vulnerabilities have been implemented. In general, probabilistic packet marking (PPM and deterministic packet marking (DPM is used to identify DoS attacks. Later, intelligent decision proto-type was proposed. The main advantage is that it can be used with both PPM and DPM. But it is observed that, data available in the wireless network information system contains uncertainties. Therefore, an effort has been made to detect DoS attack using dominance based rough set. The accuracy of the proposed model obtained over the KDD cup dataset is 99.76 and it is higher than the accuracy achieved by resilient back propagation (RBP model.

  15. [Sometimes We Should Maintain a Mental Distance from a Patient--Relevance to Caring for Cancer Patients in Denial].

    Science.gov (United States)

    Akechi, Tatsuo

    2015-01-01

    In Japan, cancer has been the leading cause of death since 1981 and is the most common and representative life-threatening disease. Cancer treatment has markedly progressed, and so the development of cancer is now not necessarily a death sentence. Nevertheless, approximately half of cancer patients actually die as a result of the disease even today. Cancer causes marked suffering of patients. Patients with advanced and/or terminal cancer suffer from various physical symptoms and are forced to face a continuous decline in their physical function, and previous studies reported that psychological distress is frequently observed in cancer patients, especially in advanced and/or terminally ill patients. Several types of psychological defense mechanism, especially denial, are frequently observed in these patients. There are multiple levels of denial For example, a patient with true denial denies the presence of cancer itself, although true denial is quite rare. A patient with moderate denial is likely to deny an association between distressing symptoms and disease, while one with mild denial denies the life-threatening nature of disease. Denial is a psychological defense mechanism that often helps advanced cancer patients to manage their anxiety and depression. It allows such patients to continue living while facing the painfulness of their situation. In this situation, it is important for therapists to note the patient's denial. Simply being aware of the denial can, in itself, be supportive for the patient. However, when denial does not work adaptively, such as it prohibiting adherence to necessary treatment and not being useful for ameliorating psychological distress and improving the quality of life, medical staff may consider confronting a patient with the reality of the situation carefully. This paper discusses the relevance of acknowledging denial and caring for patients with denial from the point of view of psycho-oncology.

  16. An extended smart utilization medium access control (ESU-MAC) protocol for ad hoc wireless systems

    Science.gov (United States)

    Vashishtha, Jyoti; Sinha, Aakash

    2006-05-01

    The demand for spontaneous setup of a wireless communication system has increased in recent years for areas like battlefield, disaster relief operations etc., where a pre-deployment of network infrastructure is difficult or unavailable. A mobile ad-hoc network (MANET) is a promising solution, but poses a lot of challenges for all the design layers, specifically medium access control (MAC) layer. Recent existing works have used the concepts of multi-channel and power control in designing MAC layer protocols. SU-MAC developed by the same authors, efficiently uses the 'available' data and control bandwidth to send control information and results in increased throughput via decreasing contention on the control channel. However, SU-MAC protocol was limited for static ad-hoc network and also faced the busy-receiver node problem. We present the Extended SU-MAC (ESU-MAC) protocol which works mobile nodes. Also, we significantly improve the scheme of control information exchange in ESU-MAC to overcome the busy-receiver node problem and thus, further avoid the blockage of control channel for longer periods of time. A power control scheme is used as before to reduce interference and to effectively re-use the available bandwidth. Simulation results show that ESU-MAC protocol is promising for mobile, ad-hoc network in terms of reduced contention at the control channel and improved throughput because of channel re-use. Results show a considerable increase in throughput compared to SU-MAC which could be attributed to increased accessibility of control channel and improved utilization of data channels due to superior control information exchange scheme.

  17. The Earth System Grid Federation: An Open Infrastructure for Access to Distributed Geo-Spatial Data

    Energy Technology Data Exchange (ETDEWEB)

    Cinquini, Luca [Jet Propulsion Laboratory, Pasadena, CA; Crichton, Daniel [Jet Propulsion Laboratory, Pasadena, CA; Miller, Neill [Argonne National Laboratory (ANL); Mattmann, Chris [Jet Propulsion Laboratory, Pasadena, CA; Harney, John F [ORNL; Shipman, Galen M [ORNL; Wang, Feiyi [ORNL; Bell, Gavin [Lawrence Livermore National Laboratory (LLNL); Drach, Bob [Lawrence Livermore National Laboratory (LLNL); Ananthakrishnan, Rachana [Argonne National Laboratory (ANL); Pascoe, Stephen [STFC Rutherford Appleton Laboratory, NCAS/BADC; Kershaw, Philip [STFC Rutherford Appleton Laboratory, NCAS/BADC; Gonzalez, Estanislao [German Climate Computing Center; Fiore, Sandro [Euro-Mediterranean Center on Climate Change; Schweitzer, Roland [Pacific Marine Environmental Laboratory, National Oceanic and Atmospheric Administration; Danvil, Sebastian [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement; Morgan, Mark [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF s architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  18. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems.

    Science.gov (United States)

    Shehzad, Danish; Bozkuş, Zeki

    2016-01-01

    Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.

  19. A multi-agent conversational system with heterogeneous data sources access

    KAUST Repository

    Eisman, Eduardo M.

    2016-01-28

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  20. The Earth System Grid Federation : an Open Infrastructure for Access to Distributed Geospatial Data

    Science.gov (United States)

    Cinquini, Luca; Crichton, Daniel; Mattmann, Chris; Harney, John; Shipman, Galen; Wang, Feiyi; Ananthakrishnan, Rachana; Miller, Neill; Denvil, Sebastian; Morgan, Mark; Pobre, Zed; Bell, Gavin M.; Drach, Bob; Williams, Dean; Kershaw, Philip; Pascoe, Stephen; Gonzalez, Estanislao; Fiore, Sandro; Schweitzer, Roland

    2012-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  1. The Earth System Grid Federation: An Open Infrastructure for Access to Distributed Geospatial Data

    Energy Technology Data Exchange (ETDEWEB)

    Ananthakrishnan, Rachana [Argonne National Laboratory (ANL); Bell, Gavin [Lawrence Livermore National Laboratory (LLNL); Cinquini, Luca [Jet Propulsion Laboratory, Pasadena, CA; Crichton, Daniel [Jet Propulsion Laboratory, Pasadena, CA; Danvil, Sebastian [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement; Drach, Bob [Lawrence Livermore National Laboratory (LLNL); Fiore, Sandro [Euro-Mediterranean Center on Climate Change; Gonzalez, Estanislao [German Climate Computing Center; Harney, John F [ORNL; Mattmann, Chris [Jet Propulsion Laboratory, Pasadena, CA; Kershaw, Philip [STFC Rutherford Appleton Laboratory, NCAS/BADC; Miller, Neill [Argonne National Laboratory (ANL); Morgan, Mark [Institut Pierre Simon Laplace (IPSL), Des Sciences de L' Environnement; Pascoe, Stephen [STFC Rutherford Appleton Laboratory, NCAS/BADC; Schweitzer, Roland [Pacific Marine Environmental Laboratory, National Oceanic and Atmospheric Administration; Shipman, Galen M [ORNL; Wang, Feiyi [ORNL

    2013-01-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF s architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and application programming interfaces (APIs). The cornerstones of its interoperability are the peer-to-peer messaging that is continuously exchanged among all nodes in the federation; a shared architecture and API for search and discovery; and a security infrastructure based on industry standards (OpenID, SSL, GSI and SAML). The ESGF software is developed collaboratively across institutional boundaries and made available to the community as open source. It has now been adopted by multiple Earth science projects and allows access to petabytes of geophysical data, including the entire model output used for the next international assessment report on climate change (IPCC-AR5) and a suite of satellite observations (obs4MIPs) and reanalysis data sets (ANA4MIPs).

  2. Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems

    Directory of Open Access Journals (Sweden)

    Danish Shehzad

    2016-01-01

    Full Text Available Increase in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks, interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI is used. MPI_Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI_Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI_Allgather method using Remote Memory Access (RMA by moving two-sided communication to one-sided communication, and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.

  3. Capacitive ECG system with direct access to standard leads and body surface potential mapping.

    Science.gov (United States)

    Oehler, Martin; Schilling, Meinhard; Esperer, Hans Dieter

    2009-12-01

    Capacitive electrodes provide the same access to the human electrocardiogram (ECG) as galvanic electrodes, but without the need of direct electrical skin contact and even through layers of clothing. Thus, potential artifacts as a result of poor electrode contact to the skin are avoided and preparation time is significantly reduced. Our system integrates such capacitive electrodes in a 15 sensor array, which is combined with a Tablet PC. This integrated lightweight ECG system (cECG) is easy to place on the chest wall and allows for simultaneous recordings of 14 ECG channels, even if the patient is slightly dressed, e.g., with a t-shirt. In this paper, we present preliminary results on the performance of the cECG regarding the capability of recording body surface potential maps (BSPMs) and obtaining reconstructed standard ECG leads including Einthoven, Goldberger and, with some limitations, Wilson leads. All signals were measured having the subject lie in a supine position and wear a cotton shirt. Signal quality and diagnostic ECG information of the extracted leads are compared with standard ECG measurements. The results show a very close correlation between both types of ECG measurements. It is concluded that the cECG lends itself to rapid screening in clinically unstable patients.

  4. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  5. Interfaces to PeptideAtlas: a case study of standard data access systems.

    Science.gov (United States)

    Killcoyne, Sarah; Handcock, Jeremy; Robinson, Thomas; Deutsch, Eric W; Boyle, John

    2012-09-01

    Access to public data sets is important to the scientific community as a resource to develop new experiments or validate new data. Projects such as the PeptideAtlas, Ensembl and The Cancer Genome Atlas (TCGA) offer both access to public data and a repository to share their own data. Access to these data sets is often provided through a web page form and a web service API. Access technologies based on web protocols (e.g. http) have been in use for over a decade and are widely adopted across the industry for a variety of functions (e.g. search, commercial transactions, and social media). Each architecture adapts these technologies to provide users with tools to access and share data. Both commonly used web service technologies (e.g. REST and SOAP), and custom-built solutions over HTTP are utilized in providing access to research data. Providing multiple access points ensures that the community can access the data in the simplest and most effective manner for their particular needs. This article examines three common access mechanisms for web accessible data: BioMart, caBIG, and Google Data Sources. These are illustrated by implementing each over the PeptideAtlas repository and reviewed for their suitability based on specific usages common to research. BioMart, Google Data Sources, and caBIG are each suitable for certain uses. The tradeoffs made in the development of the technology are dependent on the uses each was designed for (e.g. security versus speed). This means that an understanding of specific requirements and tradeoffs is necessary before selecting the access technology.

  6. Ten Years of China's Accession to the WTO and Changes of Global Multilateral Trading System%Ten Years of China's Accession to the WTO and Changes of Global Multilateral Trading System

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    China's accession to the World Trade Organization has been for ten years. This paper reviews the reform and development after China's accession to the World Trade Organization. In the past ten years, China has contributed to global multilateral trade system in many ways, such as promoting the development of international trade, opposing trade protectionism, faithfully carrying out multilateral trade rules, coordinating multilateral trade negotiations, actively participating in multilateral trading system construction as well as effectively safeguarding the interests of developing countries. For ten years, multilateral trading system has changed mainly in force structure, topic structure and external transparency. Looking into the future, multilateral trade system reform should focus on system construction and opposition to trade protectionism. Finally, based on practice experience in WTO these years, this paper reaches several enlightenments of China's participating in global economic management.

