Automated Computer Access Request System
Snook, Bryan E.
2010-01-01
The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).
Access Request Trustworthiness in Weighted Access Control Framework
Institute of Scientific and Technical Information of China (English)
WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min
2005-01-01
Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.
Fermilab Security Site Access Request Database
Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question
METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION
Directory of Open Access Journals (Sweden)
K. A. Shcheglov
2015-11-01
Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.
Access control system for ISABELLE
International Nuclear Information System (INIS)
Potter, K.; Littenberg, L.
1977-01-01
An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release
12 CFR 404.14 - Requirements of request for access.
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Requirements of request for access. 404.14 Section 404.14 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.14 Requirements of request for access. (a) Form. Requests for...
36 CFR 903.5 - Response to request for access.
2010-07-01
... CORPORATION PRIVACY ACT § 903.5 Response to request for access. (a) Within 10 days of receipt of a request... available under the Privacy Act and shall notify the requesting individual in person or in writing of that... under § 903.11. Access shall be provided within 30 days of receipt of the request unless the Corporation...
10 CFR 1304.105 - Requests for access to records.
2010-01-01
... Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.105 Requests for access to records... request access to his or her own records in writing by addressing a letter to: Privacy Act Officer; U.S... via the internet. Internet requests should be transmitted through the Board's Web site at www.nwtrb...
Directory of Open Access Journals (Sweden)
Irina Pavlovna Bolodurina
2013-10-01
Full Text Available This article presents a model of queuing system for broadband multimedia educational resources, as well as a model of access to a hybrid cloud system storage. These models are used to enhance the efficiency of computing resources in a distance learning system. An additional OpenStack control module has been developed to achieve the distribution of request streams and balance the load between cloud nodes.
An Attribute Based Access Control Framework for Healthcare System
Afshar, Majid; Samet, Saeed; Hu, Ting
2018-01-01
Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.
Energy Technology Data Exchange (ETDEWEB)
Ohmacht, Martin
2017-08-15
In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.
Ohmacht, Martin
2014-09-09
In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.
DownloadAccess to Information Request form
International Development Research Centre (IDRC) Digital Library (Canada)
PC Forms Inc. 834-4048
To apply for information under the Access to. Information Act, complete this form or a written request mentioning the Act. Describe the information being sought and provide any relevant details necessary to help the International. Development Research Centre (IDRC) find it. If you require assistance, refer to Info Source.
25 CFR 700.277 - Requests for access to records: Submission.
2010-04-01
..., both on the envelope and on the face of the request, with the legend “PRIVACY ACT REQUEST FOR ACCESS... further notified that under § 700.279(d) the failure to state willingness to pay fees as high as are...
Mohanty, Rakesh; Sharma, Burle; Tripathy, Sasmita
2011-01-01
List Accessing Problem is a well studied research problem in the context of linear search. Input to the list accessing problem is an unsorted linear list of distinct elements along with a sequence of requests, where each request is an access operation on an element of the list. A list accessing algorithm reorganizes the list while processing a request sequence on the list in order to minimize the access cost. Move-To-Front algorithm has been proved to be the best performing list accessing onl...
Efficient scheduling request algorithm for opportunistic wireless access
Nam, Haewoon; Alouini, Mohamed-Slim
2011-01-01
An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers
5 CFR 1302.2 - Requests for access.
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Requests for access. 1302.2 Section 1302.2 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET ADMINISTRATIVE PROCEDURES PRIVACY ACT... (walk-ins) cannot be accepted, except that individuals who are employed by the Office of Management and...
10 CFR 62.12 - Contents of a request for emergency access: General information.
2010-01-01
... EMERGENCY ACCESS TO NON-FEDERAL AND REGIONAL LOW-LEVEL WASTE DISPOSAL FACILITIES Request for a Commission... the person(s) or company(ies) generating the low-level radioactive waste for which the determination...) Certification that the radioactive waste for which emergency access is requested is low-level radioactive waste...
28 CFR 16.41 - Requests for access to records.
2010-07-01
... Government Manual,” which is issued annually and is available in most libraries, as well as for sale from the Government Printing Office's Superintendent of Documents. This manual also can be accessed electronically at... pay a greater or lesser amount. (d) Verification of identity. When you make a request for access to...
Atomic memory access hardware implementations
Ahn, Jung Ho; Erez, Mattan; Dally, William J
2015-02-17
Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.
Efficient scheduling request algorithm for opportunistic wireless access
Nam, Haewoon
2011-08-01
An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.
28 CFR 25.6 - Accessing records in the system.
2010-07-01
... National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs may... through the NCIC communication network. Upon receiving a request for a background check from an FFL, a POC...
10 CFR 62.13 - Contents of a request for emergency access: Alternatives.
2010-01-01
... access under this part must include information on alternatives to emergency access. The request shall...'s financial capability to implement the alternatives; (4) Any other pertinent societal costs and...
The equipment access software for a distributed UNIX-based accelerator control system
International Nuclear Information System (INIS)
Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve
1994-01-01
This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))
32 CFR 1701.10 - ODNI responsibility for responding to access requests.
2010-07-01
... requested record does not exist or cannot be located; a determination that what has been requested is not a... THE DIRECTOR OF NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974... records exist and, if so, recommend to the D/IMO: (1) Whether access should be denied in whole or part...
45 CFR 613.2 - Requesting access to records.
2010-10-01
... and/or date and place of birth of the individual; (2) Your own identity, as required in paragraph (c...) Verification of identity. When requesting access to records about yourself, NSF requires that you verify your identity in an appropriate fashion. Individuals appearing in person should be prepared to show reasonable...
International Nuclear Information System (INIS)
Abla, G.; Schissel, D. P.; Fredian, T. W.; Stillerman, J. A.; Greenwald, M. J.; Stepanov, D. N.; Ciarlette, D. J.
2010-01-01
Tokamak diagnostic settings are repeatedly modified to meet the changing needs of each experiment. Enabling the remote diagnostic control has significant challenges due to security and efficiency requirements. The Operation Request Gatekeeper (ORG) is a software system that addresses the challenges of remotely but securely submitting modification requests. The ORG provides a framework for screening all the requests before they enter the secure machine zone and are executed by performing user authentication and authorization, grammar validation, and validity checks. A prototype ORG was developed for the ITER CODAC that satisfies their initial requirements for remote request submission and has been tested with remote control of the KSTAR Plasma Control System. This paper describes the software design principles and implementation of ORG as well as worldwide test results.
36 CFR 1600.22 - Requests for access to records.
2010-07-01
... place of birth, and, at your option, the social security number of the individual; (2) Your own identity... a greater or lesser amount. (d) Verification of identity. When you make a request for access to records about yourself, you must verify your identity. You must state your full name, current address, and...
77 FR 18791 - Proposed Information Collection; Comment Request; NIST Associates Information System
2012-03-28
... DEPARTMENT OF COMMERCE National Institute of Standards and Technology Proposed Information Collection; Comment Request; NIST Associates Information System AGENCY: National Institute of Standards and... access to the NIST campuses or NIST resources. The NIST Associates Information System (NAIS) information...
6 CFR 5.21 - Requests for access to records.
2010-01-01
...) Verification of identity. When you make a request for access to records about yourself, you must verify your identity. You must state your full name, current address, and date and place of birth. You must sign your... this part. In most cases, a component's central Privacy Act office is the place to send a Privacy Act...
Efficient medium access control protocol for geostationary satellite systems
Institute of Scientific and Technical Information of China (English)
王丽娜; 顾学迈
2004-01-01
This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.
37 CFR 204.5 - Procedures for requesting access to records.
2010-07-01
... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Procedures for requesting access to records. 204.5 Section 204.5 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES PRIVACY ACT: POLICIES AND PROCEDURES § 204.5 Procedures for...
Increasing access to emergency contraception through online prescription requests.
Averbach, Sarah; Wendt, Jacqueline Moro; Levine, Deborah K; Philip, Susan S; Klausner, Jeffrey D
2010-01-01
To describe a pilot program, Plan B Online Prescription Access, to provide easy access to prescriptions for emergency contraception via the Internet. We measured electronic prescriptions for Plan B (Duramed Pharmaceuticals, Cincinnati, Ohio) by month over time. Pharmacists faxed patient-generated prescriptions back to the Department of Public Health for confirmation. Despite no marketing, within the first 18 months of the program, 152 electronic prescriptions for Plan B were requested by 128 female San Francisco residents. Seventy-eight prescriptions were filled (51%) by pharmacists. If correctly marketed, online prescriptions for Plan B have the potential to be an effective means of increasing emergency contraception access in both urban and rural settings across the United States. Further user-acceptability studies are warranted.
Directory of Open Access Journals (Sweden)
Aleksei A. Gavrishev
2018-03-01
Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming
10 CFR 25.27 - Reopening of cases in which requests for access authorizations are canceled.
2010-01-01
... authorizations are canceled. 25.27 Section 25.27 Energy NUCLEAR REGULATORY COMMISSION ACCESS AUTHORIZATION Access Authorizations § 25.27 Reopening of cases in which requests for access authorizations are canceled. (a) In... cases were previously canceled, new fingerprint cards (FD-257) in duplicate and a new Security...
Automated biometric access control system for two-man-rule enforcement
International Nuclear Information System (INIS)
Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.
1991-01-01
This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule
Interactive water monitoring system accessible by cordless telephone
Volpicelli, Richard; Andeweg, Pierre; Hagar, William G.
1985-12-01
A battery-operated, microcomputer-controlled monitoring device linked with a cordless telephone has been developed for remote measurements. This environmental sensor is self-contained and collects and processes data according to the information sent to its on-board computer system. An RCA model 1805 microprocessor forms the basic controller with a program encoded in memory for data acquisition and analysis. Signals from analog sensing devices used to monitor the environment are converted into digital signals and stored in random access memory of the microcomputer. This remote sensing system is linked to the laboratory by means of a cordless telephone whose base unit is connected to regular telephone lines. This offshore sensing system is simply accessed by a phone call originating from a computer terminal in the laboratory. Data acquisition is initiated upon request: Information continues to be processed and stored until the computer is reprogrammed by another phone call request. Information obtained may be recalled by a phone call after the desired environmental measurements are finished or while they are in progress. Data sampling parameters may be reset at any time, including in the middle of a measurement cycle. The range of the system is limited only by existing telephone grid systems and by the transmission characteristics of the cordless phone used as a communications link. This use of a cordless telephone, coupled with the on-board computer system, may be applied to other field studies requiring data transfer between an on-site analytical system and the laboratory.
41 CFR 51-9.302 - Times, places and requirements for access requests.
2010-07-01
... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Times, places and requirements for access requests. 51-9.302 Section 51-9.302 Public Contracts and Property Management Other... Director may require a notarized statement of identity. The Executive Director shall ensure that such times...
49 CFR 1007.3 - Requests by an individual for information or access.
2010-10-01
... business addresses and telephone numbers. (c) For each system of records from which information is sought...) Any individual may request information on whether a system of records maintained by the Board contains... information pertaining to him or her which is contained in a system of records. All requests shall be directed...
MAST's Integrated Data Access Management system: IDAM
International Nuclear Information System (INIS)
Muir, D.G.; Appel, L.; Conway, N.J.; Kirk, A.; Martin, R.; Meyer, H.; Storrs, J.; Taylor, D.; Thomas-Davies, N.; Waterhouse, J.
2008-01-01
A new Integrated Data Access Management system, IDAM, has been created to address specific data management issues of the MAST spherical Tokamak. For example, this system enables access to numerous file formats, both legacy and modern (IDA, Ufile, netCDF, HDF5, MDSPlus, PPF, JPF). It adds data quality values at the signal level, and automatically corrects for problems in data: in timings, calibrations, and labelling. It also builds new signals from signal components. The IDAM data server uses a hybrid XML-relational database to record how data are accessed, whether locally or remotely, and how alias and generic signal names are mapped to true names. Also, XML documents are used to encode the details of data corrections, as well as definitions of composite signals and error models. The simple, user friendly, API and accessor function library, written in C on Linux, is available for applications in C, C++, IDL and Fortran-90/95/2003 with good performance: a MAST plasma current trace (28 kbytes of data), requested using a generic name and with data corrections applied, is delivered over a 100 Mbit/s network in ∼13 ms
32 CFR 806b.14 - Processing a Request for Access.
2010-07-01
... releasable under the Freedom of Information Act, with appeal rights (See subpart F of this part), citing... Freedom of Information Act and the Privacy Act regardless of the Act cited. The requester does not need to cite either Act if the records they want are contained in a system of records. Process the request...
Prototype and Evaluation of AutoHelp: A Case-based, Web-accessible Help Desk System for EOSDIS
Mitchell, Christine M.; Thurman, David A.
1999-01-01
AutoHelp is a case-based, Web-accessible help desk for users of the EOSDIS. Its uses a combination of advanced computer and Web technologies, knowledge-based systems tools, and cognitive engineering to offload the current, person-intensive, help desk facilities at the DAACs. As a case-based system, AutoHelp starts with an organized database of previous help requests (questions and answers) indexed by a hierarchical category structure that facilitates recognition by persons seeking assistance. As an initial proof-of-concept demonstration, a month of email help requests to the Goddard DAAC were analyzed and partially organized into help request cases. These cases were then categorized to create a preliminary case indexing system, or category structure. This category structure allows potential users to identify or recognize categories of questions, responses, and sample cases similar to their needs. Year one of this research project focused on the development of a technology demonstration. User assistance 'cases' are stored in an Oracle database in a combination of tables linking prototypical questions with responses and detailed examples from the email help requests analyzed to date. When a potential user accesses the AutoHelp system, a Web server provides a Java applet that displays the category structure of the help case base organized by the needs of previous users. When the user identifies or requests a particular type of assistance, the applet uses Java database connectivity (JDBC) software to access the database and extract the relevant cases. The demonstration will include an on-line presentation of how AutoHelp is currently structured. We will show how a user might request assistance via the Web interface and how the AutoHelp case base provides assistance. The presentation will describe the DAAC data collection, case definition, and organization to date, as well as the AutoHelp architecture. It will conclude with the year 2 proposal to more fully develop the
Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems
Kollár, Martin
2012-05-01
In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).
Directory of Open Access Journals (Sweden)
Raik Kuhlisch
2017-07-01
Full Text Available This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC is proposed as a proper means for such regulation. A proper representation of ABAC policies must include a handling of policy attributes among different policy types. In this article, we propose a semantic policy model with predefined policy conflict categories. A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. The model and conflicts are used in a conceptual application environment and evaluated in a technical experiment during an interoperability test event.
ANALYSIS OF MPC ACCESS REQUIREMENTS FOR ADDITION OF FILLER MATERIALS
International Nuclear Information System (INIS)
W. Wallin
1996-01-01
This analysis is prepared by the Mined Geologic Disposal System (MGDS) Waste Package Development Department (WPDD) in response to a request received via a QAP-3-12 Design Input Data Request (Ref. 5.1) from WAST Design (formerly MRSMPC Design). The request is to provide: Specific MPC access requirements for the addition of filler materials at the MGDS (i.e., location and size of access required). The objective of this analysis is to provide a response to the foregoing request. The purpose of this analysis is to provide a documented record of the basis for the response. The response is stated in Section 8 herein. The response is based upon requirements from an MGDS perspective
Walby, Kevin; Larsen, Mike
2012-01-01
Access to information (ATI) and freedom of information (FOI) mechanisms are now relevant features of governments in many liberal democracies today. Citizens, organizations, and permanent residents in several countries across the globe can request unpublished information from federal, provincial, state, county, and municipal government agencies.…
78 FR 53428 - Submission for OMB Review; Comment Request
2013-08-29
... Biometric Identification System (DBIDS) Enrollment; OMB Control Number 0704-0455. Type of Request: Revision... DoD identification card. The information is used to establish eligibility for the physical access to a DoD installation or facility, detect fraudulent identification cards, provide physical access and...
42 CFR 51.42 - Access to facilities and residents.
2010-10-01
... REQUIREMENTS APPLICABLE TO THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to... such monitoring have access to the minor or adult with a legal guardian. The system shall take no... request, by the P&A system when: (1) An incident is reported or a complaint is made to the P&A system; (2...
75 FR 52313 - Submission for OMB Review; Comment Request
2010-08-25
.... Title, Form, and OMB Number: Application for Department of Defense Access Card--Defense Biometric Identification System (DBIDS) Enrollment; OMB Control Number 0704-0455. Type of Request: Revision. Number of... identification card. The information is used to establish eligibility for the physical access to a DoD...
77 FR 48199 - Privacy Act; System of Records: State-35, Information Access Programs Records
2012-08-13
..., the Privacy Act, the Ethics in Government Act, the access provisions of Executive Order 13526 or a...; requester's name and requester's mailing and email address; Social Security number (if provided by the...: Hard copy and electronic media. RETRIEVABILITY: Individual name, case number. SAFEGUARDS: All users are...
33 CFR 133.9 - Requests: Where made.
2010-07-01
...) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; STATE ACCESS § 133.9 Requests: Where made. Requests for access to the Fund under § 133.5 must be made by telephone or...
Use of action requests to control communications
International Nuclear Information System (INIS)
Brady, J.