  7. EMODnet Physics: One-stop Portal to access Multiplatform Observing Systems

    Science.gov (United States)

    Novellino, Antonio; Benedetti, Giacomo; D'Angelo, Paolo; Gorringe, Patrick; Thjisse, Peter; Schaap, Dick; Pouliquen, Sylvie; Manzella, Giuseppe

    2016-04-01

    The EMODnet Physics is being developed through a stepwise approach in three major stages and is currently in its second phase of development (2013 - 2016). It is a one-stop portal to access to near real time and historical achieved data sets. It provides a combined array of services and functionalities (such as dynamic map facility for viewing and downloading, dashboard reporting and machine-to-machine communication services) to users for obtaining free of charge data, meta-data and data products on the physical conditions of European sea basins and oceans. Moreover, the system provides full interoperability with third-party software through WMS service, Web Service and Web catalogues in order to exchange data and products according to the most recent standards. In particular, interoperability is assured with the IODE Ocean Data Portal with which EMODnet Physics is collaborating. EMODnet Physics is built on and it is working in coordination and cooperation EuroGOOS-ROOSs, CMEMS and the SeaDataNet network of NODCs. By means of joint activities with its three pillars and with the most relevant Organizations and associations within the sector, EMODnet is undergoing significant improvements and expansion. In the last year, EMODnet Physics has steadily enhanced the number and type of platforms covered providing high quality data integrating sources from a growing network. In particular, a major step forward sees the integration of emerging measuring systems such as HF radars, which are able to provide the resolution of surface current speeds and directions covering large regions of the coastal oceans, and that now do populate the EMODnet Platform. Nowadays the system does integrate information by more than 7.300 stations, among which 2915 moorings, 2728 drifting buoys and around 1200 ARGO floats. EMODnet Physics was also updated with two ready-to-use data products: the Ice (Copernicus CMEMS - SEAICE_GLO_SEAICE_L4_NRT_OBSERVATIONS_011_001) and Sea Level Trends (produced

  8. Access to planetary science for the broad public: a more familiar planetary nomenclature and terminology system

    Science.gov (United States)

    Hargitai, H.

    The Planetary Sciences in the last decades has accumulated an amount of knowledge that is comparable to other Earth Sciences. The study of planets is not any more a computation of orbital data, but the investigation and description of surface features of dozens of planetary bodies, including our own Earth. This way, it is only an extention of the present Earth sciences like geography, geology, geophisics, meteorolgy etc. In Hungary, Planetary Science studies has been made for decades, but especially today, numerous popular scientific works are published, and the subject of planetology (and also exobiology linked to it) is taught in more and more secondary schools and universities. This ma kes a demand for a Hungarian language terminology and nomenclature in the relatively new discipline of Planetology. It is needed because the present terminology of geosciences is not adequeate for the description of the surface conditions and structures in other planetary bodies. In the mean time it has to be in accord with the Earth-based system. Since this is areal discipline in its subject, it is of high importance that the areas studied be identifiable easily, unambiguously and descriptively. This make s the translation/transcription of IAU's nomenclature our second goal. This is not a simple transliteration of the proper names used in planetary body nomenclatures, but the task is also the setting of the basic rules used in the making of Hungarian nomenclature system. It would be useful, if the system would be useable for any body of the solar system. It has to fit into the system of both the IAU's nomenlcature and the Hungarian geographic name system [1]. This makes a double task: to make a system that is appropriate both linguistically and scientifically. At the same time, in popular science and elementary education, the planetary features' common names and some basic terms should be in the mother languages of the readers, and not in latin or English (outside the anglophone

  9. The Future of Armor in an Anti-Access Area Denial Environment

    Science.gov (United States)

    2014-06-13

    definitions of what a theory is, this thesis will 82John W. Creswell , Qualitative Inquiry and Research Design: Choosing Among Five Approaches (Thousand......H., with George Sullivan, and William D. Sullivan. Lessons of the 2006 Israeli-Hezbollah War. Washington, DC: The CSIS Press, 2007. Creswell , John W

  10. Integrating the Land and Air Components in an Anti-Access/Area Denial Environment

    Science.gov (United States)

    2013-06-01

    August 1990, Iraq invaded the sovereign nation of Kuwait . In response, the United States mobilized and deployed between 575,000 and 700,000 personnel to...Regan Books, 2004. Grau, Lester W. and Dodge Billingsley. Operation ANACONDA: America’s First Major Battle in Afghanistan. Lawrence, KA : University

  11. Command and Control in the Anti-Access/Area Denial Environment

    Science.gov (United States)

    2014-02-13

    Control Squadron, and most recently was the Inspector General for the 461st Air Control Wing at Robins AFB, Georgia. Other aircraft he has flown include...directed telescopes ” to ensure forward commanders are not fighting “with a telegraph machine tied to their back.”49 Theater commanders would take as much

  12. Improving Standoff Bombing Capacity in the Face of Anti-Access Area Denial Threats

    Science.gov (United States)

    2015-02-01

    Kennedy, Michael, Laura H. Baldwin , Michael Boito, Katherine M. Calef, James Chow, Joan Cornuet, Mel Eisman, Chris Fitzmartin, J. R. Gebman, Elham...the Pardee RAND Graduate School. The faculty committee that supervised and approved the dissertation consisted of James S. Chow (Chair), Fred Timson...Grand Strategy," Foreign Affairs, Vol. 94, no. 3, 2015. 15 James Dobbins et al., Conflict with China: Prospects, Consequences, and Strategies for

  13. 49 CFR 1560.105 - Denial of transport or sterile area access; designation for enhanced screening.

    Science.gov (United States)

    2010-10-01

    ... status, the aircraft operator must request from the individual a verifying identity document pursuant to... B. The individual must present a verifying identity document to the covered aircraft operator at the... identity document, the covered aircraft operator must transmit the SFPD elements from the...

  14. The Army’s Role in Overcoming Anti-Access and Area Denial Challenges

    Science.gov (United States)

    2013-01-01

    numbers. Additionally, for nations that possess these kinds of advanced capa - bilities, the norm is for the larger portion of the missile inventory to...might be the most appealing option to an opponent. Additionally, an initial high- altitude burst could serve as a stern warning that further nuclear...force ratio and capa - bility disparity are combined with current and continued threat advancement, the challenge to the joint forces can be substantial

  15. Examining How Web Designers' Activity Systems Address Accessibility: Activity Theory as a Guide

    Science.gov (United States)

    Russell, Kyle

    2014-01-01

    While accessibility of information technologies is often acknowledged as important, it is frequently not well addressed in practice. The purpose of this study was to examine the work of web developers and content managers to explore why and how accessibility is or is not addressed as an objective as websites are planned, built and maintained.…

  16. 76 FR 32258 - Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI)

    Science.gov (United States)

    2011-06-03

    ... is forestalling complaints about lack of access to Government-provided information and about... the Direct and Indirect Subscribers, the public currently does not have access to concrete information... Government Act, complies with Executive Branch policies and directives, makes Federal Government...

  17. Big Brother Is Helping You: Supporting Self-Access Language Learning with a Student Monitoring System

    Science.gov (United States)

    Reinders, Hayo

    2007-01-01

    Self-access and language advising are relatively recent and increasingly common types of language support offered in schools and tertiary institutions around the world. There is a great deal of anecdotal support for the positive contribution of such support to student learning. Self-access and language advising hold strong potential as…

  18. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José;

    2014-01-01

    We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...... compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally...

  19. Low-Cost Encoding Device for Optical Code Division Multiple Access System

    Directory of Open Access Journals (Sweden)

    Mohammad S. Ab-Rahman

    2009-01-01

    Full Text Available Problem statement: Instead of using Fiber Bragg Grating (FBG to develop the coded spectrums, which consist of expensive elements, the grating also are highly sensitive to environmental changes and this will contribute to the increment of capital and operational expenditures (CAPEX and OPEX. Approach: This study presented the development of low-cost 16-ports encoding device for Optical Code Division Multiple Access (OCDMA systems based on Arrayed Waveguide Grating (AWG devices and optical switches. The encoding device is one of the new technologies that used to transmit the coded data in the optical communication system by using AWG and optical switches. It provided a high security for data transmission due to all data will be transmitted in binary code form. The output signals from AWG were coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmitted to the receiver. The 16-ports encoding device used 16 Double Pole Double Throw (DPDT toggle switches to control the polarization of voltage source from +5 V to -5 V for 16 optical switches. When +5 V was given, the optical switch will give code '1' and vice versa. Results: We found that the insertion loss, crosstalk, uniformity and Optical Signal-Noise-Ratio (OSNR for the developed prototype are Conclusion: We had successful developed the AWG-based OCDMA encoding device prototype and characterized using linearity testing and continuous signal testing. The developed prototype was expected to be applied in the optical communication system on Passive Optical Networks (PONs.

  20. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  1. FUZZY MODELLING OF A NETWORK DENIAL OF SERVICE (DOS ATTACK PHENOMENON.

    Directory of Open Access Journals (Sweden)

    IHEKWEABA. OGECHI

    2013-04-01

    Full Text Available This paper presents the fuzzy modeling of a network Denial of Service (DoS attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic approach as well as an improved mechanism for generating the fuzzy inference rules were outlined. Further, the paper discusses the basic concept of fuzzy logic, fuzzy systems and reasons for their adoption in modern control operations. DoS attack detection, using some basic traffic characteristics: bitrates, entropy and Hurst experiment as it’s inputs, was x-rayed. Here, an attack trace file collected atthe edge router of the Computer Science Department, University of California Los Angeles was used to develop the fuzzy inference model.The data set was partitioned into a training dataset and a testing dataset. The fuzzy concept learning system (FCLS algorithm was used for constructing the fuzzy decision tree, using the trace files.Inference rules were then generated from the constructed decision tree. The simulation and evaluation of the fuzzy model was performed with the testing dataset.

  2. TGCat, The Chandra Transmission Grating Catalog and Archive: Systems, Design and Accessibility

    CERN Document Server

    Mitschang, Arik W; Nichols, Joy S

    2010-01-01

    The recently released Chandra Transmission Grating Catalog and Archive, TGCat, presents a fully dynamic on-line catalog allowing users to browse and categorize Chandra gratings observations quickly and easily, generate custom plots of resulting response corrected spectra on-line without the need for special software and to download analysis ready products from multiple observations in one convenient operation. TGCat has been registered as a VO resource with the NVO providing direct access to the catalogs interface. The catalog is supported by a back-end designed to automatically fetch newly public data, process, archive and catalog them, At the same time utilizing an advanced queue system integrated into the archive's MySQL database allowing large processing projects to take advantage of an unlimited number of CPUs across a network for rapid completion. A unique feature of the catalog is that all of the high level functions used to retrieve inputs from the Chandra archive and to generate the final data produc...

  3. Trauma in elderly people: access to the health system through pre-hospital care

    Directory of Open Access Journals (Sweden)

    Hilderjane Carla da Silva

    2016-01-01

    Full Text Available Objective: to identify the prevalence of trauma in elderly people and how they accessed the health system through pre-hospital care. Method: documentary and retrospective study at a mobile emergency care service, using a sample of 400 elderly trauma victims selected through systematic random sampling. A form validated by experts was used to collect the data. Descriptive statistical analysis was applied. The chi-square test was used to analyze the association between the variables. Results: Trauma was predominant among women (52.25% and in the age range between 60 and 69 years (38.25%, average age 74.19 years (standard deviation±10.25. Among the mechanisms, falls (56.75% and traffic accidents (31.25% stood out, showing a significant relation with the pre-hospital care services (p<0.001. Circulation, airway opening, cervical control and immobilization actions were the most frequent and Basic Life Support Services (87.8% were the most used, with trauma referral hospitals as the main destination (56.7%. Conclusion: trauma prevailed among women, victims of falls, who received pre-hospital care through basic life support services and actions and were transported to the trauma referral hospital. It is important to reorganize pre-hospital care, avoiding overcrowded hospitals and delivering better care to elderly trauma victims.

  4. An evaluation of the Cortrak Enteral access system in our intensive care.

    LENUS (Irish Health Repository)

    Dolan, A M

    2012-05-01

    Appropriate nutrition is considered a cornerstone of Intensive care; however its successful initiation is frequently impeded by decreased gastric emptying secondary to opiates, sepsis, or ileus. The presence of a postpyloric tube will guarantee delivery of calories while reducing the incidence of reflux and aspiration. Enteral nutrition is approximately 100 fold cheaper than parenteral nutrition. A nasojejunal tube may be placed blindly (success 15%), by direct vision with a gastroscope, or under fluoroscopic guidance in the X-ray department. This study examines the use of the Cortrak Enteral access system (CEAS) in placement of nasojejunal tubes, a method facilitated by the use of an electromagnet. A retrospective review was conducted to evaluate the effectiveness of the CEAS for establishing nasojejunal feeding in the Intensive Care Unit (ICU) between January and December 2010. Our results found that the CEAS was successful in positioning a nasojejunal tube in ten out of twelve patients (83% success rate). Successful placement was confirmed by portable abdominal \\/ chest x-ray. Placement took an average of 30 minutes, and prokinetic agents were used to facilitate two placements. The duration of successful enteral nutrition varied from 2 to 15 days post placement. The CEAS is a simple bedside tool for placing postpyloric tubes. While there is a learning curve associated with its use, it may confer significant benefits to individual patients and also to those responsible for ever shrinking budgets.

  5. Asymmetric hollow POF coupler design for portable optical access card system

    Science.gov (United States)

    Ehsan, Abang Annuar; Shaari, Sahbudin; Abd Rahman, Mohd Kamil

    2009-05-01

    An optical code generating device using plastic optical fiber (POF) coupler for portable optical access card system is presented. The code generating device constructed using asymmetric hollow POF coupler design provides a unique series of output light intensities which are successively used as an optical code. Each coupler will be assigned with a unique optical code based on the asymmetrical waveguide design. Non-sequential ray tracing simulation of various coupler designs showed a linear relationship between the tap-off ratio (TOFR) and the waveguide tap width. The results for the simulated and fabricated 1x2 asymmetric couplers show the same linear characteristics between the TOFR and the tap width. The simulated devices show a TOFR variation from 18.6% to 49.9% whereas the TOFR for the fabricated metal-based devices varies from 10.7% up to 47.7%, for a tap width of 500 μm to 1 mm. The insertion loss for the 1x2 asymmetric coupler at the tap line varies from 12.7 dB to 21.2 dB whereas for the bus line, the average insertion loss is about 12 dB.

  6. Robotics and telecommunication systems to provide better access to ultrasound expertise in the OR.

    Science.gov (United States)

    Angelini, L; Papaspyropoulos, V

    2000-01-01

    Surgery has begun to evolve as a result of the intense use of technological innovations. The result of this is better services for patients and enormous opportunities for the producers of biomedical instruments. The surgeon and the technologist are fast becoming allies in applying the latest developments of robotics, image treatment, simulation, sensors and telecommunications to surgery, in particular to the emerging field of minimally-invasive surgery. Ultrasonography is at present utilised both for diagnostic and therapeutic purposes in various fields. Intraoperative US examination can be of primary importance, especially when dealing with space-occupying lesions. The widening use of minimally-invasive surgery has furthered the development of US for use during this type of surgery. The success of a US examination requires not only a correct execution of the procedure, but also a correct interpretation of the images. We describe two projects that combine robotics and telecommunication systems to provide better access to US expertise in the operating room. The Midstep project has as its object the realisation of two robotic arms, one for the distant control of the US probe during laparoscopic surgery and the second to perform tele-interventional US. The second project, part of the Strategic CNR Project-'Robotics in Surgery', involves the realisation of a common platform for tracking and targeting surgical instruments in video-assisted surgery.

  7. Addressing health system barriers to access to and use of skilled delivery services: perspectives from Ghana.

    Science.gov (United States)

    Ganle, John Kuumuori; Fitzpatrick, Raymond; Otupiri, Easmon; Parker, Michael

    2016-10-01

    Poor access to and use of skilled delivery services have been identified as a major contributory factor to poor maternal and newborn health in sub-Saharan African countries, including Ghana. However, many previous studies that examine norms of childbirth and care-seeking behaviours have focused on identifying the norms of non-use of services, rather than factors, that can promote service use. Based on primary qualitative research with a total of 185 expectant and lactating mothers, and 20 healthcare providers in six communities in Ghana, this paper reports on strategies that can be used to overcome health system barriers to the use of skilled delivery services. The strategies identified include expansion and redistribution of existing maternal health resources and infrastructure, training of more skilled maternity caregivers, instituting special programmes to target women most in need, improving the quality of maternity care services provided, improving doctor-patient relationships in maternity wards, promotion of choice, protecting privacy and patient dignity in maternity wards and building partnerships with traditional birth attendants and other non-state actors. The findings suggest the need for structural changes to maternity clinics and routine nursing practices, including an emphasis on those doctor-patient relational practices that positively influence women's healthcare-seeking behaviours. Copyright © 2015 John Wiley & Sons, Ltd.

  8. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    Science.gov (United States)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  9. 23 CFR Appendix C to Subpart B of... - Additional Required Contract Provisions, Appalachian Development Highway System and Local Access...

    Science.gov (United States)

    2010-04-01

    ... Development Highway System and Local Access Roads Contracts Other Than Construction Contracts C Appendix C to.... 633, Subpt. B, App. C Appendix C to Subpart B of Part 633—Additional Required Contract Provisions.... Compliance with regulations. The contractor will comply with the provisions of 23 U.S.C. 324 and with...

  10. Teaching Poverty with Geographic Visualization and Geographic Information Systems (GIS): A Case Study of East Buffalo and Food Access

    Science.gov (United States)

    Gjesfjeld, Christopher D.; Jung, Jin-Kyu

    2014-01-01

    Although various methods have been used to teach about poverty in the social work classroom (e.g., quantitative, historical, and qualitative), the use of geographic visualization and geographic information systems (GIS) has become a relatively new method. In our analysis of food access on the East Side of Buffalo, New York, we demonstrate the…

  11. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long‐distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  12. J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device

    Science.gov (United States)

    Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin

    2011-10-01

    This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.

  13. Packet track and traceback mechanism against denial of service attacks

    Institute of Scientific and Technical Information of China (English)

    LI Li; SHEN Su-bin

    2008-01-01

    The denial of service attack is a main type of threat on the Internet today. On the basis of path identification (Pi) and Internet control message protocol (ICMP) traceback (iTrace) methods, a packet track and traceback mechanism is proposed, which features rapid response and high accuracy. In this scheme, routers apply packet marking scheme and send traceback messages, which enables the victim to design the path tree in peace time. During attack times the victim can trace attackers back within the path tree and perform rapid packet filtering using the marking in each packet. Traceback messages overcome Pi's limitation, wherein too much path information is lost in path identifiers; whereas path identifiers can be used to expedite the design of the path-tree, which reduces the high overhead in iTrace. Therefore, our scheme not only synthesizes the advantages but also compromises the disadvantages of the above two methods. Simulation results with NS-2 show the validity of our scheme.

  14. Teenage sexuality and rights in Chile: from denial to punishment.

    Science.gov (United States)

    Casas, Lidia; Ahumada, Claudia

    2009-11-01

    While Chile sees itself as a country that has fully restored human rights since its return to democratic rule in 1990, the rights of teenagers to comprehensive sexuality education are still not being met. This paper reviews the recent history of sexuality education in Chile and related legislation, policies and programmes. It also reports a 2008 review of the bylaws of 189 randomly selected Chilean schools, which found that although such bylaws are mandatory, the absence of bylaws to prevent discrimination on grounds of pregnancy, HIV and sexuality was common. In relation to how sexual behaviour and discipline were addressed, bylaws that were non-compliant with the law were very common. Opposition to sexuality education in schools in Chile is predicated on the denial of teenage sexuality, and many schools punish sexual behaviour where transgression is perceived to have taken place. While the wider Chilean society has been moving towards greater recognition of individual autonomy and sexual diversity, this cultural shift has yet to be reflected in the government's political agenda, in spite of good intentions. Given this state of affairs, the Chilean polity needs to recognise its youth as having human rights, or will continue to fail in its commitment to them.

  15. Climate Change Denial Books and Conservative Think Tanks: Exploring the Connection.

    Science.gov (United States)

    Dunlap, Riley E; Jacques, Peter J

    2013-06-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites.

  16. The Principle of Non-Refoulement and Access to Asylum System: Two Sides of the Same Coin

    Directory of Open Access Journals (Sweden)

    Goranka Lalić Novak

    2015-12-01

    Full Text Available The European Union and other countries on the Balkan route for migrants have recorded a large increase in the number of asylum seekers. In parallel with the increased number of refugees trying to enter the territory of the EU, measures for migration management have tightened, and the right to asylum at the level of the Member States has been interpreted more and more restrictive. Search for protection from persecution has become a reason for closing borders and disabling access to territory and asylum system. However, access to asylum system is the first step in the realization of the right to asylum as guaranteed by international, European and national law. In addition to allowing access to territory and asylum system, which implies an obligation of states to accept refugees in order to confirm the need for international protection in a fair and efficient procedure, the states are obliged to respect the principle of non-refoulement. The aim of this paper is to clarify the connection between providing access to asylum system and respect for the principle of non-refoulement. Analysis in the paper was done by legal-dogmatic method of research and interpretation of legal acts and other authorities, as well as of UNHCR relevant recommendations and documents. The assumption is that without the provision of access to territory and asylum system the principle of non-refoulement cannot be respected. Apart from the international refugee law and doctrinal interpretations, it derives from the practice of the European Court of Human Rights regarding the prohibition of torture or other inhuman treatment or punishment guaranteed by the Convention for the Protection of Human Rights and Fundamental Freedoms. The conclusion is that the states must take into account international and European standards regarding the protection of the principle of non-refoulement when considering the introduction of new measures to manage migration movements.

  17. Systems and Services for Real-Time Web Access to NPP Data Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Global Science & Technology, Inc. (GST) proposes to investigate information processing and delivery technologies to provide near-real-time Web-based access to...

  18. DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

    Directory of Open Access Journals (Sweden)

    S.R. Kodituwakku

    2010-11-01

    Full Text Available Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework is that it allows intranet users to access only authorized resources. It consists of two kinds of role hierarchies: global role hierarchy and local role hierarchy, and two levels of permissions: server permission and object permission. They simplify the way of structuring authority and responsibility in the whole intranet and the allocation of privileges for different objects within a particular server. The proposed framework is implemented over Windows platform and tested for the validity. The test results indicated that it can successfully be used to control accessing network objects.