1988-01-01
This paper discusses the Plant Information Management System (PIMS) that is implemented at Pacific Gas and Electric Company's (PG and E) Diablo Canyon Power Plant (DCPP). PIMS is implemented on IBM mainframes located at the plant, is on-line and interactive, and is accessed via a computer communication system that supports more than 450 IBM 3270 PC workstations. This paper discusses the role of the ACTION REQUEST module of PIMS and how it is used to control plant sensitive communications. The ACTION REQUEST module of PIMS can be accessed from any workstation and during the first year of Commercial Operation of DCPP replaced numerous and redundant forms of manual communication mechanisms. Also in this first year, users at the plant generated approximately 25,000 Action Requests which were controlled through review and approval cycles by PIMS. Each organization assigned action were immediately notified of their responsibilities so that action could be taken in a timely manner. The Diablo Canyon Power Plant broke Westinghouse world-wide operating records for the first year of operation (over 90% availability) due to a well built and reliable plant and due to a responsive Operations organization, which was well informed and controlled
DEFF Research Database (Denmark)
Llor, Carl; Bjerrum, Lars; Munck, Anders
2014-01-01
BACKGROUND: General practitioners (GPs) often feel uncomfortable when patients request an antibiotic when there is likely little benefit. This study evaluates the effect of access to point-of-care tests on decreasing the prescription of antibiotics in respiratory tract infections in subjects who...... explicitly requested an antibiotic prescription. METHODS: Spanish GPs registered all cases of respiratory tract infections over a 3-week period before and after an intervention undertaken in 2008 and 2009. Patients with acute sinusitis, pneumonia, and exacerbations of COPD were excluded. Two types...... requesting antibiotics received a prescription before and 60% after the intervention, without statistical differences being observed. In the group of GPs assigned to the full intervention group, the percentages were 55.1% and 36.2%, respectively, with a difference of 18.9% (95% CI: 6.4%-30.6%, P
Spiking Neural P Systems with Communication on Request.
Pan, Linqiang; Păun, Gheorghe; Zhang, Gexiang; Neri, Ferrante
2017-12-01
Spiking Neural [Formula: see text] Systems are Neural System models characterized by the fact that each neuron mimics a biological cell and the communication between neurons is based on spikes. In the Spiking Neural [Formula: see text] systems investigated so far, the application of evolution rules depends on the contents of a neuron (checked by means of a regular expression). In these [Formula: see text] systems, a specified number of spikes are consumed and a specified number of spikes are produced, and then sent to each of the neurons linked by a synapse to the evolving neuron. [Formula: see text]In the present work, a novel communication strategy among neurons of Spiking Neural [Formula: see text] Systems is proposed. In the resulting models, called Spiking Neural [Formula: see text] Systems with Communication on Request, the spikes are requested from neighboring neurons, depending on the contents of the neuron (still checked by means of a regular expression). Unlike the traditional Spiking Neural [Formula: see text] systems, no spikes are consumed or created: the spikes are only moved along synapses and replicated (when two or more neurons request the contents of the same neuron). [Formula: see text]The Spiking Neural [Formula: see text] Systems with Communication on Request are proved to be computationally universal, that is, equivalent with Turing machines as long as two types of spikes are used. Following this work, further research questions are listed to be open problems.
Data Access System for Hydrology
Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.
2007-12-01
As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via
5 CFR 1204.11 - Request for access to Board records.
2010-01-01
...'s knowledge and belief. [64 FR 51039, Sept. 21, 1999, as amended at 65 FR 48886, Aug. 10, 2000] ... “unusual circumstances” exist, the Board may extend the time for deciding the request by no more than 10...) To arrange with the Board a different time frame for processing the request or a changed request. (2...
Open Access Complements Interlibrary Loan Services, but Additional User Education is
Directory of Open Access Journals (Sweden)
Richard Hayman
2016-03-01
Full Text Available Objective – To examine interlibrary loan (ILL request rates for open access (OA materials and determine how OA may affect resource sharing. This research updates the author’s previous study. Design – Quantitative analysis. Setting – A large, urban, public research university library system in the United States of America. Subjects – 1,557 open access ILL material requests among 23,531 total ILL requests submitted during the 2012 and 2013 fiscal years (July 2011-June 2013. Methods – The library has tracked and recorded OA requests that appear among ILL material requests since 2009. Using OCLC’s ILLiad software to manage ILL requests, they have implemented two custom routines. One routine is for open access searching on standard items, and uses software plugins to search across various open resources. All materials published prior to 1923 are treated as being in the public domain, so requests for these materials are automatically routed to this queue. The second custom routine is used for searching for OA electronic theses and dissertations, and is employed when the requested resource is not found in the library’s subscription resources. Other article requests are routed to the RapidILL service for open access availability. Main Results – The research presented reveals that ILL requests for OA materials exhibited a steady increase year over year, while overall ILL requests decreased slightly. This finding is true both for the fiscal years reported in this study and also the years since the author’s original study in 2011 (Baich, 2012. Of the 1,557 OA requests examined, 72% (n=1,135 were for journal articles, 8% (n=125 were for books or book chapters, 9% (n=140 were for theses or dissertations, 3% (n=54 were for conference papers, and 7% (n=105 were for reports. Library staff typically fill these article requests using gold OA or green OA sources. The researcher notes the difficulty in refining by source, though confirmed that
XACML to build access control policies for Internet of Things
Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary
2018-01-01
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...
Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt
International Nuclear Information System (INIS)
Taylor, C.L.; O'Rourke, J.E.; Allirot, D.; O'Connor, K.
1980-09-01
This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report
Access control system operation
International Nuclear Information System (INIS)
Barnes, L.D.
1981-06-01
An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described
Efficient accesses of data structures using processing near memory
Jayasena, Nuwan S.; Zhang, Dong Ping; Diez, Paula Aguilera
2018-05-22
Systems, apparatuses, and methods for implementing efficient queues and other data structures. A queue may be shared among multiple processors and/or threads without using explicit software atomic instructions to coordinate access to the queue. System software may allocate an atomic queue and corresponding queue metadata in system memory and return, to the requesting thread, a handle referencing the queue metadata. Any number of threads may utilize the handle for accessing the atomic queue. The logic for ensuring the atomicity of accesses to the atomic queue may reside in a management unit in the memory controller coupled to the memory where the atomic queue is allocated.
How to submit an ATIP request | IDRC - International Development ...
International Development Research Centre (IDRC) Digital Library (Canada)
Corporations, businesses, and organizations with a Canadian presence have the right to make an access to Information request. Please note that an applicant may be charged additional search fees and/or preparation fees in regards to a request they have submitted under the Access to Information Act.
Freedom of Information Act Request Log System -
Department of Transportation — This system manages FHWA FOIA requests and is used to better meet the extensive annual reporting requirements imposed by statute (5 USC § 552). The FOIA Management...
Assessing Pedestrian Accessibility to Green Space Using Gis
Directory of Open Access Journals (Sweden)
Tudor MORAR
2014-06-01
Full Text Available This paper aims at comparing the parameter of green space per capita currently requested by the Romanian legislation to accessible green space per capita. The comparison is undertaken through a Geographic Information System methodology that uses publicly available data to evaluate actual population numbers with pedestrian access to parks and green squares. Using the city of Timișoara as a case study, population is divided into three main groups according to neigh borhood type in order to investigate the urban planning implications of residential typologies in relation to green space. Two scenarios are compared, namely the existing situation which describes access to municipally-administered parks and squares and the possible situation where both existing and informal green spaces are considered. The main findings show that, at present, only a quarter of the city’s population benefits from proper access, yet by developing all residual green areas this proportion could be raised to over 40%. However, the current parameter of square meters per person requested by the Romanian legislation proves to be insufficient in indicating green space accessibility because of the uneven distribution of population and green areas across the city.
Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.
2001-05-01
A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.
EARS: Electronic Access to Reference Service.
Weise, F O; Borgendale, M
1986-10-01
Electronic Access to Reference Service (EARS) is a front end to the Health Sciences Library's electronic mail system, with links to the online public catalog. EARS, which became operational in September 1984, is accessed by users at remote sites with either a terminal or microcomputer. It is menu-driven, allowing users to request: a computerized literature search, reference information, a photocopy of a journal article, or a book. This paper traces the history of EARS and discusses its use, its impact on library staff and services, and factors that influence the diffusion of new technology.
The LHC access system LACS and LASS
Ninin, P
2005-01-01
The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...
32 CFR 1901.21 - Processing requests for access to or amendment of records.
2010-07-01
... CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action on Privacy Act Requests... requester cites one Act in the request, both, or neither. This action is taken in order to ensure the... written response, shall so inform the requester and advise of his or her right to an administrative appeal...
Assessing Pedestrian Accessibility to Green Space Using Gis
Tudor MORAR; Radu RADOSLAV; Luiza Cecilia SPIRIDON; Lidia PĂCURAR
2014-01-01
This paper aims at comparing the parameter of green space per capita currently requested by the Romanian legislation to accessible green space per capita. The comparison is undertaken through a Geographic Information System methodology that uses publicly available data to evaluate actual population numbers with pedestrian access to parks and green squares. Using the city of Timișoara as a case study, population is divided into three main groups according to neigh borhood type in order to inve...
Access control and personal identification systems
Bowers, Dan M
1988-01-01
Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed
12 CFR 792.62 - Requests for accounting for disclosures.
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Requests for accounting for disclosures. 792.62... § 792.62 Requests for accounting for disclosures. At the time of the request for access or correction or at any other time, an individual may request an accounting of disclosures made of the individual's...
Fuzzy-Neural Controller in Service Requests Distribution Broker for SOA-Based Systems
Fras, Mariusz; Zatwarnicka, Anna; Zatwarnicki, Krzysztof
The evolution of software architectures led to the rising importance of the Service Oriented Architecture (SOA) concept. This architecture paradigm support building flexible distributed service systems. In the paper the architecture of service request distribution broker designed for use in SOA-based systems is proposed. The broker is built with idea of fuzzy control. The functional and non-functional request requirements in conjunction with monitoring of execution and communication links are used to distribute requests. Decisions are made with use of fuzzy-neural network.
Uniform access to clinical data in a distributed environment. Radiology
International Nuclear Information System (INIS)
Adelhard, K.; Swoboda, N.; Nissen-Meyer, S.; Reiser, M.
1999-01-01
Purpose: Providing medical reports on wards and ambulatory settings in electronic form can improve the quality of health care delivery. Radiology was chosen as an example to demonstrate how to implement uniform access to clinical data in a hospital. Method: Medical professionals at the university hospital in Munich, Grosshadern, have access to all radiological reports of their patients. Web browsers are used as a front end. A centralized administration of users and patients is in place. Results: Centralized access control and patient selection guarantee uniform access to all applicable data via intranet and controls access rights. The high acceptance of this service is reflected by the high number of 150 requests per day. Discussion: Access to radiological reports within the Grosshadern University Clinics was enabled via web browsers in a short time. The high acceptance of the system also proves its easy use. Integration of the system in a centralized user and patient identification system supports the unified access to clinical data. (orig.) [de
National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.
76 FR 67440 - Market Access Agreement
2011-11-01
... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of Draft Second Amended and Restated Market Access Agreement; request for comments. SUMMARY: The... Market Access Agreement (the ``Restated MAA'') is entered into among AgFirst Farm Credit Bank, AgriBank...
44 CFR 6.30 - Form of requests.
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Form of requests. 6.30 Section 6.30 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF... manager, at his discretion, may accept oral requests for access subject to verification of identity. ...
International Nuclear Information System (INIS)
Stanek, M.
1995-01-01
The SLC Control system at SLAC has evolved into a powerful tool for operation of the accelerator and for troubleshooting the unique problems encountered in extracting maximum performance from the SLC. The evolution has included the development of many custom applications and user interface features generated from accelerator operator and accelerator physicist requests. These applications are written and maintained primarily by the Controls Software Engineering group, and not by the users themselves. The process of developing and supporting user requested control systems applications at SLAC is described, including the effects of organizational structure, formal and informal procedures, and control system architecture
32 CFR 1801.21 - Processing requests for access to or amendment of records.
2010-07-01
... NATIONAL COUNTERINTELLIGENCE CENTER PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Action On Privacy Act... whether the requester cites one Act in the request, both, or neither. This action is taken in order to..., in the form of a final written response, shall so inform the requester and advise of his or her right...
Groupe ST/HM
2002-01-01
A new EDH document entitled 'Transport/Handling Request' will be in operation as of Monday, 11th February 2002, when the corresponding icon will be accessible from the EDH desktop, together with the application instructions. This EDH form will replace the paper-format transport/handling request form for all activities involving the transport of equipment and materials. However, the paper form will still be used for all vehicle-hire requests. The introduction of the EDH transport/handling request form is accompanied by the establishment of the following time limits for the various services concerned: 24 hours for the removal of office items, 48 hours for the transport of heavy items (of up to 6 metric tons and of standard road width), 5 working days for a crane operation, extra-heavy transport operation or complete removal, 5 working days for all transport operations relating to LHC installation. ST/HM Group, Logistics Section Tel: 72672 - 72202
12 CFR 404.18 - Requests for correction of records.
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Requests for correction of records. 404.18 Section 404.18 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.18 Requests for correction of records. (a) Form. Requests for...
Request queues for interactive clients in a shared file system of a parallel computing system
Bent, John M.; Faibish, Sorin
2015-08-18
Interactive requests are processed from users of log-in nodes. A metadata server node is provided for use in a file system shared by one or more interactive nodes and one or more batch nodes. The interactive nodes comprise interactive clients to execute interactive tasks and the batch nodes execute batch jobs for one or more batch clients. The metadata server node comprises a virtual machine monitor; an interactive client proxy to store metadata requests from the interactive clients in an interactive client queue; a batch client proxy to store metadata requests from the batch clients in a batch client queue; and a metadata server to store the metadata requests from the interactive client queue and the batch client queue in a metadata queue based on an allocation of resources by the virtual machine monitor. The metadata requests can be prioritized, for example, based on one or more of a predefined policy and predefined rules.
O'Brien, K.; Hankin, S.; Mendelssohn, R.; Simons, R.; Smith, B.; Kern, K. J.
2013-12-01
The Observing System Monitoring Center (OSMC), a project funded by the National Oceanic and Atmospheric Administration's Climate Observations Division (COD), exists to join the discrete 'networks' of In Situ ocean observing platforms -- ships, surface floats, profiling floats, tide gauges, etc. - into a single, integrated system. The OSMC is addressing this goal through capabilities in three areas focusing on the needs of specific user groups: 1) it provides real time monitoring of the integrated observing system assets to assist management in optimizing the cost-effectiveness of the system for the assessment of climate variables; 2) it makes the stream of real time data coming from the observing system available to scientific end users into an easy-to-use form; and 3) in the future, it will unify the delayed-mode data from platform-focused data assembly centers into a standards- based distributed system that is readily accessible to interested users from the science and education communities. In this presentation, we will be focusing on the efforts of the OSMC to provide interoperable access to the near real time data stream that is available via the Global Telecommunications System (GTS). This is a very rich data source, and includes data from nearly all of the oceanographic platforms that are actively observing. We will discuss how the data is being served out using a number of widely used 'web services' (including OPeNDAP and SOS) and downloadable file formats (KML, csv, xls, netCDF), so that it can be accessed in web browsers and popular desktop analysis tools. We will also be discussing our use of the Environmental Research Division's Data Access Program (ERDDAP), available from NOAA/NMFS, which has allowed us to achieve our goals of serving the near real time data. From an interoperability perspective, it's important to note that access to the this stream of data is not just for humans, but also for machine-to-machine requests. We'll also delve into how we
2013-04-12
... Collection Request: Comment Request; Great Lakes Accountability System (Renewal) AGENCY: Environmental... an information collection request (ICR), ``Great Lakes Accountability System'' (EPA ICR No. 2379.02... using www.regulations.gov (our preferred method) or by mail to: Great Lakes Accountability System, Attn...
Easy Access: Auditing the System Network
Wiech, Dean
2013-01-01
In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…
75 FR 80861 - Agency Forms Submitted for OMB Review, Request for Comments
2010-12-23
... collection techniques or other forms of information technology. Comments to RRB or OIRA must contain the OMB..., information needed to ensure secure system access from employers who voluntarily opt to use the RRB's Internet... (RRB) is submitting five (5) Information Collection Requests (ICR) to the Office of Information and...
Guidelines for Outsourcing Remote Access.
Hassler, Ardoth; Neuman, Michael
1996-01-01
Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…
22 CFR 301.3 - Action on requests for declassification review.
2010-04-01
... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Action on requests for declassification review. 301.3 Section 301.3 Foreign Relations PEACE CORPS PUBLIC ACCESS TO CLASSIFIED MATERIAL § 301.3 Action on requests for declassification review. (a) The Director of Security shall present each request for...
External access to ALICE controls conditions data
International Nuclear Information System (INIS)
Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A
2014-01-01
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.
76 FR 11433 - Notice of Proposed Information Collection Requests
2011-03-02
... information technology. Dated: February 24, 2011. Darrin A. King, Director, Information Collection Clearance... school libraries. Copies of the proposed information collection request may be accessed from http... DEPARTMENT OF EDUCATION Notice of Proposed Information Collection Requests AGENCY: Department of...
2011-03-25
...] The National Antimicrobial Resistance Monitoring System Strategic Plan 2011-2015; Request for Comments..., FDA requested comments on a document for the National Antimicrobial Resistance Monitoring System....fda.gov/AnimalVeterinary/SafetyHealth/AntimicrobialResistance/NationalAntimicrobialResistance...