  19. National Geothermal Data System: Transforming the Discovery, Access, and Analytics of Data for Geothermal Exploration

    Energy Technology Data Exchange (ETDEWEB)

    Patten, Kim [Arizona Geological Survey

    2013-05-01

    Compendium of Papers from the 38th Workshop on Geothermal Reservoir Engineering Stanford University, Stanford, California February 11-13, 2013 The National Geothermal Data System (NGDS) is a distributed, interoperable network of data collected from state geological surveys across all fifty states and the nation’s leading academic geothermal centers. The system serves as a platform for sharing consistent, reliable, geothermal-relevant technical data with users of all types, while supplying tools relevant for their work. As aggregated data supports new scientific findings, this content-rich linked data ultimately broadens the pool of knowledge available to promote discovery and development of commercial-scale geothermal energy production. Most of the up-front risks associated with geothermal development stem from exploration and characterization of subsurface resources. Wider access to distributed data will, therefore, result in lower costs for geothermal development. NGDS is on track to become fully operational by 2014 and will provide a platform for custom applications for accessing geothermal relevant data in the U.S. and abroad. It is being built on the U.S. Geoscience Information Network (USGIN) data integration framework to promote interoperability across the Earth sciences community. The basic structure of the NGDS employs state-of-the art informatics to advance geothermal knowledge. The following four papers comprising this Open-File Report are a compendium of presentations, from the 38th Annual Workshop on Geothermal Reservoir Engineering, taking place February 11-13, 2013 at Stanford University, Stanford, California. “NGDS Geothermal Data Domain: Assessment of Geothermal Community Data Needs,” outlines the efforts of a set of nationwide data providers to supply data for the NGDS. In particular, data acquisition, delivery, and methodology are discussed. The paper addresses the various types of data and metadata required and why simple links to existing

  20. Issues With Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition

    Science.gov (United States)

    2016-04-30

    PDF files, e-mail messages, blogs, Web pages and social sites” (“Structured Data,” n.d.-b). 3 According to the PC Magazine Online Encyclopedia, a...have found that balancing security and access needs is difficult. Background and Findings on Deep Dives of Acquisition Information Systems As part...of this effort to understand acquisition data opportunities,4 we conducted “ deep dives” on a set of information systems. In this section, we summarize

  1. An Effective Security Mechanism for M-Commerce Applications Exploiting Ontology Based Access Control Model for Healthcare System

    Directory of Open Access Journals (Sweden)

    S.M. Roychoudri

    2016-09-01

    Full Text Available Health organizations are beginning to move mobile commerce services in recent years to enhance services and quality without spending much investment for IT infrastructure. Medical records are very sensitive and private to any individuals. Hence effective security mechanism is required. The challenges of our research work are to maintain privacy for the users and provide smart and secure environment for accessing the application. It is achieved with the help of personalization. Internet has provided the way for personalization. Personalization is a term which refers to the delivery of information that is relevant to individual or group of individuals in the format, layout specified and in time interval. In this paper we propose an Ontology Based Access Control (OBAC Model that can address the permitted access control among the service providers and users. Personal Health Records sharing is highly expected by the users for the acceptance in mobile commerce applications in health care systems.

  2. Distributed Denial of Service Attacks Detection Method Based on Conditional Random Fields

    Directory of Open Access Journals (Sweden)

    Shi-wen CHEN

    2013-04-01

    Full Text Available In order to detect distributed denial of service (DDoS attacks accurately and efficiently, a new detection model based on conditional random fields (CRF was proposed. The CRF based model incorporates the signature-based and anomaly-based detection methods to a hybrid system. The selected features include source IP entropy, destination IP entropy, source port entropy, destination port entropy, protocol number and etc. The CRF based model combines these IP flow entropies and other fingerprints into a normalize entropy as the feature vectors to depict the states of the monitoring traffic. The training method of the detection model uses the L-BFGS algorithm. And the model only needs to inspect the IP header fields of each packet, which makes it possible for real-time implementation even on real time network traffic. The CRF based model may have the ability to detect new form of forthcoming attacks, because it is independent from any specific DDoS flooding attack tools. The experiment results show that the CRF based method has higher detection accuracy and sensitivity as well as lower false positive alarms. Experiment with KDD CUP1999, DARPA 2000 and generated attack datasets, the CRF based model outperforms other well-known detection methods such as Naïve Bayes, KNN, SVM and etc. The accuracy goes beyond 95.0% and the false alarm rate is less than 5.0%. Meanwhile, the CRF based model is robust under massive background network traffic.

  3. Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    CERN Document Server

    Gupta, B B; Misra, Manoj

    2012-01-01

    Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. This paper reports the design principles and evaluation results of our proposed framework that autonomously detects and accurately characterizes a wide range of flooding DDoS attacks in ISP network. Attacks are detected by the constant monitoring of propagation of abrupt traffic changes inside ISP network. For this, a newly designed flow-volume based approach (FVBA) is used to construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic goes out of profile. Consideration of varying tolerance factors make proposed detection system scalable to the varying network conditions and a...

  4. 75 FR 68094 - Partial Grant and Partial Denial of Clean Air Act Waiver Application Submitted by Growth Energy...

    Science.gov (United States)

    2010-11-04

    ... Partial Denial of Clean Air Act Waiver Application Submitted by Growth Energy To Increase the Allowable... AGENCY [EPA-HQ-OAR-2009-0211; FRL-9215-5] Partial Grant and Partial Denial of Clean Air Act Waiver Application Submitted by Growth Energy To Increase the Allowable Ethanol Content of Gasoline to 15...

  5. 78 FR 6839 - Duke Energy Carolinas, LLC, Oconee Nuclear Station, Units 1, 2, and 3 Denial of Amendment to...

    Science.gov (United States)

    2013-01-31

    ... From the Federal Register Online via the Government Publishing Office ] NUCLEAR REGULATORY COMMISSION Duke Energy Carolinas, LLC, Oconee Nuclear Station, Units 1, 2, and 3 Denial of Amendment to Facility Operating License AGENCY: Nuclear Regulatory Commission. ACTION: Denial; opportunity to request...

  6. 24 CFR 960.204 - Denial of admission for criminal activity or drug abuse by household members.

    Science.gov (United States)

    2010-04-01

    ... activity or drug abuse by household members. 960.204 Section 960.204 Housing and Urban Development... HOUSING Admission § 960.204 Denial of admission for criminal activity or drug abuse by household members. (a) Required denial of admission—(1) Persons evicted for drug-related criminal activity. The...

  7. A secure biometrics-based authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  8. Integrating in Silico and in Vitro Approaches To Predict Drug Accessibility to the Central Nervous System.

    Science.gov (United States)

    Zhang, Yan-Yan; Liu, Houfu; Summerfield, Scott G; Luscombe, Christopher N; Sahi, Jasminder

    2016-05-01

    Estimation of uptake across the blood-brain barrier (BBB) is key to designing central nervous system (CNS) therapeutics. In silico approaches ranging from physicochemical rules to quantitative structure-activity relationship (QSAR) models are utilized to predict potential for CNS penetration of new chemical entities. However, there are still gaps in our knowledge of (1) the relationship between marketed human drug derived CNS-accessible chemical space and preclinical neuropharmacokinetic (neuroPK) data, (2) interpretability of the selected physicochemical descriptors, and (3) correlation of the in vitro human P-glycoprotein (P-gp) efflux ratio (ER) and in vivo rodent unbound brain-to-blood ratio (Kp,uu), as these are assays routinely used to predict clinical CNS exposure, during drug discovery. To close these gaps, we explored the CNS druglike property boundaries of 920 market oral drugs (315 CNS and 605 non-CNS) and 846 compounds (54 CNS drugs and 792 proprietary GlaxoSmithKline compounds) with available rat Kp,uu data. The exact permeability coefficient (Pexact) and P-gp ER were determined for 176 compounds from the rat Kp,uu data set. Receiver operating characteristic curves were performed to evaluate the predictive power of human P-gp ER for rat Kp,uu. Our data demonstrates that simple physicochemical rules (most acidic pKa ≥ 9.5 and TPSA methods were investigated using multiple sets of in silico molecular descriptors. We present a random forest model with excellent predictive power (∼0.75 overall accuracy) using the rat neuroPK data set. We also observed good concordance between the structural interpretation results and physicochemical descriptor importance from the Kp,uu classification QSAR model. In summary, we propose a novel, hybrid in silico/in vitro approach and an in silico screening model for the effective development of chemical series with the potential to achieve optimal CNS exposure.

  9. Digital predistortion of 75–110 GHz W-band frequency multiplier for fiber wireless short range access systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Deng, Lei; Pang, Xiaodan;

    2011-01-01

    We present a W-band fiber-wireless transmission system based on a nonlinear frequency multiplier for high-speed wireless short range access applications. By implementing a baseband digital signal predistortion scheme, intensive nonlinear distortions induced in a sextuple frequency multiplier can...... be effectively pre-compensated. Without using costly W-band components, a transmission system with 26km fiber and 4m wireless transmission operating at 99.6GHz is experimentally validated. Adjacent-channel power ratio (ACPR) improvements for IQ-modulated vector signals are guaranteed and transmission...... performances for fiber and wireless channels are studied. This W-band predistortion technique is a promising candidate for applications in high capacity wireless-fiber access systems....

  10. Digital predistortion of 75-110 GHz W-band frequency multiplier for fiber wireless short range access systems.

    Science.gov (United States)

    Zhao, Ying; Deng, Lei; Pang, Xiaodan; Yu, Xianbin; Zheng, Xiaoping; Zhang, Hanyi; Monroy, Idelfonso Tafur

    2011-12-12

    We present a W-band fiber-wireless transmission system based on a nonlinear frequency multiplier for high-speed wireless short range access applications. By implementing a baseband digital signal predistortion scheme, intensive nonlinear distortions induced in a sextuple frequency multiplier can be effectively pre-compensated. Without using costly W-band components, a transmission system with 26 km fiber and 4 m wireless transmission operating at 99.6 GHz is experimentally validated. Adjacent-channel power ratio (ACPR) improvements for IQ-modulated vector signals are guaranteed and transmission performances for fiber and wireless channels are studied. This W-band predistortion technique is a promising candidate for applications in high capacity wireless-fiber access systems.

  11. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    Science.gov (United States)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  12. Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems

    KAUST Repository

    Hamza, Doha R.

    2012-04-01

    In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment (ACK) when the received packet is decoded correctly. Lack of ARQ feedback is interpreted as erroneous reception or inactivity. We call this the explicit ACK scheme. The primary receiver may also send a negative acknowledgment (NACK) when the packet is received in error. Lack of ARQ feedback is interpreted as an ACK or no-transmission. This is called the explicit NACK scheme. Under both schemes, when the primary feedback is interpreted as a NACK, the secondary user assumes that there will be retransmission in the next slot and accesses the channel with a certain probability. When the primary feedback is interpreted as an ACK, the secondary user accesses the channel with either one of two probabilities based on the sensing outcome. Under these settings, we find the three optimal access probabilities via maximizing the secondary throughput given a constraint on the primary throughput. We compare the performance of the explicit ACK and explicit NACK schemes and contrast them with schemes based on either sensing or primary ARQ feedback only. © 2012 IEEE.

  13. The NASA Astrophysics Data System Free Access to the Astronomical Literature On-Line and through Email

    CERN Document Server

    Eichhorn, G; Grant, C S; Kurtz, M J; Murray, S S

    2001-01-01

    The Astrophysics Data System (ADS) provides access to the astronomical literature through the World Wide Web. It is a NASA funded project and access to all the ADS services is free to everybody world-wide.The ADS Abstract Service allows the searching of four databases with abstracts in Astronomy, Instrumentation, Physics/Geophysics, and the LANL Preprints with a total of over 2.2 million references. The system also provides access to reference and citation information, links to on-line data, electronic journal articles, and other on-line information. The ADS Article Service contains the articles for most of the astronomical literature back to volume 1. It contains the scanned pages of all the major journals (Astrophysical Journal, Astronomical Journal, Astronomy & Astrophysics, Monthly Notices of the Royal Astronomical Society, and Solar Physics), as well as most smaller journals back to volume 1. The ADS can be accessed through any web browser without signup or login. Alternatively an email interface is ...