An Extended Two-Phase Method for Accessing Sections of Out-of-Core Arrays
Directory of Open Access Journals (Sweden)
Rajeev Thakur
1996-01-01
Full Text Available A number of applications on parallel computers deal with very large data sets that cannot fit in main memory. In such applications, data must be stored in files on disks and fetched into memory during program execution. Parallel programs with large out-of-core arrays stored in files must read/write smaller sections of the arrays from/to files. In this article, we describe a method for accessing sections of out-of-core arrays efficiently. Our method, the extended two-phase method, uses collective l/O: Processors cooperate to combine several l/O requests into fewer larger granularity requests, to reorder requests so that the file is accessed in proper sequence, and to eliminate simultaneous l/O requests for the same data. In addition, the l/O workload is divided among processors dynamically, depending on the access requests. We present performance results obtained from two real out-of-core parallel applications – matrix multiplication and a Laplace's equation solver – and several synthetic access patterns, all on the Intel Touchstone Delta. These results indicate that the extended two-phase method significantly outperformed a direct (noncollective method for accessing out-of-core array sections.
50 CFR 600.415 - Access to statistics.
2010-10-01
... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Access to statistics. 600.415 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Confidentiality of Statistics § 600.415 Access to statistics. (a) General. In determining whether to grant a request for access to confidential...
50 CFR 260.58 - Accessibility for sampling.
2010-10-01
... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Accessibility for sampling. 260.58 Section... Fishery Products for Human Consumption Sampling § 260.58 Accessibility for sampling. Each applicant shall cause the processed products for which inspection is requested to be made accessible for proper sampling...
CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK
Directory of Open Access Journals (Sweden)
V. S. Kolomoitcev
2016-01-01
Full Text Available We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls. The scheme is considered in view of the fact that the system has got common areas of removing threats in the channel for different means of protection. Parameters of average residence time of request in the system and its reliability were obtained for each variant of access scheme. Based on the results, comparison of the ways of design for access scheme was carried out between themselves and with the standard access scheme (with onefirewall. It was found out that design of access scheme with a single group of routers for the whole system has better performance and reliability than the other variants of "Direct Connection" access scheme.
LANSCE personnel access control system (PACS)
International Nuclear Information System (INIS)
Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.
1997-01-01
The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described
Internet-accessible real-time weather information system
Digital Repository Service at National Institute of Oceanography (India)
Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.
An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...
Access to Information and Privacy | IDRC - International ...
International Development Research Centre (IDRC) Digital Library (Canada)
As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...
Access Control Management for SCADA Systems
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
Request for All - Generalized Request Framework for PhEDEx
Huang, C-H; Ratnikova, N.; Sanchez-Hernandez, A.; Zhang, X.; Magini, N.
2014-01-01
PhEDEx has been serving CMS community since 2004 as the data broker. Every PhEDEx operation is initiated by a request, such as request to move data, request to delete data, and so on. A request has it own life cycle, including creation, approval, notification, and book keeping and the details depend on its type. Currently, only two kinds of requests, transfer and deletion, are fully integrated in PhEDEx. They are tailored specifically to the operations workflows. To be able to serve a new type of request it generally means a fair amount of development work.After several years of operation, we have gathered enough experience to rethink the request handling in PhEDEx. Generalized Request Project is set to abstract such experience and come up with a request system which is not tied into current workflow yet it is general enough to accommodate current and future requests.The challenges are dealing with different stages in a requests life cycle, complexity of approval process and complexity of the ability and auth...
28 CFR 513.62 - Freedom of Information Act requests by former inmates.
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Freedom of Information Act requests by... GENERAL MANAGEMENT AND ADMINISTRATION ACCESS TO RECORDS Release of Information Freedom of Information Act Requests for Information § 513.62 Freedom of Information Act requests by former inmates. Former federal...
22 CFR 301.2 - Requests for mandatory declassification review.
2010-04-01
... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Requests for mandatory declassification review. 301.2 Section 301.2 Foreign Relations PEACE CORPS PUBLIC ACCESS TO CLASSIFIED MATERIAL § 301.2 Requests for mandatory declassification review. (a) All information originally classified by the Peace...
Computer access security code system
Collins, Earl R., Jr. (Inventor)
1990-01-01
A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.
Summaries of completed Access to Information requests in 2013 ...
International Development Research Centre (IDRC) Digital Library (Canada)
2010-01-01
Summary: Provide a list of all projects funded by the IDRC and deal with any of the following issues since January 1, 2010: Kyoto Protocol, Greenhouse Gas Emissions, Carbon Taxes/Pricing, Oilsands, Pipelines or Tankers. Disposition: Total Disclosure Number of Pages Disclosed: 84. Request Number: A-2013-06
Mandatory and Location-Aware Access Control for Relational Databases
Decker, Michael
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
50 CFR 660.316 - Open access fishery-observer requirements.
2010-10-01
... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-observer requirements... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...(s) access to, and the use of, the vessel's navigation equipment and personnel, on request, to...
Research of user access control for networked manufacturing system
Institute of Scientific and Technical Information of China (English)
ZHENG Xiao-lin; LEI Yu; CHEN De-ren
2006-01-01
An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.
10 CFR 1703.106 - Requests for waiver or reduction of fees.
2010-01-01
... provided free of charge or provided for an access or publication fee; and (8) Describe any commercial or... 10 Energy 4 2010-01-01 2010-01-01 false Requests for waiver or reduction of fees. 1703.106 Section... Requests for waiver or reduction of fees. (a) The Board shall collect fees for record requests made under...
Directory of Open Access Journals (Sweden)
A. V. Skrypnikov
2017-01-01
Full Text Available The article is devoted to the method of experimental estimation of parameters of functioning of standard information protection systems from unauthorized access, certified, widely used in organizations operating automated information systems. In the course of the experiment, statistical data were evaluated in the dynamics of the functioning of information security systems against unauthorized access in automated information systems. Registration of the parameters for the execution time of protective protection functions was carried out using a special utility called ProcessMonitor from the Sysinternals suite of utilities used to filter processes and threads. The loading of the processor and main memory of the computer with the use of special software, specially designed for performing experimental research, simulates the operation of GIS in real-world work for its intended purpose. A special software for simulating the work of a system with high load is developed in "VisualStudio 2015" within the framework of "ConsoleApplication". At the same time, the processor is loaded at a level of 50-70% and 60-80% of the operative memory. The obtained values of the time of implementation of protective functions in conditions of high utilization of resources of computer facilities for their intended purpose will allow us to assess the conflict and dynamic properties of the GIS. In the future, the obtained experimental estimates can be used to develop a model of information security in automated information systems, as well as in the formation of quality requirements (resource intensity, response time to the user's request, availability, etc.. Also, the results of the computational experiment in the future can be used to develop a software package for assessing the dynamic performance of information security systems against unauthorized access in automated information systems
Computer Security Systems Enable Access.
Riggen, Gary
1989-01-01
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
International Nuclear Information System (INIS)
Bauerdick, L A T; Bloom, K; Bockelman, B; Bradley, D C; Dasu, S; Dost, J M; Sfiligoi, I; Tadel, A; Tadel, M; Wuerthwein, F; Yagil, A
2014-01-01
Following the success of the XRootd-based US CMS data federation, the AAA project investigated extensions of the federation architecture by developing two sample implementations of an XRootd, disk-based, caching proxy. The first one simply starts fetching a whole file as soon as a file open request is received and is suitable when completely random file access is expected or it is already known that a whole file be read. The second implementation supports on-demand downloading of partial files. Extensions to the Hadoop Distributed File System have been developed to allow for an immediate fallback to network access when local HDFS storage fails to provide the requested block. Both cache implementations are in pre-production testing at UCSD.
Yi, Meng; Chen, Qingkui; Xiong, Neal N
2016-11-03
This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
A new access scheme in OFDMA systems
Institute of Scientific and Technical Information of China (English)
GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping
2006-01-01
This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.
36 CFR 1250.24 - Will you accept a FOIA request through email?
2010-07-01
... request through email? 1250.24 Section 1250.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Access Records Under FOIA § 1250.24 Will you accept a FOIA request through email? Yes, send email FOIA... of your email message that you are sending a FOIA request. The body of the message must contain all...
7 CFR 52.35 - Accessibility for sampling.
2010-01-01
... 7 Agriculture 2 2010-01-01 2010-01-01 false Accessibility for sampling. 52.35 Section 52.35... PROCESSED FOOD PRODUCTS 1 Regulations Governing Inspection and Certification Sampling § 52.35 Accessibility for sampling. Each applicant shall cause the processed products for which inspection is requested to...
Information-flow-based Access Control for Virtualized Systems
Directory of Open Access Journals (Sweden)
Dmitriy Aleksandrovich Postoev
2014-12-01
Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.
2013-09-27
... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated... through the Federal Docket Management System (FDMS) at www.Regulations.gov or to Nancy J. Kessinger...
WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission
Achara , Jagdish Prasad; Cunche , Mathieu; Roca , Vincent; Francillon , Aurélien
2014-01-01
A short version has been accepted for publication in: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC'14) Oxford, United Kingdom, July 23rd -- 25th 2014; On Android, users can choose to install an application, or not, based on the permissions it requests. These permissions are later enforced on the application by the system, e.g., when accessing sensitive user data. In this work, we focus on the access to Wi-Fi related information, which is protected by the A...
Directory of Open Access Journals (Sweden)
Elizabeth Margaret Stovold
2017-09-01
Full Text Available A Review of: Swab, M., & Romme, K. (2016. Scholarly sharing via Twitter: #icanhazpdf requests for health sciences literature. Journal of the Canadian Health Libraries Association, 37(1, 6-11. http://dx.doi.org/10.5596/c16-009 Abstract Objective – To analyze article sharing requests for health sciences literature on Twitter, received through the #icanhazpdf protocol. Design – Social media content analysis. Setting – Twitter. Subjects – 302 tweets requesting health sciences articles with the #icanhazpdf tag. Methods – The authors used a subscription service called RowFeeder to collect public tweets posted with the hashtag #icanhazpdf between February and April 2015. Rowfeeder recorded the Twitter user name, location, date and time, URL, and content of the tweet. The authors excluded all retweets and then each reviewed one of two sets. They recorded the geographic region and affiliation of the requestor, whether the tweet was a request or comment, type of material requested, how the item was identified, and if the subject of the request was health or non-health. Health requests were further classified using the Scopus subject category of the journal. A journal could be classified with more than one category. Any uncertainties during the coding process were resolved by both authors reviewing the tweet and reaching a consensus. Main results – After excluding all the retweets and comments, 1079 tweets were coded as heath or non-health related. A final set of 302 health related requests were further analyzed. Almost all the requests were for journal articles (99%, n=300. The highest-ranking subject was medicine (64.9%, n=196, and the lowest was dentistry (0.3%, n=1. The most common article identifier was a link to the publisher’s website (50%, n=152, followed by a link to the PubMed record (22%, n=67. Articles were also identified by citation information (11%, n=32, DOI (5%, n=14, a direct request to an individual (3%, n=9, another method
2010-10-04
... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...
2010-10-06
... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... Payment Request for the VA Funding Fee Payment System (VA FFPS); A Computer Generated Funding Fee Receipt... information through the Federal Docket Management System (FDMS) at http://www.Regulations.gov or to Nancy J...
Design Strategies for Efficient Access to Mobile Device Users via Amazon Mechanical Turk
Jacques, Jason; Kristensson, Per Ola
2017-01-01
It is often challenging to access a pool of mobile device users and instruct them to perform an interactive task. Yet such data is often vital to provide design insight at various stages of the design process of a mobile application, service or system. We propose accessing a pool of mobile device users via the microtask market Amazon Mechanical Turk (MTurk). While mobile device users are still a minority on MTurk, they provide unique opportunities for requesters. Not only does catering to mob...
78 FR 11814 - Submission for OMB Review; Comment Request
2013-02-20
... USDA customer desiring access to online services or applications that require user eAuthentication. The... number. Office of the Chief Information Officer Title: USDA eAuthentication Service Customer Registration... Agency customers, as well as employees who request access to protected USDA Web applications and services...
Access to scientific publications: the scientist's perspective.
Directory of Open Access Journals (Sweden)
Yegor Voronin
Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However
Nuclear information access system
International Nuclear Information System (INIS)
Ham, C. H.; Yang, M. H.; Yoon, S. W.
1998-01-01
The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime
A Model for Trust-based Access Control and Delegation in Mobile Clouds (Post Print)
2013-10-01
the access-granter knowing the identity of access requester beforehand and authenticating the requester, can no longer be applied. Mobile Wallet Cloud...TktC) for a reservation and con- tacts the user’s mobile wallet provider (MobWC) to purchase the ticket from TktC. For accessing different services...receiving regular services. For example, the human user in our scenario can be an elite member with the mobile wallet service provider that
Directory of Open Access Journals (Sweden)
Meng Yi
2016-11-01
Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.
Yoo, Sooyoung; Kim, Seok; Lee, Seungja; Lee, Kee-Hyuck; Baek, Rong-Min; Hwang, Hee
2013-05-01
Although the adoption rates for Electronic Health Records (EHRs) are growing, significant opportunities for further advances in EHR system design remain. The goal of this study was to identify issues that should be considered in the design process for the successful development of future systems by analyzing end users' service requests gathered during a recent three-year period after a comprehensive EHR system was implemented at Seoul National University's Bundang Hospital in South Korea. Data on 11,400 service requests from end users of the EHR system made from 2008 through 2010 were used in this study. The requests were categorized as program modification/development, data request, insurance-fee identification/generation, patient-record merging, or other. The authors further subcategorized the requests for program modification/development into the following nine areas of concern: (1) indicators and statistics, (2) patient safety and quality of care, (3) special task-oriented functionalities, (4) ease of use and user interface, (5) system speed, (6) interoperability and integration, (7) privacy and security, (8) customer service, and (9) miscellaneous. The system users were divided into four groups--direct care, care support, administrative/insurance, and general management--to identify each group's needs and concerns. The service requests for program modification/development, data request, insurance-fee identification/generation, patient-record merging, and other issues constituted approximately 49.2%, 33.9%, 11.4%, 4.0%, and 1.5% of the total data set, respectively. The number of data-request service requests grew over the three years studied. Different groups of users were found to have different concerns according to their activities and tasks. Within the program-modification/development category, end users were most frequently concerned with ease of use and user interface (38.1% of the total) and special task-oriented functionalities (29.3% of the total) in
Role Based Access Control system in the ATLAS experiment
International Nuclear Information System (INIS)
Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M
2011-01-01
The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.
76 FR 56499 - Financial Access Activities; Comment Request.
2011-09-13
... development of sustainable financial services and products related to accounts? Are there opportunities for... Wall Street Reform and Consumer Protection Act (the Act), to expand access to mainstream financial... develop and provide account products and services that are appropriate and accessible for low- and...
Role Based Access Control system in the ATLAS experiment
Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G
2011-01-01
The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...
Role Based Access Control System in the ATLAS Experiment
Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F
2010-01-01
The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...
19 CFR 201.17 - Procedures for requesting access to records.
2010-04-01
... to inform the public about the government activity involved in the request, beyond the public's right....17 Section 201.17 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION Availability of Information to the Public Pursuant to 5 U.S.C. 552 § 201.17 Procedures...
The NCAR Research Data Archive's Hybrid Approach for Data Discovery and Access
Schuster, D.; Worley, S. J.
2013-12-01
ready. External users are provided with RDA server generated scripts to download the resulting request output. Similarly they can download native dataset collection files or partial files using Wget or cURL based scripts supplied by the RDA server. Internal users can access the resulting request output or native dataset collection files directly from centralized file systems.
12 CFR 404.19 - Request for accounting of record disclosures.
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Request for accounting of record disclosures... Access to Records Under the Privacy Act of 1974 § 404.19 Request for accounting of record disclosures. (a... maintain an accurate accounting of the date, nature, and purpose of each external disclosure of a record...
Legal access to medications: a threat to Brazil's public health system?
Chieffi, Ana Luiza; Barradas, Rita De Cassia Barata; Golbaum, Moisés
2017-07-19
In Brazil, health is fundamental human right guaranteed by the Constitution of 1988, which created the Brazilian Universal Health System (Sistema Único de Saúde - SUS). The SUS provides medications for outpatient care via policy of pharmaceutical assistance (PA) programmes. Despite the advances in PA policies which include the improvement in access to medications, there has been a significant increase in lawsuits related to health products and services. This study aimed to characterize the medication processes filed between 2010 and 2014 against the Secretary of State for Health of São Paulo (State Health Department of São Paulo - SES/SP), in Brazil, following PA policies. This descriptive study used secondary data on medication lawsuits filed against the SES/SP between 2010 and 2014. The data source was the S-Codes computerized system. In the period evaluated, the number of lawsuits filed concerning health-related products increased approximately 63%; requests for medications were predominant. Approximately 30% of the medications involved in court proceedings were supplied via PA programmes. With regard to medications supplied via specialized component, 81.3% were prescribed in disagreement with the protocols published by the Ministry of Health. Insulin glargine was the most requested medication (6.3%), followed by insulin aspart (3.3%). Because there is no scientific evidence that either of these medicines is superior for the treatment of diabetes, neither of them has been incorporated into the SUS by the National Commission for Technology Incorporation. The judicial data showed that most of the lawsuits involved normal proceedings (i.e., individual demands), were filed by private lawyers, and named the State of São Paulo as the sole defendant, demonstrating the individual nature of these claims. The data indicate inequality in the distribution between the number of cases and lawyers and the number of lawsuits and prescribers, evidencing the concentration of
2010-12-16
... Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt.... 2900-0474.'' SUPPLEMENTARY INFORMATION: Title: Create Payment Request for the VA Funding Fee Payment System (VA FFPS); a Computer Generated Funding Fee Receipt, VA Form 26-8986. OMB Control Number: 2900...
Analysis of Access Control Policies in Operating Systems
Chen, Hong
2009-01-01
Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…
Performance estimates for personnel access control systems
International Nuclear Information System (INIS)
Bradley, R.G.
1980-10-01
Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems
Access control within military C4ISR systems
Maschino, Mike
2003-07-01
Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.
2012-11-06
... purposes. There are no capital, operating, and/or maintenance costs to the respondents. There are two...) Data Access Request. Type of Information Collection Request: 0925-NEW. Need and Use of Information.... Frequency of Response: Once per request. Affected Public: Individuals. Type of Respondents: Researchers...
NESDIS OSPO Data Access Policy and CRM
Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.
2012-12-01
The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.
42 CFR 420.303 - HHS criteria for requesting books, documents, and records.
2010-10-01
... 42 Public Health 3 2010-10-01 2010-10-01 false HHS criteria for requesting books, documents, and... HEALTH AND HUMAN SERVICES (CONTINUED) MEDICARE PROGRAM PROGRAM INTEGRITY: MEDICARE Access to Books, Documents, and Records of Subcontractors § 420.303 HHS criteria for requesting books, documents, and records...
Safety testing for LHC access system
Valentini, F; Ninin, P; Scibile, S
2008-01-01
In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of systemâs models through an automatic systemâs state space exploration against some property formulas.
2012-01-01
VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation. ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified. For further information, please contact Evelyne Delucinge.
Highball: A high speed, reserved-access, wide area network
Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.
1990-01-01
A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.
Contraceptive challenges experienced by women who requested ...
African Journals Online (AJOL)
... of contraceptives over weekends and during lunch breaks could enable more women to prevent unwanted pregnancies, reducing the number of requests for TOP services. Keywords: abortions; accessibility of contraceptives; contraceptive challenges; contraceptives' side-effects; emergency contraceptives; termination of ...
The public right of access to information on nuclear energy under the Spanish legal system
International Nuclear Information System (INIS)
Baena del Alcazar, M.
2003-01-01
About the right of access to information under the Community Directive in Spain, the freedom of action of the Member state is evoked. The differences between the Constitution and the law 30/1992, the regulation under law 38/1995, the implementation of Community Law and the case law are discussed. The specific question of inspection reports is finally, seen. Where information is to be refused, the refusal should not be based on commercial or industrial confidentiality, a case in connection with which the legislation mentions spills and waste. Decisions should not be based on ambiguities and that any refusal should be justified on general grounds, by the unreasonableness of the request, by the generic formulation of the request, or by the damage to the environment itself, which should not be confused with the public alarm created. (N.C.)
Lu, Xiaodong; Mori, Kinji
The market and users' requirements have been rapidly changing and diversified. Under these heterogeneous and dynamic situations, not only the system structure itself, but also the accessible information services would be changed constantly. To cope with the continuously changing conditions of service provision and utilization, Faded Information Field (FIF) has been proposed, which is a agent-based distributed information service system architecture. In the case of a mono-service request, the system is designed to improve users' access time and preserve load balancing through the information structure. However, with interdependent requests of multi-service increasing, adaptability and timeliness have to be assured by the system. In this paper, the relationship that exists among the correlated services and the users' preferences for separate and integrated services is clarified. Based on these factors, the autonomous preference-aware information services integration technology to provide one-stop service for users multi-service requests is proposed. As compared to the conventional system, we show that proposed technology is able to reduce the total access time.
Effect Through Broadcasting System Access Point For Video Transmission
Directory of Open Access Journals (Sweden)
Leni Marlina
2015-08-01
Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.
Samples and data accessibility in research biobanks: an explorative survey
Directory of Open Access Journals (Sweden)
Marco Capocasa
2016-02-01
Full Text Available Biobanks, which contain human biological samples and/or data, provide a crucial contribution to the progress of biomedical research. However, the effective and efficient use of biobank resources depends on their accessibility. In fact, making bio-resources promptly accessible to everybody may increase the benefits for society. Furthermore, optimizing their use and ensuring their quality will promote scientific creativity and, in general, contribute to the progress of bio-medical research. Although this has become a rather common belief, several laboratories are still secretive and continue to withhold samples and data. In this study, we conducted a questionnaire-based survey in order to investigate sample and data accessibility in research biobanks operating all over the world. The survey involved a total of 46 biobanks. Most of them gave permission to access their samples (95.7% and data (85.4%, but free and unconditioned accessibility seemed not to be common practice. The analysis of the guidelines regarding the accessibility to resources of the biobanks that responded to the survey highlights three issues: (i the request for applicants to explain what they would like to do with the resources requested; (ii the role of funding, public or private, in the establishment of fruitful collaborations between biobanks and research labs; (iii the request of co-authorship in order to give access to their data. These results suggest that economic and academic aspects are involved in determining the extent of sample and data sharing stored in biobanks. As a second step of this study, we investigated the reasons behind the high diversity of requirements to access biobank resources. The analysis of informative answers suggested that the different modalities of resource accessibility seem to be largely influenced by both social context and legislation of the countries where the biobanks operate.
Access safety systems - New concepts from the LHC experience
International Nuclear Information System (INIS)
Ladzinski, T.; Delamare, C.; Luca, S. di; Hakulinen, T.; Hammouti, L.; Havart, F.; Juget, J.F.; Ninin, P.; Nunes, R.; Riesco, T.; Sanchez-Corral Mena, E.; Valentini, F.
2012-01-01
The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hard wired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and the access control includes a state of the art bio-metry check. Building on the LHC experience, new projects targeting the refurbishment of the existing access safety infrastructure in the injector chain have started. This paper summarises the new concepts introduced in the LHC access control and safety systems, discusses the return of experience and outlines the main guiding principles for the renewal stage of the personnel protection systems in the LHC injector chain in a homogeneous manner. (authors)
Task-role-based Access Control Model in Smart Health-care System
Directory of Open Access Journals (Sweden)
Wang Peng
2015-01-01
Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.
Task Delegation Based Access Control Models for Workflow Systems
Gaaloul, Khaled; Charoy, François
e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.
Neuronal interactions between mentalising and action systems during indirect request processing.
van Ackeren, Markus J; Smaragdi, Areti; Rueschemeyer, Shirley-Ann
2016-09-01
Human communication relies on the ability to process linguistic structure and to map words and utterances onto our environment. Furthermore, as what we communicate is often not directly encoded in our language (e.g. in the case of irony, jokes or indirect requests), we need to extract additional cues to infer the beliefs and desires of our conversational partners. Although the functional interplay between language and the ability to mentalise has been discussed in theoretical accounts in the past, the neurobiological underpinnings of these dynamics are currently not well understood. Here, we address this issue using functional imaging (fMRI). Participants listened to question-reply dialogues. In these dialogues, a reply is interpreted as a direct reply, an indirect reply or a request for action, depending on the question. We show that inferring meaning from indirect replies engages parts of the mentalising network (mPFC) while requests for action also activate the cortical motor system (IPL). Subsequent connectivity analysis using Dynamic Causal Modelling (DCM) revealed that this pattern of activation is best explained by an increase in effective connectivity from the mentalising network (mPFC) to the action system (IPL). These results are an important step towards a more integrative understanding of the neurobiological basis of indirect speech processing. © The Author (2016). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.
Integrated Identity and Access Management System for Tertiary ...
African Journals Online (AJOL)
Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...
75 FR 10547 - Application To Renew Information Collection Request OMB No. 2105-0551
2010-03-08
... accessibility or discrimination on the basis of disability. The carriers must also categorize these complaints according to the type of disability and nature of complaint, prepare a summary report annually of the... Control Number: 2105-0551. Type of Request: Renewal of currently approved Information Collection Request...
Perry, Charleen M.; Vansteenberg, Michael E.
1992-01-01
The National Space Science Data Center (NSSDC) has developed an automated data retrieval request service utilizing our Data Archive and Distribution Service (NDADS) computer system. NDADS currently has selected project data written to optical disk platters with the disks residing in a robotic 'jukebox' near-line environment. This allows for rapid and automated access to the data with no staff intervention required. There are also automated help information and user services available that can be accessed. The request system permits an average-size data request to be completed within minutes of the request being sent to NSSDC. A mail message, in the format described in this document, retrieves the data and can send it to a remote site. Also listed in this document are the data currently available.
Characterization of coded random access with compressive sensing based multi user detection
DEFF Research Database (Denmark)
Ji, Yalei; Stefanovic, Cedomir; Bockelmann, Carsten
2014-01-01
The emergence of Machine-to-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and physical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods...... coded random access with CS-MUD on the PHY layer and show very promising results for the resulting protocol....
Task-role-based Access Control Model in Smart Health-care System
Wang Peng; Jiang Lingyun
2015-01-01
As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...
28 CFR 513.63 - Freedom of Information Act requests on behalf of an inmate or former inmate.
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Freedom of Information Act requests on..., DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION ACCESS TO RECORDS Release of Information Freedom of Information Act Requests for Information § 513.63 Freedom of Information Act requests on behalf of...
75 FR 57017 - Venice Gathering System, LLC; Notice of Request Under Blanket Authorization
2010-09-17
... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. CP10-497-000] Venice Gathering System, LLC; Notice of Request Under Blanket Authorization September 10, 2010. Take notice that on September 3, 2010, Venice Gathering System, LLC (VGS), 1000 Louisiana, Suite 4300, Houston, Texas 77002...
2010-03-15
... Allocations System regulation (15 CFR part 700) must retain the records for at least 3 years. II. Method of... Request; Defense Priorities and Allocations System AGENCY: Bureau of Industry and Security, Commerce...: Direct all written comments to Diana Hynek, Departmental Paperwork Clearance Officer, Department of...
78 FR 5785 - Privacy Act of 1974; System of Records
2013-01-28
... identification number), date of birth, gender, race/ethnicity, citizenship, home and work email address... ``Physical access to system location restricted by cipher locks, visitor escort, access rosters, and photo... Activity, ATTN: Freedom of Information Act Requester Service Center, 16401 Centretech Parkway, Aurora...
Chambers, John; Kabir, Saleha; Cajeat, Eric
2014-02-01
Heart disease is difficult to detect clinically and it has been suggested that echocardiography should be available to all patients with possible cardiac symptoms or signs. To analyse the results of 2 years of open access echocardiography for the frequency of structural heart disease according to request. Retrospective database analysis in a teaching hospital open access echocardiography service. Reports of all open access transthoracic echocardiograms between January 2011 and December 2012 were categorised as normal, having minor abnormalities, or significant abnormalities according to the indication. There were 2343 open access echocardiograms performed and there were significant abnormalities in 29%, predominantly valve disease (n = 304, 13%), LV systolic dysfunction (n = 179, 8%), aortic dilatation (n = 80, 3%), or pulmonary hypertension (n = 91, 4%). If echocardiography had been targeted at a high-risk group, 267 with valve disease would have been detected (compared to 127 with murmur alone) and 139 with LV systolic dysfunction (compared to 91 with suspected heart failure alone). Most GP practices requested fewer than 10 studies, but 6 practices requested over 70 studies. Open access echocardiograms are often abnormal but structural disease may not be suspected from the clinical request. Uptake by individual practices is patchy. A targeted expansion of echocardiography in patients with a high likelihood of disease is therefore likely to increase the detection of clinically important pathology.
Privacy Act System of Records: Freedom of Information Act Request and Appeal File, EPA-9
Learn more about the Freedom of Information Act Request and Appeal File System, including who is covered in the system, the purpose of data collection, routine uses for the system's records, and other security procedures.
2013-08-28
... (Principles of Excellence Complaint System Intake); Comment Request AGENCY: Veterans Benefits Administration... published an emergency notice the Principles of Excellence Complaint System Intake on April 30, 2013, that... information through Federal Docket Management System (FDMS) at www.Regulations.gov ; or to Nancy J. Kessinger...
78 FR 76378 - Agency Information Collection Activities: Proposed Request and Comment Request
2013-12-17
... could submit a file. Participating Companies Who Opt for External Testing Environment (ETE) Average... verification service available to private businesses and other requesting parties. To use the system, private businesses and requesting parties must register with SSA and obtain valid consent from SSN number holders...
2010-03-25
... Information Collection: Comment Request; Request Voucher for Grant Payment and Line of Credit Control System... Notice also lists the following information: Title of proposal: Request Voucher for Grant Payment and..., if applicable: 2535-0102. Description of the need for the information and proposed use: Payment...
A Network-Attached Storage System Supporting Guaranteed QoS
Institute of Scientific and Technical Information of China (English)
KONG Hua-feng; YU Sheng-sheng; LU Hong-wei
2005-01-01
We propose a network-attached storage system that can support guaranteed Quality of Service (QoS), called POPNet Storage. The special policy of date access and disk scheduling is enable users to access files quickly and directly with guaranteed QoS in the POPNet Storage. The POPNet Storage implements a measurement-based admission control algorithm (PSMBAC) to determine whether to admit a new data access request stream and admit as many requests as possible while meeting the QoS guarantees to its clients. The data reconstruction algorithms in the POPNet Storage also put more emphasis on data availability and guaranteed QoS, thus it is designed to complete the data recovery as soon as possible and at the same time provide the guaranteed QoS for high-priority data access. The experiment results show that the POPNet Storage can provide more significant performance, reliability, and guaranteed QoS than conventional storage systems.
Kelly, Michael J.
2013-01-01
The Alternative Fuel Effects on Contrails & Cruise Emissions (ACCESS) Project Integration Manager requested in July 2012 that the NASA Engineering and Safety Center (NESC) form a team to independently assess aircraft structural failure hazards associated with the ACCESS experiment and to identify potential flight test hazard mitigations to ensure flight safety. The ACCESS Project Integration Manager subsequently requested that the assessment scope be focused predominantly on structural failure risks to the aircraft empennage raft empennage.
Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems
Hamza, Doha R.
2012-04-01
In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment (ACK) when the received packet is decoded correctly. Lack of ARQ feedback is interpreted as erroneous reception or inactivity. We call this the explicit ACK scheme. The primary receiver may also send a negative acknowledgment (NACK) when the packet is received in error. Lack of ARQ feedback is interpreted as an ACK or no-transmission. This is called the explicit NACK scheme. Under both schemes, when the primary feedback is interpreted as a NACK, the secondary user assumes that there will be retransmission in the next slot and accesses the channel with a certain probability. When the primary feedback is interpreted as an ACK, the secondary user accesses the channel with either one of two probabilities based on the sensing outcome. Under these settings, we find the three optimal access probabilities via maximizing the secondary throughput given a constraint on the primary throughput. We compare the performance of the explicit ACK and explicit NACK schemes and contrast them with schemes based on either sensing or primary ARQ feedback only. © 2012 IEEE.
Access control and privilege management in electronic health record: a systematic literature review.
Jayabalan, Manoj; O'Daniel, Thomas
2016-12-01
This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.
H1DS: A new web-based data access system
Energy Technology Data Exchange (ETDEWEB)
Pretty, D.G., E-mail: david.pretty@anu.edu.au; Blackwell, B.D.
2014-05-15
Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems.
H1DS: A new web-based data access system
International Nuclear Information System (INIS)
Pretty, D.G.; Blackwell, B.D.
2014-01-01
Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems
75 FR 9992 - Agency Information Collection Activities: Proposed Request and Comment Request
2010-03-04
... net earnings from self- employment. During a personal interview, the requesting Social Security field... an in-person interview with SSA employees. Respondents are applicants for the LSDP. Type of Request... Claims System (MCS) screens for in-person field office interview applications, and the Internet-based i...
2010-01-01
... with operations of the DOE or involve unreasonable costs, in terms of money or manpower; and (4) The... individual, the individual may be asked: (1) To designate in writing a physician or mental health... physician or a mental health professional indicating that, in his view, disclosure of the requested records...
Tadel, Matevz
2013-01-01
Following the smashing success of XRootd-based USCMS data-federation, AAA project investigated extensions of the federation architecture by developing two sample implementations of an XRootd, disk-based, caching-proxy. The first one simply starts fetching a whole file as soon as a file-open request is received and is suitable when completely random file access is expected or it is already known that a whole file be read. The second implementation supports on-demand downloading of partial files. Extensions to the Hadoop file-system have been developed to allow foran immediate fallback to network access when local HDFS storage fails to provide the requested block. Tools needed to analyze and to tweak block replication factors and to inject downloaded blocks into a running HDFS installation have also been developed. Both cache implementations are in operation at UCSD and several tests were also performed at UNL and UW-M. Operational experience and applications to automatic storage healing and opportunistic compu...
Human engineering considerations in designing a computerized controlled access security system
International Nuclear Information System (INIS)
Moore, J.W.; Banks, W.W.
1988-01-01
This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad
2011-07-13
... Activities: Proposed Collection; Comment Request; Application for Reimbursement to Local Governments for... view public comments, access the index listing of the contents of the docket, and to access those..., mechanical, or other technological collection techniques or other forms of information technology, e.g...