  14. Future mobile access for open-data platforms and the BBC-DaaS system

    Science.gov (United States)

    Edlich, Stefan; Singh, Sonam; Pfennigstorf, Ingo

    2013-03-01

    In this paper, we develop an open data platform on multimedia devices to act as marketplace of data for information seekers and data providers. We explore the important aspects of Data-as-a-Service (DaaS) service in the cloud with a mobile access point. The basis of the DaaS service is to act as a marketplace for information, utilizing new technologies and recent new scalable polyglot architectures based on NoSql databases. Whereas Open-Data platforms are beginning to be widely accepted, its mobile use is not. We compare similar products, their approach and a possible mobile usage. We discuss several approaches to address the mobile access as a native app, html5 and a mobile first approach together with the several frontend presentation techniques. Big data visualization itself is in the early days and we explore some possibilities to get big data / open data accessed by mobile users.

  15. SMF/MMF Based In-building Gigabit Wireless Access Systems Using Simplified 60-GHz Transceivers

    DEFF Research Database (Denmark)

    Pham, Tien Thang; Lebedev, Alexander; Beltrán, M.

    2011-01-01

    Hybrid fiber-wireless transmission of 2-Gbps signals in 60-GHz band over a composite channel (10-km SMF/1-km MMF/6.5-m wireless) is experimentally demonstrated for gigabit inbuilding wireless access using simple direct modulation, optical upconversion and envelope detection.......Hybrid fiber-wireless transmission of 2-Gbps signals in 60-GHz band over a composite channel (10-km SMF/1-km MMF/6.5-m wireless) is experimentally demonstrated for gigabit inbuilding wireless access using simple direct modulation, optical upconversion and envelope detection....

  16. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  17. A Single Hidden Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems

    Directory of Open Access Journals (Sweden)

    J.Preethi

    2010-07-01

    Full Text Available In this paper, we propose a single hidden layered fuzzy neural algorithm, which is able to provide a better quality of service constraints in a multi-cell scenario with three different radio access technologies (RATs namely the Universal Mobile Telecommunication Systems (UMTS, the Wireless Local Area Network (WLAN and the Global System for Mobile Telecommunication (GSM /Enhanced Data rate for GSM Evolution (EDGE Radio access Network (GERAN. This proposed algorithm works in two steps; the first step is to select a suitable combination of cells among the three different RATs. The second step chooses the most appropriate RAT to which the users can be attached and to choose the suitable bandwidth to allocate for the users. The Joint Radio Resource Management (JRRM makes use of fuzzy neural approach to manage dynamically the allocation and deallocation of the different radio resources among thedifferent radio access systems for spectrum bands allocated to each of these systems. By simulation results, we have shown that the proposed algorithm selects the most appropriate RAT in a multi-cell scenario.

  18. Evaluating the Quality of Experience of a System for Accessing Educational Objects in Health

    Science.gov (United States)

    Wanderley, Miguel; Menezes, Júlio, Jr.; Gusmão, Cristine; Lins, Rodrigo

    2016-01-01

    In the area of primary health care, there is a high demand in Brazil of permanent education and qualification of professionals who work in this field. Besides, nowadays it is a consensus that education can be benefited by the use of mobile devices, especially due to the possibilities of browsing, use and of easy access to different resources. In…

  19. Access the Unified Health System actions and services from the perspective of judicialization

    Directory of Open Access Journals (Sweden)

    Raquel de Souza Ramos

    Full Text Available Objective: the judicialization of health is incorporated into the daily work of health institutions in Brazil through the court orders for access. In this study, the objective was to describe the contents of the social representations of access, through judicialization, for the health professionals. Method: qualitative study based on Social Representations Theory, involving 40 professionals, at a teaching hospital and at the center for the regulation of beds and procedures in Rio de Janeiro. Forty semistructured interviews were held, to which the thematic-categorical content analysis technique was applied. Results: the health professionals' attitude towards the reality the judicialization imposes is negative, but they acknowledge this resource as necessary in view of the public health crisis. Judicialization is considered a strategy to exercise citizenship that superimposes individual on collective law, increases social inequalities in access and compromises the efficacy of health policies. Conclusion: considering social representation as a determinant of practices, the representations that emerged can contribute to the change of the professionals' practices. Improvements in user care should be promoted, characterized as one of the main challenges to advance in universal access to health.

  20. Operative technique for insertion of a totally implantable system for venous access.

    Science.gov (United States)

    Sterchi, J M; Fulks, D; Cruz, J; Paschold, E

    1986-10-01

    A totally implantable venous access device is described and a step by step technique for implanting the device is given. Among 203 patients in whom the technique has been used, thrombosis of the subclavian or jugular vein has occurred in only three. There have been no pulmonary complications, and only three devices have been removed because of infection.

  1. Access the Unified Health System actions and services from the perspective of judicialization1

    Science.gov (United States)

    Ramos, Raquel de Souza; Gomes, Antonio Marcos Tosoli; de Oliveira, Denize Cristina; Marques, Sergio Corrêa; Spindola, Thelma; Nogueira, Virginia Paiva Figueiredo

    2016-01-01

    Objective: the judicialization of health is incorporated into the daily work of health institutions in Brazil through the court orders for access. In this study, the objective was to describe the contents of the social representations of access, through judicialization, for the health professionals. Method: qualitative study based on Social Representations Theory, involving 40 professionals, at a teaching hospital and at the center for the regulation of beds and procedures in Rio de Janeiro. Forty semistructured interviews were held, to which the thematic-categorical content analysis technique was applied. Results: the health professionals' attitude towards the reality the judicialization imposes is negative, but they acknowledge this resource as necessary in view of the public health crisis. Judicialization is considered a strategy to exercise citizenship that superimposes individual on collective law, increases social inequalities in access and compromises the efficacy of health policies. Conclusion: considering social representation as a determinant of practices, the representations that emerged can contribute to the change of the professionals' practices. Improvements in user care should be promoted, characterized as one of the main challenges to advance in universal access to health. PMID:27143542

  2. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in multimo

  3. Effective access to digital assets: An XML-based EAD search system

    NARCIS (Netherlands)

    Zhang, J.; Fachry, K.N.; Kamps, J.; Tibbo, H.R.; Hank, C.; Lee, C.A.; Clemens, R.

    2009-01-01

    This paper focuses on the question of effective access methods, by developing novel search tools that will be crucial on the massive scale of digital asset repositories. We illustrate concretely why XML matters in digital curation by describing an implementation of a baseline digital asset search sy

  4. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Science.gov (United States)

    2013-02-01

    ... not have access to the Internet, you may view the docket online by visiting the Docket Management..., emergency preparedness and response, and communications capabilities (33 CFR 105.305). Facility Security... about the costs associated with these approaches as well as any potential benefit. These comments...

  5. Model of traffic access mode and railway station choice of suburban railway system in Slovenia

    Directory of Open Access Journals (Sweden)

    Gregor RAK

    2014-12-01

    Full Text Available This article presents the establishment of a model of understanding the access mode and railway station choice of Slovenian passengers. Therefore, a model has been designed to predict the determination of existing decision making preferences of railway users about the access mode and railway station choice with a stated preference survey and face to face method. The target group in the survey were railway passengers in the suburban environment that use the rail for work and school purposes. The total number of respondents was 412. The survey showed that most passengers access the railway station with car (60,2%, by foot (26,2%, with public transport (bus – 8,3% and with bike (5,3%. Average distance to the station is 4,9 km, average time of access is 10,5 min. Upon exit most passengers walk to the final destination (84,5%, use the public transport (bus – 14,1%, car (1,2% or bike (0,2%. Average time from exit of the train to final destination is 13,1 min, average distance is 1,58 km.

  6. Performance Analysis of Global Search Algorithm Based Multiuser Detector for Multi Carrier Code Division Multiple Access System under Clipping Noise

    Directory of Open Access Journals (Sweden)

    S. Sivanesskumar

    2011-01-01

    Full Text Available Problem statement: Multi Carrier Code Division Multiple Access (MC-CDMA, a promising technology for the 4G communication systems. The major limitation of MC-CDMA system is the Multiple Access Interference (MAI which is due to near-far effect, frequency offset and nonlinear power amplification due to clipping noise. Approach: The performance of MC-CDMA under clipping noise using Global search algorithm based Multiuser detector in AWGN, Rayleigh and Rician channel is analyzed in this study. Results: The proposed method is simulated using BPSK modulation, Walsh spreading code, number of subcarriers 64 and number of users 16 and clipping noise. Conclusion: By simulation result, BER in AWGN channel outperforms other channels as SNR is increased. The performance of Rician fading channel is better than that of Rayleigh fading channel, because of the LOS path.

  7. Modular Robotics for Delivering On-Site contamination Sensors and Mapping Systems to Difficult-to-Access Locations

    Energy Technology Data Exchange (ETDEWEB)

    Geisinger, Joseph

    2001-05-21

    Presently, characterization operations are scheduled for thousands of facilities and pieces of equipment throughout DOE sites, each of which requires manual surveying with handheld instruments and manual record keeping. Such work, particularly in difficult-to-access-areas, results in significant amounts of worker exposure, long timelines and additional secondary waste generation. Therefore, a distinct need exists for remote tools that can quickly deploy sensors and automated contamination mapping systems into these areas.

  8. Modelling and understanding primary health care accessibility and utilization in rural South Africa: an exploration using a geographical information system.

    Science.gov (United States)

    Tanser, Frank; Gijsbertsen, Brice; Herbst, Kobus

    2006-08-01

    Physical access to health care affects a large array of health outcomes, yet meaningfully estimating physical access remains elusive in many developing country contexts where conventional geographical techniques are often not appropriate. We interviewed (and geographically positioned) 23,000 homesteads regarding clinic usage in the Hlabisa health sub-district, KwaZulu-Natal, South Africa. We used a cost analysis within a geographical information system to estimate mean travel time (at any given location) to clinic and to derive the clinic catchments. The model takes into account the proportion of people likely to be using public transport (as a function of estimated walking time to clinic), the quality and distribution of the road network and natural barriers, and was calibrated using reported travel times. We used the model to investigate differences in rural, urban and peri-urban usage of clinics by homesteads in the study area and to quantify the effect of physical access to clinic on usage. We were able to predict the reported clinic used with an accuracy of 91%. The median travel time to nearest clinic is 81 min and 65% of homesteads travel 1h or more to attend the nearest clinic. There was a significant logistic decline in usage with increasing travel time (p rural/peri-urban counterparts, respectively, after controlling for systematic differences in travel time to clinic. The estimated median travel time to the district hospital is 170 min. The methodology constitutes a framework for modelling physical access to clinics in many developing country settings.