Chambers, John; Kabir, Saleha; Cajeat, Eric
2014-01-01
Background Heart disease is difficult to detect clinically and it has been suggested that echocardiography should be available to all patients with possible cardiac symptoms or signs. Aim To analyse the results of 2 years of open access echocardiography for the frequency of structural heart disease according to request. Design and setting Retrospective database analysis in a teaching hospital open access echocardiography service. Method Reports of all open access transthoracic echocardiograms between January 2011 and December 2012 were categorised as normal, having minor abnormalities, or significant abnormalities according to the indication. Results There were 2343 open access echocardiograms performed and there were significant abnormalities in 29%, predominantly valve disease (n = 304, 13%), LV systolic dysfunction (n = 179, 8%), aortic dilatation (n = 80, 3%), or pulmonary hypertension (n = 91, 4%). If echocardiography had been targeted at a high-risk group, 267 with valve disease would have been detected (compared to 127 with murmur alone) and 139 with LV systolic dysfunction (compared to 91 with suspected heart failure alone). Most GP practices requested fewer than 10 studies, but 6 practices requested over 70 studies. Conclusion Open access echocardiograms are often abnormal but structural disease may not be suspected from the clinical request. Uptake by individual practices is patchy. A targeted expansion of echocardiography in patients with a high likelihood of disease is therefore likely to increase the detection of clinically important pathology. PMID:24567615
A utility perspective on radiation worker access control systems
International Nuclear Information System (INIS)
Watson, B.A.; Goff, T.E.
1984-01-01
Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included
21 CFR 203.60 - Request and receipt forms, reports, and records.
2010-04-01
... SERVICES (CONTINUED) DRUGS: GENERAL PRESCRIPTION DRUG MARKETING Request and Receipt Forms, Reports, and...; (2) Preserved in accessible and retrievable fashion; and (3) Available to permit copying for purposes...
The ARAC client system: network-based access to ARAC
International Nuclear Information System (INIS)
Leach, M J; Sumikawa, D; Webster, C
1999-01-01
The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components
Gough-Palmer, A L; Burnett, C; Gedroyc, W M
2009-08-01
The aim of this study was to evaluate 12 years of general practitioner (GP) use of open access MRI services at a single London teaching hospital. A retrospective analysis of reports from all GP requests for MRI scans between 1994 and 2005 was performed. The date, scanned body part, and requester details from 1798 scans requested by 209 individual GPs over a continuous 12-year period were recorded. All scans were then graded into four categories based on the severity of reported findings from normal to gross abnormality. Over the study period, GP requests as a percentage of the total (MRI) department workload remained low at approximately 2.6%. Spine, knee and brain requests constituted 86% (n = 1546) of requested scans. 48% (n = 868) of scans were reported as normal or minor degenerative changes only. 26% (n = 466) of scans demonstrated serious pathology that was likely to warrant hospital consultant referral. There was a wide range of scans requested per requester, from 1 to 240 over the period, with an average of 8.5 scans per GP. In conclusion, any department wishing to set up open access to MRI services for GPs could cover the majority of requests by offering spine, knee and brain imaging. The percentage of normal report rates for GP requests is comparable with previous studies of outpatient referrals. A large variation in requesting patterns between GPs suggests the need for increased communication between GPs and imaging departments to optimise use of the service.
Qiao, Liang; Li, Ying; Chen, Xin; Yang, Sheng; Gao, Peng; Liu, Hongjun; Feng, Zhengquan; Nian, Yongjian; Qiu, Mingguo
2015-09-01
There are various medical image sharing and electronic whiteboard systems available for diagnosis and discussion purposes. However, most of these systems ask clients to install special software tools or web plug-ins to support whiteboard discussion, special medical image format, and customized decoding algorithm of data transmission of HRIs (high-resolution images). This limits the accessibility of the software running on different devices and operating systems. In this paper, we propose a solution based on pure web pages for medical HRIs lossless sharing and e-whiteboard discussion, and have set up a medical HRI sharing and e-whiteboard system, which has four-layered design: (1) HRIs access layer: we improved an tile-pyramid model named unbalanced ratio pyramid structure (URPS), to rapidly share lossless HRIs and to adapt to the reading habits of users; (2) format conversion layer: we designed a format conversion engine (FCE) on server side to real time convert and cache DICOM tiles which clients requesting with window-level parameters, to make browsers compatible and keep response efficiency to server-client; (3) business logic layer: we built a XML behavior relationship storage structure to store and share users' behavior, to keep real time co-browsing and discussion between clients; (4) web-user-interface layer: AJAX technology and Raphael toolkit were used to combine HTML and JavaScript to build client RIA (rich Internet application), to meet clients' desktop-like interaction on any pure webpage. This system can be used to quickly browse lossless HRIs, and support discussing and co-browsing smoothly on any web browser in a diversified network environment. The proposal methods can provide a way to share HRIs safely, and may be used in the field of regional health, telemedicine and remote education at a low cost. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
2010-07-21
... Information Collection; Comment Request; NTIA/FCC Web- based Frequency Coordination System AGENCY: National.... Abstract The National Telecommunications and Information Administration (NTIA) hosts a Web-based system...) bands that are shared on a co-primary basis by federal and non-federal users. The Web-based system...
2010-10-01
.... (2) Such accounting shall contain the name and address of the person or agency to whom the disclosure... purpose of this part, the system of accounting for disclosures is not a system of records under the... request access to an accounting of disclosures of a record. The subject individual shall make a request...
Channel Access Algorithm Design for Automatic Identification System
Institute of Scientific and Technical Information of China (English)
Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong
2003-01-01
The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.
Development of an access control system for the LHD experimental hall
International Nuclear Information System (INIS)
Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.
2000-01-01
An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum
Evans, J. D.; Tislin, D.
2017-12-01
Observations from the Joint Polar Satellite System (JPSS) support National Weather Service (NWS) forecasters, whose Advanced Weather Interactive Processing System (AWIPS) Data Delivery (DD) will access JPSS data products on demand from the National Environmental Satellite, Data, and Information Service (NESDIS) Product Distribution and Access (PDA) service. Based on the Open Geospatial Consortium (OGC) Web Coverage Service, this on-demand service promises broad interoperability and frugal use of data networks by serving only the data that a user needs. But the volume, velocity, and variety of JPSS data products impose several challenges to such a service. It must be efficient to handle large volumes of complex, frequently updated data, and to fulfill many concurrent requests. It must offer flexible data handling and delivery, to work with a diverse and changing collection of data, and to tailor its outputs into products that users need, with minimal coordination between provider and user communities. It must support 24x7 operation, with no pauses in incoming data or user demand; and it must scale to rapid changes in data volume, variety, and demand as new satellites launch, more products come online, and users rely increasingly on the service. We are addressing these challenges in order to build an efficient and effective on-demand JPSS data service. For example, on-demand subsetting by many users at once may overload a server's processing capacity or its disk bandwidth - unless alleviated by spatial indexing, geolocation transforms, or pre-tiling and caching. Filtering by variable (/ band / layer) may also alleviate network loads, and provide fine-grained variable selection; to that end we are investigating how best to provide random access into the variety of spatiotemporal JPSS data products. Finally, producing tailored products (derivatives, aggregations) can boost flexibility for end users; but some tailoring operations may impose significant server loads
Database design for Physical Access Control System for nuclear facilities
Energy Technology Data Exchange (ETDEWEB)
Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in
2016-08-15
Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.
Database design for Physical Access Control System for nuclear facilities
International Nuclear Information System (INIS)
Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.
2016-01-01
Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.
40 CFR 264.34 - Access to communications or alarm system.
2010-07-01
... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...
32 CFR 1900.03 - Contact for general information and requests.
2010-07-01
... INTELLIGENCE AGENCY PUBLIC ACCESS TO CIA RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) General § 1900.03... FOIA program at CIA, or to file a FOIA request (or expression of interest), please direct your...
32 CFR 1800.3 - Contact for general information and requests.
2010-07-01
... COUNTERINTELLIGENCE CENTER PUBLIC ACCESS TO NACIC RECORDS UNDER THE FREEDOM OF INFORMATION ACT (FOIA) General § 1800.3... FOIA program at NACIC, or to file a FOIA request (or expression of interest), please direct your...
Need an Information Security in Access Control System?
Directory of Open Access Journals (Sweden)
V. R. Petrov
2011-12-01
Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.
Troubleshooting Requests e-mail Confirmation
TS Department
2004-01-01
In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...
RFID Based Security Access Control System with GSM Technology
Peter Adole; Joseph M. Môm; Gabriel A. Igwue
2016-01-01
The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...
A Fine-Grained Data Access Control System in Wireless Sensor Network
Directory of Open Access Journals (Sweden)
Boniface K. Alese
2015-12-01
Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.
2010-12-02
... DEPARTMENT OF JUSTICE Office of Justice Programs [OJP (NIJ) Docket No. 1534] Interview Room Video System Standard Special Technical Committee Request for Proposals for Certification and Testing Expertise... Interview Room Video System Standard and corresponding certification program requirements. This work is...
Probabilistic models for access strategies to dynamic information elements
DEFF Research Database (Denmark)
Hansen, Martin Bøgsted; Olsen, Rasmus L.; Schwefel, Hans-Peter
In various network services (e.g., routing and instances of context-sensitive networking) remote access to dynamically changing information elements is a required functionality. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or (3) triggered by changes of the information element. This paper develops probabilistic...... for information elements spread over a large number of network nodes are provided, which allow to draw conclusions on scalability properties. The impact of different distribution types for the network delays as well as for the time between changes of the information element on the mismatch probability...
CDC STATE System Tobacco Legislation - Youth Access
U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...
Landa, Robin; Hanley, Gregory P
2016-06-01
Using procedures similar to those of Tiger, Hanley, and Heal (2006), we compared two multiple-schedule variations (S+/S- and S+ only) to treat high-rate requests for edible items in the Picture Exchange Communication System (PECS). Two individuals with autism participated, after they showed persistent requests for edible items after PECS training. Stimulus control was achieved only with the multiple schedule that involved presentation of a discriminative stimulus during reinforcement components and its removal during extinction components (S+ only). Discriminated requests were maintained for the 1 participant who experienced schedule thinning. © 2016 Society for the Experimental Analysis of Behavior.
Towards ubiquitous access of computer-assisted surgery systems.
Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin
2006-01-01
Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.
Free-space optical code-division multiple-access system design
Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.
1993-08-01
This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.
ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY
Directory of Open Access Journals (Sweden)
Maxim DOBRINOIU
2016-05-01
Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.
DEFF Research Database (Denmark)
Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel
2015-01-01
The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...
DEFF Research Database (Denmark)
Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel
The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....
Advance reservation access control using software-defined networking and tokens
Energy Technology Data Exchange (ETDEWEB)
Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry
2018-02-01
Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.
The entire network topology display system of terminal communication access network
An Yi
2016-01-01
Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...
The COROT ground-based archive and access system
Solano, E.; González-Riestra, R.; Catala, C.; Baglin, A.
2002-01-01
A prototype of the COROT ground-based archive and access system is presented here. The system has been developed at LAEFF and it is based on the experience gained at Laboratorio de Astrofisica Espacial y Fisica Fundamental (LAEFF) with the INES (IUE Newly Extracted System) Archive.
CDC STATE System Tobacco Legislation - Youth Access
U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. LegislationâYouth Access. The STATE...
48 CFR 450.303-1 - Contractor requests.
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Contractor requests. 450.303-1 Section 450.303-1 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE CONTRACT MANAGEMENT EXTRAORDINARY CONTRACTUAL ACTIONS Contract Adjustments 450.303-1 Contractor requests. Contractor...
Characterizing Journal Access at a Canadian University Using the Journal Citation Reports Database
Directory of Open Access Journals (Sweden)
Alan Gale
2011-07-01
Full Text Available This article outlines a simple approach to characterizing the level of access to the scholarly journal literature in the physical sciences and engineering offered by a research library, particularly within the Canadian university system. The method utilizes the “Journal Citation Reports” (JCR database to produce lists of journals, ranked based on total citations, in the subject areas of interest. Details of the approach are illustrated using data from the University of Guelph. The examples cover chemistry, physics, mathematics and statistics, as well as engineering. In assessing the level of access both the Library’s current journal subscriptions and backfiles are considered. To gain greater perspective, data from both 2003 and 2008 is analyzed. In addition, the number of document delivery requests, received from University of Guelph Library users in recent years, are also reviewed. The approach taken in characterizing access to the journal literature is found to be simple and easy to implement, but time consuming. The University of Guelph Library is shown to provide excellent access to the current journal literature in the subject areas examined. Access to the historical literature in those areas is also strong. In making these assessments, a broad and comprehensive array of journals is considered in each case. Document delivery traffic (i.e. Guelph requests is found to have decreased markedly in recent years. This is attributed, at least in part, to improving access to the scholarly literature. For the University of Guelph, collection assessment is an ongoing process that must balance the needs of a diverse group of users. The results of analyses of the kind discussed in this article can be of practical significance and value to that process.
2013-08-14
... Information Collection; Comment Request; NTIA/FCC Web- based Frequency Coordination System AGENCY: National... the data by means of an internet web-based system. The applications on the Web site provide real-time... INFORMATION: I. Abstract The National Telecommunications and Information Administration (NTIA) hosts a web...
Archer, Charles J.; Blocksome, Michael A.
2012-12-11
Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.
The D-SDA Reporting System: Reporting and User Access at DLR-EOC
Senft, Johanna; Chereji, Cristian; Mario, Winkler; Katrin, Molch; Eberhard, Mikusch
2015-01-01
In recent years, Earth observation missions and projects have put ever-increasing emphasis on reporting. Detailed reports are being requested on system performance, user behaviour and processing workload. At the same time reporting is gaining significance for data centres’ internal purposes as well – for identifying bottlenecks and optimizing system performance and reliability. For future planning, Earth Observation data centres increasingly need information-based forecasts. Reliable reports ...
22 CFR 212.33 - Procedure for making requests.
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Procedure for making requests. 212.33 Section 212.33 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency... the Public Reading Room identified in § 212.24(a), may be made by a member of the public in writing...
28 CFR 513.12 - Inmate request for record clarification.
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Inmate request for record clarification. 513.12 Section 513.12 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION ACCESS TO RECORDS Production or Disclosure of FBI/NCIC Information § 513.12...
Interlibrary loan in primary access libraries: challenging the traditional view.
Dudden, R F; Coldren, S; Condon, J E; Katsh, S; Reiter, C M; Roth, P L
2000-10-01
up in the ILL hierarchy and highlighting the contribution made by CCML primary access libraries (H2). CCML primary access libraries borrow and lend in amounts that are proportional to their collection size, rather than overtaxing libraries at higher levels in the ILL hierarchy with large numbers of requests (H3). The main limitations of this study were the small sample size and the use of data collected for another purpose, the CCML ILL survey. The findings suggest that there is little evidence to support several commonly held beliefs regarding ILL system use by primary access libraries. In addition to validating the important contributions made by primary access libraries to the national ILL system, baseline data that can be used to benchmark current practice performance are provided.
Distributed Access View Integrated Database (DAVID) system
Jacobs, Barry E.
1991-01-01
The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.
29 CFR 1611.3 - Procedures for requests pertaining to individual records in a record system.
2010-07-01
... or be supplied with copies by mail. (b) Requests pertaining to records contained in a system of... Financial Disclosure Reports and Other Ethics Program Records), OGE/GOVT-2 (Confidential Statements of...
Quantitative analysis of access strategies to remoteinformation in network services
DEFF Research Database (Denmark)
Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted
2006-01-01
of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element......Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...
Optimizing data access in the LAMPF control system
International Nuclear Information System (INIS)
Schaller, S.C.; Corley, J.K.; Rose, P.A.
1985-01-01
The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation
Access control system for two person rule at Rokkasho Reprocessing Plant
International Nuclear Information System (INIS)
Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori
2014-01-01
Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)
Tian, Yuan; Cai, Weihua; Sun, Jianyong; Zhang, Jianguo
2008-03-01
The demand for sharing medical information has kept rising. However, the transmission and displaying of high resolution medical images are limited if the network has a low transmission speed or the terminal devices have limited resources. In this paper, we present an approach based on JPEG2000 Interactive Protocol (JPIP) to browse high resolution medical images in an efficient way. We designed and implemented an interactive image communication system with client/server architecture and integrated it with Picture Archiving and Communication System (PACS). In our interactive image communication system, the JPIP server works as the middleware between clients and PACS servers. Both desktop clients and wireless mobile clients can browse high resolution images stored in PACS servers via accessing the JPIP server. The client can only make simple requests which identify the resolution, quality and region of interest and download selected portions of the JPEG2000 code-stream instead of downloading and decoding the entire code-stream. After receiving a request from a client, the JPIP server downloads the requested image from the PACS server and then responds the client by sending the appropriate code-stream. We also tested the performance of the JPIP server. The JPIP server runs stably and reliably under heavy load.
[Stigma: Barrier to Access to Mental Health Services].
Campo-Arias, Adalberto; Oviedo, Heidi Celina; Herazo, Edwin
2014-01-01
The perceived stigma represents a sociocultural barrier to access mental health services and prevents individuals who meet criteria for a mental disorder the possibility of receiving comprehensive and integred care. To update institutional mechanisms by which stigma related to mental disorders, perceived and perpetrated, acts as a barrier to mental health access. Stigma as a barrier to access to mental health services is due to a reduction in service requests, the allocation of limited resources to mental health, the systematic process of impoverishment of the people who suffer a mental disorder, increased risk of crime, and implications in contact with the legal system, and the invisibility of the vulnerability of these people. Structured awareness and education programs are needed to promote awareness about mental disorders, promote community-based psychosocial rehabilitation, and reintegration into productive life process. In Colombia, the frequency and variables associated with the stigma of mental disorders needs to be studied. This knowledge will enable the implementation of measures to promote the social and labor inclusion of people who meet the criteria for mental disorders. Copyright © 2014 Asociación Colombiana de Psiquiatría. All rights reserved.
A novel IPTV program multiplex access system to EPON
Xu, Xian; Liu, Deming; He, Wei; Lu, Xi
2007-11-01
With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.
Improving Health Care Accessibility: Strategies and Recommendations.
Almorsy, Lamia; Khalifa, Mohamed
2016-01-01
Access time refers to the interval between requesting and actual outpatient appointment. It reflects healthcare accessibility and has a great influence on patient treatment and satisfaction. King Faisal Specialist Hospital and Research Center, Jeddah, Saudi Arabia studied the accessibility to outpatient services in order to develop useful strategies and recommendations for improvement. Utilized, unutilized and no-show appointments were analyzed. It is crucial to manage no-shows and short notice appointment cancellations by preparing a waiting list for those patients who can be called in to an appointment on the same day using an open access policy. An overlapping appointment scheduling model can be useful to minimize patient waiting time and doctor idle time in addition to the sensible use of appointment overbooking that can significantly improve productivity.
Directory of Open Access Journals (Sweden)
Porshnev Sergey
2017-01-01
Full Text Available This work devoted to researching of mathematical model of non-stationary queuing system (NQS. Arrival rate in studied NQS λ(t is similar to rate which observed in practice in a real access control system of objects of mass events. Dependence of number of serviced requests from time was calculated. It is proven that the ratio value of served requests at the beginning of event to all served requests described by a deterministic function, depending on the average service rate μ¯$\\bar \\mu $ and the maximum value of the arrival rate function λ(t.
Directory of Open Access Journals (Sweden)
Ana Lucia Martins de Azevedo
2010-01-01
Full Text Available This study has the purpose of analyzing users' perception of the accessibility to Estratégia Saúde da Família (ESF - Family Health Strategy in its geographical, organizational, socio-cultural and economic dimensions. Process evaluation with qualitative approach through open interview, direct observation and documental analysis was performed in the city of Recife, northeastern Brazil. The main problems were: the deficient referral and counter-referral system; delayed return of laboratory test results; excessive number of families per team; difficulties in scheduling medical consultations; expenditures on medicines. Facilities were observed in the professional-user relationship, as well as in the geographical proximity of the health unit. ESF proved to be a narrow entrance door to Sistema Único de Saúde (SUS - Brazil's National Health System. Therefore, it deserves to be evaluated with a more critical look that takes into account, as a starting point, the needs of individuals who request its actions, as well as the reasoning which guides the actions of the subjects involved in care.
Directory of Open Access Journals (Sweden)
Duangporn Prasertsubpakij
2012-07-01
Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.
Audit-Based Access Control for Electronic Health Records
Dekker, M.A.C.; Etalle, Sandro
2006-01-01
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori
Audit-Based Access Control for Electronic Health Records
Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.
Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori
Easy access to geophysical data sets at the IRIS Data Management Center
Trabant, C.; Ahern, T.; Suleiman, Y.; Karstens, R.; Weertman, B.
2012-04-01
At the IRIS Data Management Center (DMC) we primarily manage seismological data but also have other geophysical data sets for related fields including atmospheric pressure and gravity measurements and higher level data products derived from raw data. With a few exceptions all data managed by the IRIS DMC are openly available and we serve an international research audience. These data are available via a number of different mechanisms from batch requests submitted through email, web interfaces, near real time streams and more recently web services. Our initial suite of web services offer access to almost all of the raw data and associated metadata managed at the DMC. In addition, we offer services that apply processing to the data before it is sent to the user. Web service technologies are ubiquitous with support available in nearly every programming language and operating system. By their nature web services are programmatic interfaces, but by choosing a simple subset of web service methods we make our data available to a very broad user base. These interfaces will be usable by professional developers as well as non-programmers. Whenever possible we chose open and recognized standards. The data returned to the user is in a variety of formats depending on type, including FDSN SEED, QuakeML, StationXML, ASCII, PNG images and in some cases where no appropriate standard could be found a customized XML format. To promote easy access to seismological data for all researchers we are coordinating with international partners to define web service interfaces standards. Additionally we are working with key partners in Europe to complete the initial implementation of these services. Once a standard has been adopted and implemented at multiple data centers researchers will be able to use the same request tools to access data across multiple data centers. The web services that apply on-demand processing to requested data include the capability to apply instrument corrections and
Development of Patient Status-Based Dynamic Access System for Medical Information Systems
Directory of Open Access Journals (Sweden)
Chang Won Jeong
2015-06-01
Full Text Available Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard. This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.
Accessing files in an Internet: The Jade file system
Peterson, Larry L.; Rao, Herman C.
1991-01-01
Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.
Accessing files in an internet - The Jade file system
Rao, Herman C.; Peterson, Larry L.
1993-01-01
Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.
28 CFR 700.11 - Request for access to records.
2010-07-01
... more acceptable forms of identification (such as a driver's license or credit card) bearing his name... OR INFORMATION OF THE OFFICE OF INDEPENDENT COUNSEL Protection of Privacy and Access to Individual...
Optimizing man-machine performance of a personnel access restriction security system
International Nuclear Information System (INIS)
Banks, W.W.; Moore, J.W.
1988-01-01
This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design
Collecting Unsolicited User-Generated Change Requests
2015-12-01
change requests, although the core principles of the steps apply equally to non- software change requests ( Champagne and April, 2014:pp 6-9). The...Capabilities Integration and Development System (JCIDS). JCIDS Manual. Washington: CJCS, 12 February 2015. Champagne , Roger and Alain April. “Software
Small and Medium Enterprises` (SMEs) Access to Finance: Philippines
Aldaba, Rafaelita M.
2012-01-01
Based on a survey of 97 firms in the garments, textiles, automotive, electrical and electronics, and food manufacturing industries; the paper highlights the difficulties faced by small and medium enterprises (SMEs) in accessing finance. For both firms with access to finance as well as those that did not make any finance request, financing obstacles posed as one of the top four serious problems for the growth of their businesses. The survey indicates the continued dependence of SMEs on interna...
Key issues of multiple access technique for LEO satellite communication systems
Institute of Scientific and Technical Information of China (English)
温萍萍; 顾学迈
2004-01-01
The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.
CDC STATE System E-Cigarette Legislation - Youth Access
U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....
A system for success: BMC Systems Biology, a new open access journal.
Hodgkinson, Matt J; Webb, Penelope A
2007-09-04
BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.
78 FR 35610 - Privacy Act of 1974; System of Records
2013-06-13
... Defense. NM05720-1 System name: FOIA Request/Appeal Files and Tracking System (April 2, 2008, 73 FR 17961...: Delete entry and replace with ``Records are accessed by custodian of the record system and by persons... cabinets or rooms, which are not viewable by individuals who do not have a need to know. Computerized...
A Protective Mechanism for the Access Control System in the Virtual Domain
Institute of Scientific and Technical Information of China (English)
Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li
2016-01-01
In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.
Database application research in real-time data access of accelerator control system
International Nuclear Information System (INIS)
Chen Guanghua; Chen Jianfeng; Wan Tianmin
2012-01-01
The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)
Kelly, Michael J.
2013-01-01
The Alternative Fuel Effects on Contrails and Cruise Emissions (ACCESS) Project Integration Manager requested in July 2012 that the NASA Engineering and Safety Center (NESC) form a team to independently assess aircraft structural failure hazards associated with the ACCESS experiment and to identify potential flight test hazard mitigations to ensure flight safety. The ACCESS Project Integration Manager subsequently requested that the assessment scope be focused predominantly on structural failure risks to the aircraft empennage (horizontal and vertical tail). This report contains the Appendices to Volume I.
The request system in Italian interaction
Rossi, G.
2015-01-01
People across the world make requests every day. We constantly rely on others to get by in the small and big practicalities of everyday life, be it getting the salt, moving a sofa, or cooking a meal. It has long been noticed that when we ask others for help we use a wide range of forms drawing on
31 CFR 357.28 - Transaction requests.
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Transaction requests. 357.28 Section 357.28 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... System (Legacy Treasury Direct) § 357.28 Transaction requests. (a) General. Unless otherwise authorized...
Considering User's Access Pattern in Multimedia File Systems
Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern
2002-12-01
Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.
40 CFR 265.34 - Access to communications or alarm system.
2010-07-01
... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...
System Hardening Architecture for Safer Access to Critical Business ...
African Journals Online (AJOL)
System Hardening Architecture for Safer Access to Critical Business Data. ... and the threat is growing faster than the potential victims can deal with. ... in this architecture are applied to the host, application, operating system, user, and the ...
75 FR 38992 - Submission for OMB Review; Comment Request
2010-07-07
...: Education Longitudinal Study (ELS) 2002 Third Follow-up 2011 Field Test Batch Tracing. OMB Number: 1850-0652... years of age. This submission requests OMB's approval for batch tracing for the third follow-up 2011... for OMB review may be accessed from the RegInfo.gov Web site at http://www.reginfo.gov/public/do...
CDC STATE System E-Cigarette Legislation - Youth Access
U.S. Department of Health & Human Services — 1995-2017. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette LegislationâYouth Access....
A New Proposed Cost Model for List Accessing Problem using Buffering
Mohanty, Rakesh; Bhoi, Seetaya; Tripathy, Sasmita
2011-01-01
There are many existing well known cost models for the list accessing problem. The standard cost model developed by Sleator and Tarjan is most widely used. In this paper, we have made a comprehensive study of the existing cost models and proposed a new cost model for the list accessing problem. In our proposed cost model, for calculating the processing cost of request sequence using a singly linked list, we consider the access cost, matching cost and replacement cost. The cost of processing a...
Whalen, Kimberly; Bavuso, Karen; Bouyer-Ferullo, Sharon; Goldsmith, Denise; Fairbanks, Amanda; Gesner, Emily; Lagor, Charles; Collins, Sarah
2016-01-01
To understand requests for nursing Clinical Decision Support (CDS) interventions at a large integrated health system undergoing vendor-based EHR implementation. In addition, to establish a process to guide both short-term implementation and long-term strategic goals to meet nursing CDS needs. We conducted an environmental scan to understand current state of nursing CDS over three months. The environmental scan consisted of a literature review and an analysis of CDS requests received from across our health system. We identified existing high priority CDS and paper-based tools used in nursing practice at our health system that guide decision-making. A total of 46 nursing CDS requests were received. Fifty-six percent (n=26) were specific to a clinical specialty; 22 percent (n=10) were focused on facilitating clinical consults in the inpatient setting. "Risk Assessments/Risk Reduction/Promotion of Healthy Habits" (n=23) was the most requested High Priority Category received for nursing CDS. A continuum of types of nursing CDS needs emerged using the Data-Information-Knowledge-Wisdom Conceptual Framework: 1) facilitating data capture, 2) meeting information needs, 3) guiding knowledge-based decision making, and 4) exposing analytics for wisdom-based clinical interpretation by the nurse. Identifying and prioritizing paper-based tools that can be modified into electronic CDS is a challenge. CDS strategy is an evolving process that relies on close collaboration and engagement with clinical sites for short-term implementation and should be incorporated into a long-term strategic plan that can be optimized and achieved overtime. The Data-Information-Knowledge-Wisdom Conceptual Framework in conjunction with the High Priority Categories established may be a useful tool to guide a strategic approach for meeting short-term nursing CDS needs and aligning with the organizational strategic plan.
General Controls Over the Electronic Document Access System
National Research Council Canada - National Science Library
2000-01-01
...) system as part of the DoD Paper-Free Contracting Initiative. EDA contributes to the initiative by digitizing paper documents and offering web-based read-only access to official contracting, finance and accounting documents...
Learning Task Knowledge from Dialog and Web Access
Directory of Open Access Journals (Sweden)
Vittorio Perera
2015-06-01
Full Text Available We present KnoWDiaL, an approach for Learning and using task-relevant Knowledge from human-robot Dialog and access to the Web. KnoWDiaL assumes that there is an autonomous agent that performs tasks, as requested by humans through speech. The agent needs to “understand” the request, (i.e., to fully ground the task until it can proceed to plan for and execute it. KnoWDiaL contributes such understanding by using and updating a Knowledge Base, by dialoguing with the user, and by accessing the web. We believe that KnoWDiaL, as we present it, can be applied to general autonomous agents. However, we focus on our work with our autonomous collaborative robot, CoBot, which executes service tasks in a building, moving around and transporting objects between locations. Hence, the knowledge acquired and accessed consists of groundings of language to robot actions, and building locations, persons, and objects. KnoWDiaL handles the interpretation of voice commands, is robust regarding speech recognition errors, and is able to learn commands involving referring expressions in an open domain, (i.e., without requiring a lexicon. We present in detail the multiple components of KnoWDiaL, namely a frame-semantic parser, a probabilistic grounding model, a web-based predicate evaluator, a dialog manager, and the weighted predicate-based Knowledge Base. We illustrate the knowledge access and updates from the dialog and Web access, through detailed and complete examples. We further evaluate the correctness of the predicate instances learned into the Knowledge Base, and show the increase in dialog efficiency as a function of the number of interactions. We have extensively and successfully used KnoWDiaL in CoBot dialoguing and accessing the Web, and extract a few corresponding example sequences from captured videos.
2011-12-22
... among nutrition assistance program clients. Among these are steps to support access to fresh fruits and... DEPARTMENT OF AGRICULTURE Food And Nutrition Service Agency Information Collection Activities: Proposed Collection; Comments Request--Nutrition Assistance in Farmers' Markets: Understanding the Shopping...
Leventhal, Jeremy C; Cummins, Jonathan A; Schwartz, Peter H; Martin, Douglas K; Tierney, William M
2015-01-01
Electronic health records (EHRs) are proliferating, and financial incentives encourage their use. Applying Fair Information Practice principles to EHRs necessitates balancing patients' rights to control their personal information with providers' data needs to deliver safe, high-quality care. We describe the technical and organizational challenges faced in capturing patients' preferences for patient-controlled EHR access and applying those preferences to an existing EHR. We established an online system for capturing patients' preferences for who could view their EHRs (listing all participating clinic providers individually and categorically-physicians, nurses, other staff) and what data to redact (none, all, or by specific categories of sensitive data or patient age). We then modified existing data-viewing software serving a state-wide health information exchange and a large urban health system and its primary care clinics to allow patients' preferences to guide data displays to providers. Patients could allow or restrict data displays to all clinicians and staff in a demonstration primary care clinic, categories of providers (physicians, nurses, others), or individual providers. They could also restrict access to all EHR data or any or all of five categories of sensitive data (mental and reproductive health, sexually transmitted diseases, HIV/AIDS, and substance abuse) and for specific patient ages. The EHR viewer displayed data via reports, data flowsheets, and coded and free text data displayed by Google-like searches. Unless patients recorded restrictions, by default all requested data were displayed to all providers. Data patients wanted restricted were not displayed, with no indication they were redacted. Technical barriers prevented redacting restricted information in free textnotes. The program allowed providers to hit a "Break the Glass" button to override patients' restrictions, recording the date, time, and next screen viewed. Establishing patient
A Novel Trip Coverage Index for Transit Accessibility Assessment Using Mobile Phone Data
Directory of Open Access Journals (Sweden)
Zhengyi Cai
2017-01-01
Full Text Available Transit accessibility is an important measure on the service performance of transit systems. To assess whether the public transit service is well accessible for trips of specific origins, destinations, and origin-destination (OD pairs, a novel measure, the Trip Coverage Index (TCI, is proposed in this paper. TCI considers both the transit trip coverage and spatial distribution of individual travel demands. Massive trips between cellular base stations are estimated by using over four-million mobile phone users. An easy-to-implement method is also developed to extract the transit information and driving routes for millions of requests. Then the trip coverage of each OD pair is calculated. For demonstrative purposes, TCI is applied to the transit network of Hangzhou, China. The results show that TCI represents the better transit trip coverage and provides a more powerful assessment tool of transit quality of service. Since the calculation is based on trips of all modes, but not only the transit trips, TCI offers an overall accessibility for the transit system performance. It enables decision makers to assess transit accessibility in a finer-grained manner on the individual trip level and can be well transformed to measure transit services of other cities.
2013-08-20
... to Care Dialysis Pilot Survey and Interview); Activity: Comment Request AGENCY: Veterans Health... Care Dialysis Pilot Survey and Interview)'' in any correspondence. During the comment period, comments... and Interview, VA Form 10-10067. a. Access to Care Questionnaire, VA Form 10-10067. b. Access to Care...
2011-07-08
... Access to VHA Electronic Health Records) Activity; Comment Request AGENCY: Veterans Health Administration... Access to VHA Electronic Health Records, VA Form 10- 0400. OMB Control Number: 2900-0710. Type of Review... were granted power of attorney by veterans who have medical information recorded in VHA electronic...
RFID-Based Monitoring And Access Control System For Parliamentary Campus
Directory of Open Access Journals (Sweden)
Sai Thu Rein Htun
2015-08-01
Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.
The Live Access Server Scientific Product Generation Through Workflow Orchestration
Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.
2006-12-01
The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google
Fast Access Data Acquisition System (FADAS)
International Nuclear Information System (INIS)
Katsman, Vladimir
1998-01-01
Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing
Access Safety Systems – New Concepts from the LHC Experience
Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E
2011-01-01
The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...
Upper bound for energy efficiency in multi-cell fibre-wireless access systems
Koonen, A.M.J.; Popov, M.; Wessing, H.