  9. Enabling clean access into Subglacial Lake Whillans: development and use of the WISSARD hot water drill system.

    Science.gov (United States)

    Rack, Frank R

    2016-01-28

    Clean hot water drill systems (CHWDSs) are used with clean access protocols for the exploration of subglacial lakes and other subglacial aquatic environments (e.g. ice-shelf cavities) in Antarctica. A CHWDS developed for the Whillans Ice Stream Subglacial Access Research Drilling (WISSARD) project by the Science Management Office at the University of Nebraska-Lincoln (UNL-SMO), USA, was specifically designed for use in West Antarctica, where the US Antarctic Program's South Pole Traverse could assist with logistical support. The initial goal was to provide clean access holes through ice up to 1000 m thick following environmental stewardship guidelines; however, the existing design allows this CHWDS to be used for ice thicknesses up to 2000 m following modifications to accommodate longer hose lengths. In January 2013, the WISSARD CHWDS successfully provided for the first time a clean access borehole through 800 m of ice into Subglacial Lake Whillans beneath the West Antarctic Ice Sheet for the deployment of scientific instruments and sampling tools. The development and initial use of the WISSARD CHWDS required the project team to address a number of constraints while providing contingencies to meet the defined project scope, schedule and budget.

  10. Use of Data Denial Experiments to Evaluate ESA Forecast Sensitivity Patterns

    Energy Technology Data Exchange (ETDEWEB)

    Zack, J; Natenberg, E J; Knowe, G V; Manobianco, J; Waight, K; Hanley, D; Kamath, C

    2011-09-13

    wind speed and vertical temperature difference. Ideally, the data assimilation scheme used in the experiments would have been based upon an ensemble Kalman filter (EnKF) that was similar to the ESA method used to diagnose the Mid-Colombia Basin sensitivity patterns in the previous studies. However, the use of an EnKF system at high resolution is impractical because of the very high computational cost. Thus, it was decided to use the three-dimensional variational analysis data assimilation that is less computationally intensive and more economically practical for generating operational forecasts. There are two tasks in the current project effort designed to validate the ESA observational system deployment approach in order to move closer to the overall goal: (1) Perform an Observing System Experiment (OSE) using a data denial approach which is the focus of this task and report; and (2) Conduct a set of Observing System Simulation Experiments (OSSE) for the Mid-Colombia basin region. The results of this task are presented in a separate report. The objective of the OSE task involves validating the ESA-MOOA results from the previous sensitivity studies for the Mid-Columbia Basin by testing the impact of existing meteorological tower measurements on the 0- to 6-hour ahead 80-m wind forecasts at the target locations. The testing of the ESA-MOOA method used a combination of data assimilation techniques and data denial experiments to accomplish the task objective.

  11. 门禁系统在博物馆的应用%Application of Access Control Systems in Museums

    Institute of Scientific and Technical Information of China (English)

    王振

    2015-01-01

    got rapid development in the rapid development of digital technology, network technology today access technology. Access control systems have already gone beyond the simple road and key management, it has gradual y developed into a complete access control system. It plays a great role in administrative work environment safety, personnel at endance management etc. In this paper, the museum entrance guard system in the research on the application of.%在数字技术网络技术飞速发展的今天门禁技术得到了迅猛的发展。门禁系统早已超越了单纯的门道及钥匙管理,它已经逐渐发展成为一套完整的出入管理系统。它在工作环境安全、人事考勤管理等行政管理工作中发挥着巨大的作用。本文就门禁系统在博物馆的应用进行分析研究。

  12. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  13. Apparatus, method and system to control accessibility of platform resources based on an integrity level

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, Chris; Pierson, Lyndon G.

    2016-10-25

    Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report domain to monitor the functional domain and a policy domain to identify, based on such monitoring, a transition of the functional domain from a first integrity level to a second integrity level. In response to a change in integrity level, the policy domain may configure the enforcement domain to enforce against the functional domain one or more resource accessibility rules corresponding to the second integrity level. In another embodiment, the policy domain automatically initiates operations in aid of transitioning the platform from the second integrity level to a higher integrity level.

  14. Through the Lens of Operational Art: Countering People’s Republic of China (PRC) Aggression in a Limited Conflict using Innovative Ways and Cost-Effective Means to Offset PRC Anti-Access Area Denial (A2AD) Capabilities. How Should Pacific Command’s (PACOM) Theater Campaign Plan Evolve in Light of the Center for Strategic and Budgetary Assessment’s (CSBA) Recent AirSea Battle Concept (ASBC) Proposal?

    Science.gov (United States)

    2010-10-25

    x. 8 Tallarida , The Shanghai Communiqué. 9 CNN Wire Staff, Mullen: Debt is top national security threat. 10 Kaplan, The Geography of Chinese... Tallarida , Alex. “The Shanghai Communiqué.” Foreign Policy. 8 April 2010. http://foreign.nixonfoundation.org/2010/04/08/shanghai-communique/ (accessed

  15. User needs in television archive access:Acquiring knowledge necessary for system design

    OpenAIRE

    2009-01-01

    This paper presents a methodical approach for generating deep knowledge about users, as a prerequisite for design and construction of digital information access to cultural heritage information objects. We exemplify this methodical approach by reporting on an explorative study of information need characteristics in a television broadcast context. The methodical approach is inspired by naturalistic research, and our main data is nine in-depth interviews conducted with scholars and students wit...

  16. Third-Person Effects on Publication of a Holocaust-Denial Advertisement.

    Science.gov (United States)

    Price, Vincent; Tewksbury, David; Huang, Li-Ning

    1998-01-01

    Investigates college students' judgments about a controversial Holocaust-denial advertisement and its suitability for publication in their college newspaper. Finds that those with interests at stake perceived the advertisement as especially likely to influence others, and that third-person effects and publication decisions were a function of…

  17. 78 FR 37481 - Consolidation of Permit Procedures; Denial and Revocation of Permits

    Science.gov (United States)

    2013-06-21

    ..., including a tree, a tissue culture, a plantlet culture, pollen, a shrub, a vine, a cutting, a graft, a scion...; ] DEPARTMENT OF AGRICULTURE Animal and Plant Health Inspection Service 7 CFR Parts 319, 322, and 360 RIN 0579-AD76 Consolidation of Permit Procedures; Denial and Revocation of Permits AGENCY: Animal and...

  18. 42 CFR 424.530 - Denial of enrollment in the Medicare program.

    Science.gov (United States)

    2010-10-01

    ..., supplier, an owner, managing employee, an authorized or delegated official, medical director, supervising.... (a) Reasons for denial. CMS may deny a provider's or supplier's enrollment in the Medicare program for the following reasons: (1) Compliance. The provider or supplier at any time is found not to be...

  19. 75 FR 4493 - Natural Resources Defense Council; Denial of Petition for Rulemaking

    Science.gov (United States)

    2010-01-28

    ...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 50 Natural Resources Defense Council; Denial of Petition for... Nuclear Regulatory Commission (NRC) is denying a petition for rulemaking submitted by the Natural Resources Defense Council (PRM- 50-90). The petitioner requested that the NRC amend the regulations...

  20. 10 CFR 95.20 - Grant, denial or termination of facility clearance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Grant, denial or termination of facility clearance. 95.20 Section 95.20 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND... termination of facility clearance. The Division of Security Operations shall provide notification in...

  1. 78 FR 71030 - Ford Motor Company, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ... (FMVSS) No. 205, Glazing Materials. Ford has filed an appropriate report pursuant to 49 CFR Part 573... identified in Ford's Noncompliance Information Report. Accordingly, Ford's petition is hereby denied, and the... National Highway Traffic Safety Administration Ford Motor Company, Denial of Petition for Decision...

  2. 9 CFR 121.8 - Denial, revocation, or suspension of registration.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Denial, revocation, or suspension of registration. 121.8 Section 121.8 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE... law enforcement or intelligence agency of: (i) Committing a crime set forth in 18 U.S.C....

  3. 40 CFR 90.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 90.123 Section 90.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Emission Standards and Certification Provisions § 90.123 Denial, revocation of certificate of conformity... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The...

  4. 40 CFR 89.126 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 89.126 Section 89.126 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Standards and Certification Provisions § 89.126 Denial, revocation of certificate of conformity. (a) If... issued certificate of conformity if the Administrator finds any one of the following infractions to...

  5. 40 CFR 91.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 91.123 Section 91.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Certification Provisions § 91.123 Denial, revocation of certificate of conformity. (a) If, after review of the... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The...

  6. Predicting denial function of schizophrenic patients by the picture completion subtest of WAIS-R.

    Science.gov (United States)

    Rina, Hasako; Terao, Takeshi; Nakano, Hideki; Okamoto, Tatsuya; Iwata, Noboru; Nakamura, Jun

    2004-11-01

    In the previous study, picture completion (PC) test scores of Wechsler Adult Intelligence Scale Revised (WAIS-R) were negatively associated with recognition of mental illness measured by Schedule for the Assessment of Insight (SAI). Therefore, it can be hypothesized that function measured by the PC test is positively associated with denial function. To investigate this hypothesis, we investigated the relationship between two picture tests (picture completion and picture arrangement) of the WAIS-R and denial function tests (lie scale, frequency scale and correction scale) of the Minnesota Multiphasic Personality Inventory (MMPI) in 26 schizophrenic patients. As a result, the lie scale score and the correction scale score were positively and significantly associated with picture completion whereas no scale score was significantly associated with picture arrangement. The present findings suggest that the positive association between function measured by the PC test and denial function measured by lie and correction scale scores. Further studies are warranted to investigate the usefulness of the PC test for the measurement of denial function in schizophrenia.

  7. 2 CFR 2424.1110 - When may a HUD official issue a limited denial of participation?

    Science.gov (United States)

    2010-01-01

    ... would constitute an unsatisfactory risk; (2) There are irregularities in a person's past performance in... or further hearing. (d) An affiliate or organizational element may be included in a limited denial of... organizational element is currently responsible and not controlled by the primary sanctioned party (or by...

  8. 42 CFR 73.8 - Denial, revocation, or suspension of registration.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Denial, revocation, or suspension of registration. 73.8 Section 73.8 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES... law enforcement or intelligence agency of: (i) Committing a crime specified in 18 U.S.C....

  9. 75 FR 10444 - Nuclear Energy Institute; Denial of Petition for Rulemaking

    Science.gov (United States)

    2010-03-08

    ... COMMISSION 10 CFR Part 73 Nuclear Energy Institute; Denial of Petition for Rulemaking AGENCY: Nuclear... (NRC) is denying a petition for rulemaking (PRM) submitted by the Nuclear Energy Institute (NEI) (the... rulemaking. The petitioner states that the nuclear energy industry has fully implemented numerous...

  10. 78 FR 38800 - Panda Power LLC, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-06-27

    ... National Highway Traffic Safety Administration Panda Power LLC, Denial of Petition for Decision of... Petition. SUMMARY: Panda Power LLC (Panda Power) \\1\\, has determined that High Intensity Discharge (HID... Associated Equipment. Panda Power has filed an appropriate report pursuant to 49 CFR Part 573, Defect...

  11. 21 CFR 814.45 - Denial of approval of a PMA.

    Science.gov (United States)

    2010-04-01

    ...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES FDA Action on a PMA § 814.45 Denial of approval of a... validity of the study; or (5) Any clinical investigation involving human subjects described in the PMA, subject to the institutional review board regulations in part 56 or informed consent regulations in...

  12. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order s

  13. 45 CFR 233.106 - Denial of AFDC benefits to strikers.

    Science.gov (United States)

    2010-10-01

    ...” by using the National Labor Relations Board definition (29 U.S.C. 142(2)) or another definition of... 45 Public Welfare 2 2010-10-01 2010-10-01 false Denial of AFDC benefits to strikers. 233.106 Section 233.106 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY...

  14. Older People and Poverty in Rural Britain: Material Hardships, Cultural Denials and Social Inclusions

    Science.gov (United States)

    Milbourne, Paul; Doheny, Shane

    2012-01-01

    This paper explores the relations between older people, poverty and place in rural Britain. It develops previous work on rural poverty that has pointed both to the significance of older people within the rural poor population and to their denials of poverty. The paper also connects with recent discussions on the complexity of relations between…

  15. 9 CFR 352.6 - Denial or withdrawal of inspection service.

    Science.gov (United States)

    2010-01-01

    ... INSPECTION AND CERTIFICATION EXOTIC ANIMALS AND HORSES; VOLUNTARY INSPECTION Exotic Animals § 352.6 Denial or... fact, been so inspected; (5) has been convicted of more than one misdemeanor under any law based upon..., including allegations of fact which constitute a basis for the action. After the complaint is served...

  16. 76 FR 20025 - Alan H. Olefsky, M.D.; Denial of Application

    Science.gov (United States)

    2011-04-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF JUSTICE Drug Enforcement Administration Alan H. Olefsky, M.D.; Denial of Application On August 22, 2008, the Deputy Assistant Administrator, Office of Diversion Control, Drug Enforcement Administration, issued an Order...

  17. 75 FR 9904 - James A. Holland; Denial of Hearing; Final Debarment Order

    Science.gov (United States)

    2010-03-04

    ... HUMAN SERVICES Food and Drug Administration James A. Holland; Denial of Hearing; Final Debarment Order...) is denying James A. Holland's request for a hearing and is issuing an order under the Federal Food, Drug, and Cosmetic Act (the act) debarring Holland for 5 years from providing services in any...

  18. A Discrete Event Simulator for Extensive Defense Mechanism for Denial of Service Attacks Analysis

    Directory of Open Access Journals (Sweden)

    Maryam Tanha

    2012-01-01

    Full Text Available Problem statement: Seeking for defense mechanisms against low rate Denial of Service (DoS attacks as a new generation of DoS attacks has received special attention during recent years. As a decisive factor, evaluating the performance of the offered mitigation techniques based on different metrics for determining the viability and ability of these countermeasures requires more research. Approach: The development of a new generalized discrete event simulator has been deliberated in detail. The research conducted places high emphasis on the benefits of creating a customized discrete event simulator for the analysis of security and in particular the DoS attacks. The simulator possesses a niche in terms of the small scale, low execution time, portability and ease of use. The attributes and mechanism of the developed simulator is complemented with the proposed framework. Results: The simulator has been extensively evaluated and has proven to provide an ideal tool for the analysis and exploration of DoS attacks. In-depth analysis is enabled by this simulator for creating multitudes of defense mechanisms against HTTP low rate DoS attacks. The acquired results from the simulation tool have been compared against a simulator from the same domain. Subsequently, it enables the validation of developed simulator utilizing selected performance metrics including mean in-system time, average delay and average buffer size. Conclusion: The proposed simulator serves as an efficient and scalable performance analysis tool for the analysis of HTTP low rate DoS attack defense mechanism. Future work can encompass the development of discrete event simulators for analysis of other security issues such as Intrusion Detection Systems.

  19. Evidence that the circadian system mediates photoperiodic nonresponsiveness in Siberian hamsters: the effect of running wheel access on photoperiodic responsiveness.

    Science.gov (United States)

    Freeman, D A; Goldman, B D

    1997-04-01

    Juvenile male Siberian hamsters from a line of hamsters selected for nonresponsiveness to short photoperiod (PNRj) and animals from the general colony (UNS) were separated at weaning into two groups. Group 1 males were moved into short days (10 h light:14 h dark [10L:14D]) with free access to running wheels (RW). Group 2 animals were the male siblings of Group 1 hamsters; they were moved at the same time into the same room, but were housed in cages without access to RW. Group 2 hamsters only had access to RW for the final week of short-day exposure (Week 8). Animals were blood sampled at the time of sacrifice for analysis of serum prolactin (PRL) and follicle-stimulating hormone (FSH) concentrations. At sacrifice, paired testis weights were obtained and pelage color was scored. Animals from the UNS line showed the expected declines in testis weight, body weight, and serum concentrations of both PRL and FSH, regardless of the presence or absence of RW. These animals also exhibited a high proportion of individuals molting to winter-type pelage. By contrast, a marked difference was noted between siblings from the PNRj line depending on whether RW access was provided at the time of weaning. Animals with access to RW exhibited identical responses to those of the UNS responder animals, whereas PNRj animals without access to RW showed no adjustments to short days (i.e., testis regression, pelage molt, expansion of alpha). In a second experiment, PNRj and UNS males were placed in constant darkness (DD), with or without RW access. The results of this experiment indicated that PNRj animals respond to DD regardless of the presence or absence of RW. In DD, PNRj hamsters also exhibited significantly longer free-running period lengths (taus) than did UNS hamsters; all the PNRj hamsters had taus > 24 h, whereas none of the UNS hamsters had a tau > 24 h. These results indicate that PNRj hamsters retain the proper neural pathways for responding to short day lengths and establish a

  20. Electronic medical record systems in critical access hospitals: leadership perspectives on anticipated and realized benefits.

    Science.gov (United States)

    Mills, Troy R; Vavroch, Jared; Bahensky, James A; Ward, Marcia M

    2010-04-01

    The growth of electronic medical records (EMRs) is driven by the belief that EMRs will significantly improve healthcare providers' performance and reduce healthcare costs. Evidence supporting these beliefs is limited, especially for small rural hospitals. A survey that focused on health information technology (HIT) capacity was administered to all hospitals in Iowa. Structured interviews were conducted with the leadership at 15 critical access hospitals (CAHs) that had implemented EMRs in order to assess the perceived benefits of operational EMRs. The results indicate that most of the hospitals implemented EMRs to improve efficiency, timely access, and quality. Many CAH leaders also viewed EMR implementation as a necessary business strategy to remain viable and improve financial performance. While some reasons reflect external influences, such as perceived future federal mandates, other reasons suggest that the decision was driven by internal forces, including the hospital's culture and the desires of key leaders to embrace HIT. Anticipated benefits were consistent with goals; however, realized benefits were rarely obvious in terms of quantifiable results. These findings expand the limited research on the rationale for implementing EMRs in critical access hospitals.

  1. Web based dosimetry system for reading and monitoring dose through internet access

    Energy Technology Data Exchange (ETDEWEB)

    Perle, S.C.; Bennett, K.; Kahilainen, J.; Vuotila, M. [Mirion Technologies (United States); Mirion Technologies (Finland)

    2010-07-01

    The Instadose{sup TM} dosemeter from Mirion Technologies is a small, rugged device based on patented direct ion storage technology and is accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) through NIST, bringing radiation monitoring into the digital age. Smaller than a flash drive, this dosemeter provides an instant read-out when connected to any computer with internet access and a USB connection. Instadose devices provide radiation workers with more flexibility than today's dosemeters. Non Volatile Analog Memory Cell surrounded by a Gas Filled Ion Chamber. Dose changes the amount of Electric Charge in the DIS Analog Memory. The total charge storage capacity of the memory determines the available dose range. The state of the Analog Memory is determined by measuring the voltage across the memory cell. AMP (Account Management Program) provides secure real time access to account details, device assignments, reports and all pertinent account information. Access can be restricted based on the role assignment assigned to an individual. A variety of reports are available for download and customizing. The Advantages of the Instadose dosemeter are: - Unlimited reading capability, - Concerns about a possible exposure can be addressed immediately, - Re-readability without loss of exposure data, with cumulative exposure maintained. (authors)

  2. Infiltrating to Win: The Conduct of Border Denial Operations

    Science.gov (United States)

    2016-04-04

    34 Washington Quarterly 29, no. 1: 21-40, accessed February 3, 2016, Academic Search Complete, EBSCOhost . 1... EBSCOhost . 4 Richard D. Hooker, Jr., Joseph J. Collins, eds., Lessons Encountered Learning from the Long War (Washington, DC: National Defense University...Press, 1996. Saikal, Amin. "Securing Afghanistan’s border." Survival (00396338) 48, no. 1: 129-141. Academic Search Complete, EBSCOhost , Accessed

  3. Effectiveness and Safety of Computer-controlled Periodontal Ligament Injection System in Endodontic Access to the Mandibular Posterior Teeth

    Institute of Scientific and Technical Information of China (English)

    Quan Jing; Kuo Wan; Xiao-jun Wang; Lin Ma

    2014-01-01

    Objective To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posterior teeth in patients with irreversible pulpitis. Methods A total of 162 Chinese patients who had been diagnosed with irreversible pulpitis in their mandibular posterior teeth without acute infection or inflammation in the periodontal tissues were enrolled in this clinical study. The patients were divided into 3 groups according to the position of the involved tooth:the premolar group (PM, n=38), first molar group (FM, n=66), and second molar group (SM, n=58). All the patients received computer-controlled PDL injection with 4%articaine and 1∶100 000 epinephrine. Immediately after the injection, endodontic access was performed, and the degree of pain during the treatment was evaluated by the patients using Visual Analogue Scale for pain. The success rates were compared among the 3 groups. The responses of local soft tissues were evaluated 3-8 days and 3 weeks after the procedure. Results The overall success rate was 76.5%. There was a significant difference in success rates among the PM, FM, and SM groups (92.1%, 53.0%, 93.1%, respectively;χ2=34.3, P Conclusion The computer-controlled PDL injection system demonstrates both satisfactory anesthetic effects and safety in local soft tissues as primary anesthetic technique in endodontic access to the mandibular posterior teeth in patients with irreversible pulpitis.

  4. A hybrid single-end-access MZI and Φ-OTDR vibration sensing system with high frequency response

    Science.gov (United States)

    Zhang, Yixin; Xia, Lan; Cao, Chunqi; Sun, Zhenhong; Li, Yanting; Zhang, Xuping

    2017-01-01

    A hybrid single-end-access Mach-Zehnder interferometer (MZI) and phase sensitive OTDR (Φ-OTDR) vibration sensing system is proposed and demonstrated experimentally. In our system, the narrow optical pulses and the continuous wave are injected into the fiber through the front end of the fiber at the same time. And at the rear end of the fiber, a frequency-shift-mirror (FSM) is designed to back propagate the continuous wave modulated by the external vibration. Thus the Rayleigh backscattering signals (RBS) and the back propagated continuous wave interfere with the reference light at the same end of the sensing fiber and a single-end-access configuration is achieved. The RBS can be successfully separated from the interference signal (IS) through digital signal process due to their different intermediate frequency based on frequency division multiplexing technique. There is no influence between these two schemes. The experimental results show 10 m spatial resolution and up to 1.2 MHz frequency response along a 6.35 km long fiber. This newly designed single-end-access setup can achieve vibration events locating and high frequency events response, which can be widely used in health monitoring for civil infrastructures and transportation.

  5. Personal Denial Of Service (PDOS Attacks: A Discussion and Exploration of a New Category of Cyber Crime

    Directory of Open Access Journals (Sweden)

    Michael Raymond Bartolacci

    2014-03-01

    Full Text Available The growth of the Internet has created a corresponding growth in Internet-based crimes and online misbehavior, particularly among younger computer-savvy people who learned the technical skills necessary for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial of Service attack (PDOS. A PDOS is a cyber crime in which an individual deliberately prevents the access of an individual or small group to online services such as email or banking. Due to the nature of a PDOS, these acts can be overlooked by law enforcement and organizations that operate Internet infrastructure such as universities. We analyze a PDOS attack in the context of the Routine Activities Theory of criminal justice. We also surveyed university students to ascertain their attitudes towards online account breaches as related to a PDOS attack.  Our motivation for this work is twofold: to stress the need for cyber ethics education at the university level, and to illustrate how a previously uncategorized type of cyber crime is easily perpetrated in such an environment.