2013-01-01
Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy
Upper bound for energy efficiency in multi-cell fibre-wireless access systems
DEFF Research Database (Denmark)
Koonen, A.M.J.; Popov, M.; Wessing, Henrik
2013-01-01
Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...
28 CFR 16.74 - Exemption of National Security Division Systems-limited access.
2010-07-01
... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...
2010-06-02
... subject proposal. Payment request vouchers for distribution of grant funds using the automated Voice... Lists the Following Information Title of Proposal: Request Voucher for Grant Payment and Line of Credit... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-46] Request Voucher for Grant...
Cardea: Dynamic Access Control in Distributed Systems
Lepro, Rebekah
2004-01-01
Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.
Hicks, Karen Campbell
2015-01-01
This thesis investigated the communication and decision making process as part of the Systems Engineering practices at the NASA/Marshall Center to determine its level of effectiveness. Data was collected across three change requests to assess how decisions were made, how the decisions were communicated, and whether a process mattered in the formulation and dissemination of those decisions. Data results revealed the comprehensive decision making process for the technical change requests to be effective. Evidence revealed that the process was sufficiently tailored to accommodate the need of each individual technical change which promoted effective communication amongst the stakeholders in the formulation of the strategic decision recommendations elevated to upper management. However, data results also revealed the dissemination of the final decision and approval of the change requests from the higher organizational level down to all stakeholders was less effective. An establishment of a culmination meeting at the end of the change request decision process in which to close the communication loop with all entities would be beneficial.
A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People
Directory of Open Access Journals (Sweden)
Elena Verdú
2017-12-01
Full Text Available Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to SignWriting, a way of writing Sign Language. This system extends the functionality of a general web platform that can provide accessible web content for different needs. This platform has a core component that automatically converts any web page to a web page compliant with level AA of WAI guidelines. Around this core component, different adapters complete the conversion according to the needs of specific users. One adapter is the Deaf People Accessibility Adapter, which provides accessible web content for the Deaf, based on SignWritting. Functionality of this adapter has been extended with the video subtitle translator system. A first prototype of this system has been tested through different methods including usability and accessibility tests and results show that this tool can enhance the accessibility of video content available on the Web for Deaf people.
Visualizing request-flow comparison to aid performance diagnosis in distributed systems.
Sambasivan, Raja R; Shafer, Ilari; Mazurek, Michelle L; Ganger, Gregory R
2013-12-01
Distributed systems are complex to develop and administer, and performance problem diagnosis is particularly challenging. When performance degrades, the problem might be in any of the system's many components or could be a result of poor interactions among them. Recent research efforts have created tools that automatically localize the problem to a small number of potential culprits, but research is needed to understand what visualization techniques work best for helping distributed systems developers understand and explore their results. This paper compares the relative merits of three well-known visualization approaches (side-by-side, diff, and animation) in the context of presenting the results of one proven automated localization technique called request-flow comparison. Via a 26-person user study, which included real distributed systems developers, we identify the unique benefits that each approach provides for different problem types and usage modes.
Lapinsky, Stephen E; Wax, Randy; Showalter, Randy; Martinez-Motta, J Carlos; Hallett, David; Mehta, Sangeeta; Burry, Lisa; Stewart, Thomas E
2004-12-01
Critical care physicians may benefit from immediate access to medical reference material. We evaluated the feasibility and potential benefits of a handheld computer based knowledge access system linking a central academic intensive care unit (ICU) to multiple community-based ICUs. Four community hospital ICUs with 17 physicians participated in this prospective interventional study. Following training in the use of an internet-linked, updateable handheld computer knowledge access system, the physicians used the handheld devices in their clinical environment for a 12-month intervention period. Feasibility of the system was evaluated by tracking use of the handheld computer and by conducting surveys and focus group discussions. Before and after the intervention period, participants underwent simulated patient care scenarios designed to evaluate the information sources they accessed, as well as the speed and quality of their decision making. Participants generated admission orders during each scenario, which were scored by blinded evaluators. Ten physicians (59%) used the system regularly, predominantly for nonmedical applications (median 32.8/month, interquartile range [IQR] 28.3-126.8), with medical software accessed less often (median 9/month, IQR 3.7-13.7). Eight out of 13 physicians (62%) who completed the final scenarios chose to use the handheld computer for information access. The median time to access information on the handheld handheld computer was 19 s (IQR 15-40 s). This group exhibited a significant improvement in admission order score as compared with those who used other resources (P = 0.018). Benefits and barriers to use of this technology were identified. An updateable handheld computer system is feasible as a means of point-of-care access to medical reference material and may improve clinical decision making. However, during the study, acceptance of the system was variable. Improved training and new technology may overcome some of the barriers we
Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems
DEFF Research Database (Denmark)
Handlos, Line Neerup; Olwig, Karen Fog; Bygbjerg, Ib Christian
2016-01-01
unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia......Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely......, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than...
An Information System to Access Status Information of the LHCb Online
International Nuclear Information System (INIS)
Frank, M; Gaspar, C
2012-01-01
The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.
Remote access to information sources in National and university library: development of service
Directory of Open Access Journals (Sweden)
Gorazd Vodeb
2006-01-01
Full Text Available National and University Library established remote access to information sources in september 2004. The article describes implementation and development of the service. Library wanted to offer information sources to users wherever and whenever they would need them. First main evaluation criteria for software selection were integration with existing authentication system and second no need for intervention user side. The EZproxy software from Useful Utilities was chosen. Key step to implementation was establishing communication between software applications EZproxy and COBISS library automation system. Library needed to obtain licence agreements from publishers. Promotion campaign aimed to notify large number of users. Only users of National & University Library were able to use the service. Other users and libraries of Ljubljana University requested to authenticate by credentials of their library. Remote access service was developed further in order to enable authentication for other libraries. We needed to establish authentication and authorisation system and also upgrade and install the communication command procedure on different servers. The data about service usage are presented.
On the Protection of Personal Data in the Access Control System
Directory of Open Access Journals (Sweden)
A. P. Durakovskiy
2012-03-01
Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.
News from ESO Archive Services: Next Generation Request Handler and Data Access Delegation
Fourniol, N.; Lockhart, J.; Suchar, D.; Tacconi-Garman, L. E.; Moins, C.; Bierwirth, T.; Eglitis, P.; Vuong, M.; Micol, A.; Delmotte, N.; Vera, I.; Dobrzycki, A.; Forchì, V.; Lange, U.; Sogni, F.
2012-09-01
We present the new ESO Archive services which improve the electronic data access via the Download Manager and also provide PIs with the option to delegate data access to their collaborators via the Data Access Control.
A System for Web-based Access to the HSOS Database
Lin, G.
Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.
48 CFR 2905.403 - Requests from Members of Congress.
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Requests from Members of Congress. 2905.403 Section 2905.403 Federal Acquisition Regulations System DEPARTMENT OF LABOR ACQUISITION PLANNING PUBLICIZING CONTRACT ACTIONS Release Of Information 2905.403 Requests from Members of Congress...
An Efficient Role and Object Based Access Control Model Implemented in a PDM System
Institute of Scientific and Technical Information of China (English)
HUANG Xiaowen; TAN Jian; HUANG Xiangguo
2006-01-01
An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.
Integrated Access to Solar Observations With EGSO
Csillaghy, A.
2003-12-01
{\\b Co-Authors}: J.Aboudarham (2), E.Antonucci (3), R.D.Bentely (4), L.Ciminiera (5), A.Finkelstein (4), J.B.Gurman(6), F.Hill (7), D.Pike (8), I.Scholl (9), V.Zharkova and the EGSO development team {\\b Institutions}: (2) Observatoire de Paris-Meudon (France); (3) INAF - Istituto Nazionale di Astrofisica (Italy); (4) University College London (U.K.); (5) Politecnico di Torino (Italy), (6) NASA Goddard Space Flight Center (USA); (7) National Solar Observatory (USA); (8) Rutherford Appleton Lab. (U.K.); (9) Institut d'Astrophysique Spatial, Universite de Paris-Sud (France) ; (10) University of Bradford (U.K) {\\b Abstract}: The European Grid of Solar Observations is the European contribution to the deployment of a virtual solar observatory. The project is funded under the Information Society Technologies (IST) thematic programme of the European Commission's Fifth Framework. EGSO started in March 2002 and will last until March 2005. The project is categorized as a computer science effort. Evidently, a fair amount of issues it addresses are general to grid projects. Nevertheless, EGSO is also of benefit to the application domains, including solar physics, space weather, climate physics and astrophysics. With EGSO, researchers as well as the general public can access and combine solar data from distributed archives in an integrated virtual solar resource. Users express queries based on various search parameters. The search possibilities of EGSO extend the search possibilities of traditional data access systems. For instance, users can formulate a query to search for simultaneous observations of a specific solar event in a given number of wavelengths. In other words, users can search for observations on the basis of events and phenomena, rather than just time and location. The software architecture consists of three collaborating components: a consumer, a broker and a provider. The first component, the consumer, organizes the end user interaction and controls requests
Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley
2010-10-01
Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.
Cognitive radio networks medium access control for coexistence of wireless systems
Bian, Kaigui; Gao, Bo
2014-01-01
This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing. From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources. Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems. • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...
A New Key-lock Method for User Authentication and Access Control
Institute of Scientific and Technical Information of China (English)
JI Dongyao; ZHANG Futai; WANG Yumin
2001-01-01
We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.
48 CFR 1305.403 - Requests from Members of Congress.
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Requests from Members of Congress. 1305.403 Section 1305.403 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE... from Members of Congress. Requests from Members of Congress shall be handled in accordance with the...
Helpdesk troubleshooting requests
2006-01-01
We should like to remind all CERN users that the FM Help Desk handles all work and repair requests and other enquiries relating to CERN's tertiary buildings, in particular the following systems and equipment: Electricity and lighting in office buildings, halls and workshops Heating, ventilation and air conditioning in office buildings, halls and workshops Lifts (excluding those in underground areas) Motorised doors Buildings and their equipment: roofs, doors, windows, blinds, etc. Plumbing Toilets Cleaning (all buildings and underground areas) Restaurant equipment Roads and green areas Waste collection The FM Helpdesk is open between 7.30 a.m. and 6.30 p.m. and can be contacted on Tel. 77777 or by e-mail (Fm.Support@cern.ch). Troubleshooting requests, complaints and work requests will only be accepted during these hours. Outside these hours and for any problems relating to non-tertiary buildings or to equipment not included in the above list, please contact the TI Control Room on Tel. 72201, 24 hours a d...
HELPDESK TROUBLESHOOTING REQUESTS
2004-01-01
As of the 08/03/2004 all the repair requests and other communication concerning the CERN tertiary buildings that so far have been transmitted to the TCR via 72201 will be handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equipment as: Electricity and lighting in office buildings, halls and workshops Heating and air conditioning in office buildings, halls and workshops Lifts (excluded the ones in shafts) Motorised doors Building structure and equipment: roofs, doors, windows, blinds, etc. Plumbing Toilets Cleaning (CERN wide) Restaurant equipment Roads and green areas Wastes collection The FM Helpdesk is available between 07h30 and 18h30. Troubleshooting requests, complaints and work requests will only be accepted during these opening hours. Outside these opening hours and for any problem in a machine building or on equipment that is ...
Access to justice in the Convention on Rights system
Gerards, J.H.; Glas, L.R.
2017-01-01
The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference
2013-04-01
... to act as toxicants to the developing or adult nervous systems. Request for Information 1... American Industry Classification System (NAICS) code, and size and type of business (e.g., 8(a), HUBZone...
78 FR 14297 - Privacy Act of 1974; System of Records
2013-03-05
... name, address, phone number, birth date, and Social Security Number (SSN).'' Authority for maintenance... storage media.'' * * * * * System manager(s) and address: Delete entry and replace with ``Chief of... signature as a means of proving the identity of the individual requesting access to the records.'' Record...
IAEA wants data, access for two Yongbyon facilities
International Nuclear Information System (INIS)
Anon.
1993-01-01
At a meeting of the Board of Governors of the International Atomic Energy Agency held February 22-25, a resolution was passed calling upon the government of the Democratic People's Republic of Korea (DPRK; more commonly known as North Korea) to respond positively and without delay to IAEA Director General Hans Blix's February 9 request for access to additional information and two additional sites related to North Korea's nuclear energy program. IAEA inspectors had been given access to some of the nuclear facilities in 1992, but early this year the North Korean government refused to let the IAEA see these other facilities
Assessment of Deafblind Access to Manual Language Systems (ADAMLS)
Blaha, Robbie; Carlson, Brad
2007-01-01
This document presents the Assessment of Deafblind Access to Manual Language Systems (ADAMLS), a resource for educational teams who are responsible for developing appropriate adaptations and strategies for children who are deafblind who are candidates for learning manual language systems. The assessment tool should be used for all children with a…
Access to essential medicines in Pakistan: policy and health systems research concerns.
Directory of Open Access Journals (Sweden)
Shehla Zaidi
Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.
48 CFR 245.7101-4 - DD Form 1640, Request for Plant Clearance.
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false DD Form 1640, Request for Plant Clearance. 245.7101-4 Section 245.7101-4 Federal Acquisition Regulations System DEFENSE... Forms 245.7101-4 DD Form 1640, Request for Plant Clearance. Use to request plant clearance assistance or...
Providers' Access of Imaging Versus Only Reports: A System Log File Analysis.
Jung, Hye-Young; Gichoya, Judy Wawira; Vest, Joshua R
2017-02-01
An increasing number of technologies allow providers to access the results of imaging studies. This study examined differences in access of radiology images compared with text-only reports through a health information exchange system by health care professionals. The study sample included 157,256 historical sessions from a health information exchange system that enabled 1,670 physicians and non-physicians to access text-based reports and imaging over the period 2013 to 2014. The primary outcome was an indicator of access of an imaging study instead of access of a text-only report. Multilevel mixed-effects regression models were used to estimate the association between provider and session characteristics and access of images compared with text-only reports. Compared with primary care physicians, specialists had an 18% higher probability of accessing actual images instead of text-only reports (β = 0.18; P < .001). Compared with primary care practice settings, the probability of accessing images was 4% higher for specialty care practices (P < .05) and 8% lower for emergency departments (P < .05). Radiologists, orthopedists, and neurologists accounted for 79% of all the sessions with actual images accessed. Orthopedists, radiologists, surgeons, and pulmonary disease specialists accessed imaging more often than text-based reports only. Consideration for differences in the need to access images compared with text-only reports based on the type of provider and setting of care are needed to maximize the benefits of image sharing for patient care. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.
75 FR 51246 - Petition Requesting Regulations Restricting Cadmium in Children's Products
2010-08-19
.... Docket: For access to the docket to read background documents or comments received, go to http://www... established for lead. In addition, petitioners request a test method based on total cadmium, which simulates a child chewing the jewelry before swallowing by cutting the metal jewelry in half, and evaluating the...
Global Access Programs: A Collaborative Approach for Effective Implementation and Management.
Ainge, Debra; Aitken, Suzanne; Corbett, Mark; De-Keyzer, David
Global access programs (GAPs) provide access to medicinal products for patients with serious medical conditions and no commercially available treatment options. Providing early access to medicines can be challenging for a pharmaceutical company. The demand for a GAP often occurs at a time when other activities are the prime focus, such as delivery of pivotal clinical trials or gaining of marketing authorization. Furthermore, the skills, experience, and infrastructure necessary to implement and manage a successful GAP vary significantly from those required for regular clinical trial execution, and the regulatory environment presents its own challenges, with regulations often poorly defined and with considerable inter-country variation. This article considers the triggers for early access requests and examines the need for companies to develop a global strategy for GAPs in order to respond appropriately to requests for early access. It also provides a comprehensive overview of the processes for GAP set-up, implementation, management, and closure, along with the considerations affecting the type and scope of GAP, such as demand, regulatory feasibility, license status of the product, drug pricing structure, company strategy, costs, and product supply. Also discussed is the need for appropriate personnel to implement and manage the GAP, and when to consider collaboration with an external GAP provider. In summary, GAPs require careful and efficient planning and management, from set-up to closure. Well-run GAPs provide an ethical and regulatory-compliant pathway for access of new treatments to patients with serious conditions and an unmet medical need.
International Nuclear Information System (INIS)
Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.
2001-01-01
Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)
Dynamic file-access characteristics of a production parallel scientific workload
Kotz, David; Nieuwejaar, Nils
1994-01-01
Multiprocessors have permitted astounding increases in computational performance, but many cannot meet the intense I/O requirements of some scientific applications. An important component of any solution to this I/O bottleneck is a parallel file system that can provide high-bandwidth access to tremendous amounts of data in parallel to hundreds or thousands of processors. Most successful systems are based on a solid understanding of the expected workload, but thus far there have been no comprehensive workload characterizations of multiprocessor file systems. This paper presents the results of a three week tracing study in which all file-related activity on a massively parallel computer was recorded. Our instrumentation differs from previous efforts in that it collects information about every I/O request and about the mix of jobs running in a production environment. We also present the results of a trace-driven caching simulation and recommendations for designers of multiprocessor file systems.
Access to Investigational Drugs: FDA Expanded Access Programs or "Right-to-Try" Legislation?
Holbein, M E Blair; Berglund, Jelena P; Weatherwax, Kevin; Gerber, David E; Adamo, Joan E
2015-10-01
The Food and Drug Administration Expanded Access (EA) program and "Right-to-Try" legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. The FDA EA program includes Single Patient-Investigational New Drug (SP-IND), Emergency SP-IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. "Right-to-Try" legislation bypasses some of these steps, but provides no regulatory or safety oversight. The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP-IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. © 2015 Wiley Periodicals, Inc.