  6. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    Science.gov (United States)

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  7. Using "Making Sense of Climate Science Denial" MOOC videos in a college course

    Science.gov (United States)

    Schuenemann, K. C.; Cook, J.

    2015-12-01

    The Massive Open Online Course (MOOC) "Denial101x: Making Sense of Climate Science Denial" teaches students to make sense of the science and respond to climate change denial. The course is made up of a series of short, myth-debunking lecture videos that can be strategically used in college courses. The videos and the visuals within have proven a great resource for an introductory college level climate change course. Methods for using the videos in both online and in-classroom courses will be presented, as well as student reactions and learning from the videos. The videos introduce and explain a climate science topic, then paraphrase a common climate change myth, explain why the myth is wrong by identifying the characteristic of climate denial used, and concludes by reinforcing the correct science. By focusing on common myths, the MOOC has made an archive of videos that can be used by anyone in need of a 5-minute response to debunk a myth. By also highlighting five characteristics of climate denial: fake experts, logical fallacies, impossible expectations, cherry picking, and conspiracy theories (FLICC), the videos also teach the viewer the skills they need to critically examine myths they may encounter in the real world on a variety of topics. The videos also include a series of expert scientist interviews that can be used to drive home points, as well as put some faces to the science. These videos are freely available outside of the MOOC and can be found under the relevant "Most used climate myths" section on the skepticalscience.com webpage, as well as directly on YouTube. Discover ideas for using videos in future courses, regardless of discipline.

  8. Urban Railway Accessibility

    Institute of Scientific and Technical Information of China (English)

    GUAN Hongzhi; YIN Yuanfei; YAN Hai; HAN Yan; QIN Huanmei

    2007-01-01

    Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the logit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi,but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.

  9. Random Access Preamble Design and Detection for 3GPP Narrowband IoT Systems

    OpenAIRE

    2016-01-01

    Narrowband internet of things (NB-IoT) is an emerging cellular technology that will provide improved coverage for massive number of low-throughput low-cost devices with low device power consumption in delay-tolerant applications. A new single tone signal with frequency hopping has been designed for NB-IoT physical random access channel (NPRACH). In this letter we describe this new NPRACH design and explain in detail the design rationale. We further propose possible receiver algorithms for NPR...

  10. Fairness for Non-Orthogonal Multiple Access in 5G Systems

    Science.gov (United States)

    Timotheou, Stelios; Krikidis, Ioannis

    2015-10-01

    In non-orthogonal multiple access (NOMA) downlink, multiple data flows are superimposed in the power domain and user decoding is based on successive interference cancellation. NOMA's performance highly depends on the power split among the data flows and the associated power allocation (PA) problem. In this letter, we study NOMA from a fairness standpoint and we investigate PA techniques that ensure fairness for the downlink users under i) instantaneous channel state information (CSI) at the transmitter, and ii) average CSI. Although the formulated problems are non-convex, we have developed low-complexity polynomial algorithms that yield the optimal solution in both cases considered.

  11. The development of environmental management system in Serbia and Montenegro as part of the EU accession

    Directory of Open Access Journals (Sweden)

    Zdravković Dušan S.

    2004-01-01

    Full Text Available Environmental protection is one of the top priorities of the EU. The EU regulates this area both within the Union and internationally. Also, the regulations concerning environmental protection in the EU to a certain extent exceed the national level. The EU environmental legislation imposes a number of challenges to membership candidates. Legal heritage of the EU is very extensive, complex and costly, and environmental problems are much more important in the EU membership candidates than in the member states. Therefore, it is of great importance for transitional countries such as Serbia and Montenegro to participate in the EU Stabilization and Association Process as well as in the WTO accession process.

  12. An automated system for access to derived climate indices in support of ecological impacts assessments and resource management

    Science.gov (United States)

    Walker, J.; Morisette, J. T.; Talbert, C.; Blodgett, D. L.; Kunicki, T.

    2012-12-01

    A U.S. Geological Survey team is working with several providers to establish standard data services for the climate projection data they host. To meet the needs of climate adaptation science and landscape management communities, the team is establishing a set of climate index calculation algorithms that will consume data from various providers and provide directly useful data derivatives. Climate projections coming from various scenarios, modeling centers, and downscaling methods are increasing in number and size. Global change impact modeling and assessment, generally, requires inputs in the form of climate indices or values derived from raw climate projections. This requirement puts a large burden on a community not familiar with climate data formats, semantics, and processing techniques and requires storage capacity and computing resources out of the reach of most. In order to fully understand the implications of our best available climate projections, assessments must take into account an ensemble of climate projections and potentially a range of parameters for calculation of climate indices. These requirements around data access and processing are not unique from project to project, or even among projected climate data sets, pointing to the need for a reusable tool to generate climate indices. The U.S. Geological Survey has developed a pilot application and supporting web service framework that automates the generation of climate indices. The web service framework consists of standards-based data servers and a data integration broker. The resulting system allows data producers to publish and maintain ownership of their data and data consumers to access climate derivatives via a simple to use "data product ordering" workflow. Data access and processing is completed on enterprise "cloud" computing resources and only the relatively small, derived climate indices are delivered to the scientist or land manager. These services will assist the scientific and land

  13. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  14. The Elusive Access to Education for Muslim Women in Kenya from the Late Nineteenth Century to the "Winds of Change" in Africa (1890s to 1960s)

    Science.gov (United States)

    Keshavjee, Rashida

    2010-01-01

    This article discusses the denial of access to education to Ismaili Muslim women in colonial Kenya during the 1890s and the 1960s. The Ismailis were part of the "Asians" in Africa, a working class, religious, Muslim immigrant group from India, circumscribed by poverty and a traditional culture, the orthodox elements of which, with regard…

  15. The Elusive Access to Education for Muslim Women in Kenya from the Late Nineteenth Century to the "Winds of Change" in Africa (1890s to 1960s)

    Science.gov (United States)

    Keshavjee, Rashida

    2010-01-01

    This article discusses the denial of access to education to Ismaili Muslim women in colonial Kenya during the 1890s and the 1960s. The Ismailis were part of the "Asians" in Africa, a working class, religious, Muslim immigrant group from India, circumscribed by poverty and a traditional culture, the orthodox elements of which, with regard to their…

  16. Socioeconomic factors and parity of access to robotic surgery in a county health system.

    Science.gov (United States)

    Tatebe, Leah Carey; Gray, Regan; Tatebe, Ken; Garcia, Fernando; Putty, Bradley

    2017-02-28

    Equal access to novel surgical technologies remains a policy concern as hospitals adopt robotic surgery with increasing prevalence. This study sought to determine whether socioeconomic factors influence access to robotic surgery. All laparoscopic and robotic fundoplications and paraesophageal hernia repairs performed by a surgical group over 6 years at a county and two neighboring private hospitals were identified. Robotic use by hospital setting, age, gender, reported ethnicity, estimated income, insurance payer, and diagnosis were examined. Of 418 patients identified, 180 (43%) presented to the county hospital, where subjects were younger (51.1 versus 56.2 years, p robotic surgery offered in the county hospital was observed based on age, gender, reported ethnicity, estimated income, or insurance payer. Patients with higher income and private insurers were more likely to present to the private hospital setting where robotics is utilized more often. The presence of a paraesophageal hernia was a significant factor in determining robotic therapy in both settings.

  17. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  18. [Influence of floor surface and access to pasture on claw characteristics in dairy cows kept in cubicle housing systems].

    Science.gov (United States)

    Haufe, H C; Friedli, K; Gygax, L; Wechsler, B

    2014-04-01

    This study aimed at investigating the effect of the floor type used in the walking area of cubicle housing systems and of access to pasture on claw dimensions and claw shape in dairy cows. Data were collected on 36 farms, 12 farms each fitted with mastic asphalt, slatted concrete or solid rubber flooring. With each floor type, cows on half of the farms had access to pasture in summer. The farms were visited three times at intervals of about 6 months and data were collected from 10 cows during each visit. Net growth of the claw horn was highest on rubber flooring and lowest on mastic asphalt. On all floor types, claw angles were larger after the winter period and smaller after the summer period. With regard to claw shape, floor type had an effect on the occurrence of flat, concave and overgrown claw soles. In conclusion, none of the investigated floor types was clearly superior to the others with regard to claw dimensions and claw shape, and access to pasture during summer (median 4 h per day) had only little influence on the investigated claw characteristics.

  19. Influence of floor surface and access to pasture on claw health in dairy cows kept in cubicle housing systems.

    Science.gov (United States)

    Haufe, Helge Christiane; Gygax, Lorenz; Wechsler, Beat; Stauffacher, Markus; Friedli, Katharina

    2012-06-01

    In this study, the effects on the claw health of dairy cows of three different floor types and access to pasture were investigated on 35 farms. The farms were fitted with a given floor type in the indoor walking area of a cubicle housing system: a solid rubber, mastic asphalt or slatted concrete floor. Because we chose farms on which the given floor type was in good condition, the data presented show what can be achieved on these types of floors under ideal circumstances. Cows on half of the farms per floor type had access to pasture during the grazing period. Each farm was visited three times at approx. 6-month intervals at the end of the winter indoor-housing period and at the end of the summer period, i.e. after the period with access to pasture on half of the farms. During each visit, the claw health of the same 10 cows per farm was assessed on the occasion of routine claw trimming. The proportion of cows with haemorrhages increased from mastic asphalt to rubber and slatted concrete floors. A lower proportion of cows kept on mastic asphalt was affected by white-line fissures and needed intermittent claw-trimming, an indicator for lameness. Cows housed in cubicle systems with slatted concrete floors were at the lowest risk of having heel-horn erosions. Access to pasture was associated with a lower incidence of slight white-line fissures and dermatitis digitalis. A higher proportion of cows with sole haemorrhages and sole ulcers were found on all floor types at the end of the summer period than at the end of the winter indoor-housing period. Floor type did not influence the presence of sole ulcers and deep white-line fissures. In conclusion, the effect of floor type on claw health was slight, and none of the investigated floor types was clearly superior to the others. Access to pasture was not effective in reducing the presence of most types of claw lesions associated with the floor type used in the indoor walking area.

  20. Implications of the accession of the Republic of Croatia to the European Union for Croatian health care system.

    Science.gov (United States)

    Ostojić, Rajko; Bilas, Vlatka; Franc, Sanja

    2012-09-01

    The Republic of Croatia's accession to the European Union (EU) will affect all segments of economy and society, including the health care system. The aim of this paper is to establish the potential effects of joining the EU on Croatian health care, as well as to assess its readiness to enter this regional economic integration. The paper identifies potential areas of impact of EU accession on Croatian health care and analyzes the results of the conducted empirical research. In this research, a method of in-depth interviews was applied on a sample of 49 subjects; health professionals from public and private sectors, health insurance companies, pharmaceutical companies, drug wholesalers, and non-governmental organisations (patient associations). Once Croatia joins the EU, it will face: new rules and priorities in line with the current European health strategy; the possibilities of drawing funds from European cohesion funds; labour migrations; new guidelines on patient safety and mobility. From the aspect of harmonising national regulations with EU regulations in the area of health care, Croatian system can be assessed as ready to enter the EU. Croatia's accession to the EU can result in a better information flow, growth of competitiveness of Croatian health care system, enhanced quality, inflow of EU funds, development of health tourism, but also in increased migration of health care professionals, and potential increase in the cost of health care services. Functioning within the EU framework might result in adaptation to the EU standards, but it could also result in the concentration of staff and institutions in larger cities.