NASA Access Mechanism - Graphical user interface information retrieval system
Hunter, Judy F.; Generous, Curtis; Duncan, Denise
1993-01-01
Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.
NASA access mechanism: Graphical user interface information retrieval system
Hunter, Judy; Generous, Curtis; Duncan, Denise
1993-01-01
Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.
2010-04-01
... § 115.802 May a tribe make a request to OTFM to receive information about its trust account more frequently? Yes, a tribe may contact OTFM at any time to: (a) Request information about account transactions and balances; (b) Make arrangements to access account information electronically; or (c) Receive a...
76 FR 28010 - Privacy Act of 1974; System of Records
2011-05-13
... protected network. Automated and manual records are available only to authorized personnel having a need-to... notarized signature as a means of proving the identity of the individual requesting access to the records... proving the identity of the individual requesting access to the records.'' * * * * * Record source...
41 CFR 101-39.105-2 - Agency requests to withdraw participation.
2010-07-01
..., AND MOTOR VEHICLES 39-INTERAGENCY FLEET MANAGEMENT SYSTEMS 39.1-Establishment, Modification, and Discontinuance of Interagency Fleet Management Systems § 101-39.105-2 Agency requests to withdraw participation. (a) Executive agencies receiving motor vehicle services from fleet management systems may request...
Directory of Open Access Journals (Sweden)
Freda Mold
2015-12-01
Full Text Available Online access to medical records and linked services, including requesting repeat prescriptions and booking appointments, enables patients to personalize their access to care. However, online access creates opportunities and challenges for both health professionals and their patients, in practices and in research. The challenges for practice are the impact of online services on workload and the quality and safety of health care. Health professionals are concerned about the impact on workload, especially from email or other online enquiry systems, as well as risks to privacy. Patients report how online access provides a convenient means through which to access their health provider and may offer greater satisfaction if they get a timely response from a clinician. Online access and services may also result in unforeseen consequences and may change the nature of the patient-clinician interaction. Research challenges include: (1 Ensuring privacy, including how to control inappropriate carer and guardian access to medical records; (2 Whether online access to records improves patient safety and health outcomes; (3 Whether record access increases disparities across social classes and between genders; and (4 Improving efficiency. The challenges for practice are: (1 How to incorporate online access into clinical workflow; (2 The need for a business model to fund the additional time taken. Creating a sustainable business model for a safe, private, informative, more equitable online service is needed if online access to records is to be provided outside of pay-for-service systems.
An Intelligent Terminal for Access to a Medical Database
Womble, M. E.; Wilson, S. D.; Keiser, H. N.; Tworek, M. L.
1978-01-01
Very powerful data base management systems (DBMS) now exist which allow medical personnel access to patient record data bases. DBMS's make it easy to retrieve either complete or abbreviated records of patients with similar characteristics. In addition, statistics on data base records are immediately accessible. However, the price of this power is a large computer with the inherent problems of access, response time, and reliability. If a general purpose, time-shared computer is used to get this power, the response time to a request can be either rapid or slow, depending upon loading by other users. Furthermore, if the computer is accessed via dial-up telephone lines, there is competition with other users for telephone ports. If either the DBMS or the host machine is replaced, the medical users, who are typically not sophisticated in computer usage, are forced to learn the new system. Microcomputers, because of their low cost and adaptability, lend themselves to a solution of these problems. A microprocessor-based intelligent terminal has been designed and implemented at the USAF School of Aerospace Medicine to provide a transparent interface between the user and his data base. The intelligent terminal system includes multiple microprocessors, floppy disks, a CRT terminal, and a printer. Users interact with the system at the CRT terminal using menu selection (framing). The system translates the menu selection into the query language of the DBMS and handles all actual communication with the DBMS and its host computer, including telephone dialing and sign on procedures, as well as the actual data base query and response. Retrieved information is stored locally for CRT display, hard copy production, and/or permanent retention. Microprocessor-based communication units provide security for sensitive medical data through encryption/decryption algorithms and high reliability error detection transmission schemes. Highly modular software design permits adapation to a
Sarang, Anya; Rhodes, Tim; Sheon, Nicolas
2013-10-01
Achieving 'universal access' to antiretroviral HIV treatment (ART) in lower income and transitional settings is a global target. Yet, access to ART is shaped by local social condition and is by no means universal. Qualitative studies are ideally suited to describing how access to ART is socially situated. We explored systemic barriers to accessing ART among people who inject drugs (PWID) in a Russian city (Ekaterinburg) with a large burden of HIV treatment demand. We undertook 42 in-depth qualitative interviews with people living with HIV with current or recent experience of injecting drug use. Accounts were analysed thematically, and supplemented here with an illustrative case study. Three core themes were identified: 'labyrinthine bureaucracy' governing access to ART; a 'system Catch 22' created by an expectation that access to ART was conditional upon treated drug use in a setting of limited drug treatment opportunity; and 'system verticalization', where a lack of integration across HIV, tuberculosis (TB) and drug treatment compromised access to ART. Taken together, we find that systemic factors play a key role in shaping access to ART with the potential adverse effects of reproducing treatment initiation delay and disengagement from treatment. We argue that meso-level systemic factors affecting access to ART for PWID interact with wider macro-level structural forces, including those related to drug treatment policy and the social marginalization of PWID. We note the urgent need for systemic and structural changes to improve access to ART for PWID in this setting, including to simplify bureaucratic procedures, foster integrated HIV, TB and drug treatment services, and advocate for drug treatment policy reform.
A Multiple-Reception Access Protocol with Interruptions with Mixed Priorities in CDMA Networks
Institute of Scientific and Technical Information of China (English)
Lu Xiaowen; Zhu Jinkang
2003-01-01
A novel access protocol called Multiple-Reception Access Protocol (MRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.
Efficient Reduction of Access Latency through Object Correlations in Virtual Environments
Directory of Open Access Journals (Sweden)
Damon Shing-Min Liu
2007-01-01
Full Text Available Object correlations are common semantic patterns in virtual environments. They can be exploited to improve the effectiveness of storage caching, prefetching, data layout, and disk scheduling. However, we have little approaches for discovering object correlations in VE to improve the performance of storage systems. Being an interactive feedback-driven paradigm, it is critical that the user receives responses to his navigation requests with little or no time lag. Therefore, we propose a class of view-based projection-generation method for mining various frequent sequential traversal patterns in the virtual environments. The frequent sequential traversal patterns are used to predict the user navigation behavior and, through clustering scheme, help to reduce disk access time with proper patterns placement into disk blocks. Finally, the effectiveness of these schemes is shown through simulation to demonstrate how these proposed techniques not only significantly cut down disk access time, but also enhance the accuracy of data prefetching.
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2015-06-16
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.
Reported Design Processes for Accessibility in Rail Transport
DEFF Research Database (Denmark)
Herriott, Richard; Cook, Sharon
2014-01-01
Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all......). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were...
Palantiri: a distributed real-time database system for process control
International Nuclear Information System (INIS)
Tummers, B.J.; Heubers, W.P.J.
1992-01-01
The medium-energy accelerator MEA, located in Amsterdam, is controlled by a heterogeneous computer network. A large real-time database contains the parameters involved in the control of the accelerator and the experiments. This database system was implemented about ten years ago and has since been extended several times. In response to increased needs the database system has been redesigned. The new database environment, as described in this paper, consists out of two new concepts: (1) A Palantir which is a per machine process that stores the locally declared data and forwards all non local requests for data access to the appropriate machine. It acts as a storage device for data and a looking glass upon the world. (2) Golems: working units that define the data within the Palantir, and that have knowledge of the hardware they control. Applications access the data of a Golem by name (which do resemble Unix path names). The palantir that runs on the same machine as the application handles the distribution of access requests. This paper focuses on the Palantir concept as a distributed data storage and event handling device for process control. (author)
Performance Analysis of DPSK-OCDMA System for Optical Access Network
Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer
2016-03-01
In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.
Interactive SIGHT: textual access to simple bar charts
Demir, Seniz; Oliver, David; Schwartz, Edward; Elzer, Stephanie; Carberry, Sandra; Mccoy, Kathleen F.; Chester, Daniel
2010-12-01
Information graphics, such as bar charts and line graphs, are an important component of many articles from popular media. The majority of such graphics have an intention (a high-level message) to communicate to the graph viewer. Since the intended message of a graphic is often not repeated in the accompanying text, graphics together with the textual segments contribute to the overall purpose of an article and cannot be ignored. Unfortunately, these visual displays are provided in a format which is not readily accessible to everyone. For example, individuals with sight impairments who use screen readers to listen to documents have limited access to the graphics. This article presents a new accessibility tool, the Interactive SIGHT (Summarizing Information GrapHics Textually) system, that is intended to enable visually impaired users to access the knowledge that one would gain from viewing information graphics found on the web. The current system, which is implemented as a browser extension that works on simple bar charts, can be invoked by a user via a keystroke combination while navigating the web. Once launched, Interactive SIGHT first provides a brief summary that conveys the underlying intention of a bar chart along with the chart's most significant and salient features, and then produces history-aware follow-up responses to provide further information about the chart upon request from the user. We present two user studies that were conducted with sighted and visually impaired users to determine how effective the initial summary and follow-up responses are in conveying the informational content of bar charts, and to evaluate how easy it is to use the system interface. The evaluation results are promising and indicate that the system responses are well-structured and enable visually impaired users to answer key questions about bar charts in an easy-to-use manner. Post-experimental interviews revealed that visually impaired participants were very satisfied with
HELPDESK TROUBLESHOOTING REQUESTS
FM and CSE Group, TS Department
2004-01-01
As of the 08/03/2004 all the repair requests and other communication concerning the CERN tertiary buildings that so far have been transmitted to the TCR via 72201 will be handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equipment as: Electricity and lighting in office buildings, halls and workshops Heating and air conditioning in office buildings, halls and workshops Lifts (excluded the ones in shafts) Motorised doors Building structure and equipment: roofs, doors, windows, blinds, etc. Plumbing Toilets Cleaning (CERN wide) Restaurant equipment Roads and green areas Wastes collection The FM Helpdesk is available between 07h30 and 18h30. Troubleshooting requests, complaints and work requests will only be accepted during these opening hours. Outside these opening hours and for any problem in a machine building or on equipment that is not in the list above, you shall continue to contact the TCR under 72201 - 24 hours a day, 365 days a year. Machine buildings are ...
HELPDESK TROUBLESHOOTING REQUESTS
TS Department
2004-01-01
As of the 08/03/2004 all the repair requests and other communication concerning the CERN tertiary buildings that so far have been transmitted to the TCR via 72201 will be handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equipment as: Electricity and lighting in office buildings, halls and workshops Heating and air conditioning in office buildings, halls and workshops Lifts (excluded the ones in shafts) Motorised doors Building structure and equipment: roofs, doors, windows, blinds, etc. Plumbing Toilets Cleaning (CERN wide) Restaurant equipment Roads and green areas Wastes collection The FM Helpdesk is available between 07h30 and 18h30. Troubleshooting requests, complaints and work requests will only be accepted during these opening hours. Outside these opening hours and for any problem in a machine building or on equipment that is not in the list above, you shall continue to contact the TCR under 72201 - 24 hours a day, 365 days a year. Machine buildings are e...
DCS data viewer, an application that accesses ATLAS DCS historical data
International Nuclear Information System (INIS)
Tsarouchas, C; Schlenker, S; Dimitrov, G; Jahn, G
2014-01-01
The ATLAS experiment at CERN is one of the four Large Hadron Collider experiments. The Detector Control System (DCS) of ATLAS is responsible for the supervision of the detector equipment, the reading of operational parameters, the propagation of the alarms and the archiving of important operational data in a relational database (DB). DCS Data Viewer (DDV) is an application that provides access to the ATLAS DCS historical data through a web interface. Its design is structured using a client-server architecture. The pythonic server connects to the DB and fetches the data by using optimized SQL requests. It communicates with the outside world, by accepting HTTP requests and it can be used stand alone. The client is an AJAX (Asynchronous JavaScript and XML) interactive web application developed under the Google Web Toolkit (GWT) framework. Its web interface is user friendly, platform and browser independent. The selection of metadata is done via a column-tree view or with a powerful search engine. The final visualization of the data is done using java applets or java script applications as plugins. The default output is a value-over-time chart, but other types of outputs like tables, ascii or ROOT files are supported too. Excessive access or malicious use of the database is prevented by a dedicated protection mechanism, allowing the exposure of the tool to hundreds of inexperienced users. The current configuration of the client and of the outputs can be saved in an XML file. Protection against web security attacks is foreseen and authentication constrains have been taken into account, allowing the exposure of the tool to hundreds of users world wide. Due to its flexible interface and its generic and modular approach, DDV could be easily used for other experiment control systems.
Dcs Data Viewer, an Application that Accesses ATLAS DCS Historical Data
Tsarouchas, C.; Schlenker, S.; Dimitrov, G.; Jahn, G.
2014-06-01
The ATLAS experiment at CERN is one of the four Large Hadron Collider experiments. The Detector Control System (DCS) of ATLAS is responsible for the supervision of the detector equipment, the reading of operational parameters, the propagation of the alarms and the archiving of important operational data in a relational database (DB). DCS Data Viewer (DDV) is an application that provides access to the ATLAS DCS historical data through a web interface. Its design is structured using a client-server architecture. The pythonic server connects to the DB and fetches the data by using optimized SQL requests. It communicates with the outside world, by accepting HTTP requests and it can be used stand alone. The client is an AJAX (Asynchronous JavaScript and XML) interactive web application developed under the Google Web Toolkit (GWT) framework. Its web interface is user friendly, platform and browser independent. The selection of metadata is done via a column-tree view or with a powerful search engine. The final visualization of the data is done using java applets or java script applications as plugins. The default output is a value-over-time chart, but other types of outputs like tables, ascii or ROOT files are supported too. Excessive access or malicious use of the database is prevented by a dedicated protection mechanism, allowing the exposure of the tool to hundreds of inexperienced users. The current configuration of the client and of the outputs can be saved in an XML file. Protection against web security attacks is foreseen and authentication constrains have been taken into account, allowing the exposure of the tool to hundreds of users world wide. Due to its flexible interface and its generic and modular approach, DDV could be easily used for other experiment control systems.
Access to Investigational Drugs: FDA Expanded Access Programs or “Right‐to‐Try” Legislation?
Berglund, Jelena P.; Weatherwax, Kevin; Gerber, David E.; Adamo, Joan E.
2015-01-01
Abstract Purpose The Food and Drug Administration Expanded Access (EA) program and “Right‐to‐Try” legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. Methods FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. Results The FDA EA program includes Single Patient‐Investigational New Drug (SP‐IND), Emergency SP‐IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. “Right‐to‐Try” legislation bypasses some of these steps, but provides no regulatory or safety oversight. Conclusion The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP‐IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. PMID:25588691
A system for success:
Webb Penelope A; Hodgkinson Matt J
2007-01-01
Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.
Email based remote access and surveillance system for smart home infrastructure
Directory of Open Access Journals (Sweden)
Pooshkar Rajiv
2016-09-01
Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.
Ali, Emad; MacFarland, Stephanie Z.; Umbreit, John
2011-01-01
The Picture Exchange Communication System (PECS) is an augmentative and alternative communication (AAC) program used to teach functional requesting and commenting skills to people with disabilities (Bondy & Frost, 1993; Frost & Bondy, 2002). In this study, tangible symbols were added to PECS in teaching requesting to four students (ages 7-14) with…
The upgrade of the J-TEXT experimental data access and management system
International Nuclear Information System (INIS)
Yang, C.; Zhang, M.; Zheng, W.; Liu, R.; Zhuang, G.
2014-01-01
Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later
Providing Access to Library Automation Systems for Students with Disabilities.
California Community Colleges, Sacramento. High-Tech Center for the Disabled.
This document provides information on the integration of assistive computer technologies and library automation systems at California Community Colleges in order to ensure access for students with disabilities. Topics covered include planning, upgrading, purchasing, implementing and using these technologies with library systems. As information…
What systems participants know about access and service entry and why managers should listen.
Duncombe, Rohena
2017-08-01
Objective The present study looked at the views of people directly involved in the entry process for community health counselling using the frame of the health access literature. The concurrence of system participants' views with the access literature highlights access issues, particularly for people who are vulnerable or disadvantaged. The paper privileges the voices of the system participants, inviting local health services to consider using participatory design to improve access at the entry point. Methods People involved in the entry process for community health counselling explored the question, 'What, for you, are the features of a good intake system?' They also commented on themes identified during pilot interviews. These were thematically analysed for each participant group by the researcher to develop a voice for each stakeholder group. Results People accessing the service could be vulnerable and the entry process failed to take that into account. People directly involved in the counselling service entry system, system participants, consisted of: professionals referring in, people seeking services and reception staff taking first enquiries. They shared substantially the same concerns as each other. The responses from these system participants are consistent with the international literature on access and entry into health services. Conclusion Participatory service design could improve primary healthcare service entry at the local level. Canvassing the experiences of system participants is important for delivering services to those who have the least access and, in that way, could contribute to health equity. What is known about the topic? People with the highest health needs receive the fewest services. Health inequality is increasing. What does this paper add? System participants can provide advice consistent with the academic research literature that is useful for improving service entry at the local level. What are the implications for practitioners
Directory of Open Access Journals (Sweden)
Nimish Dharmadhikari
2015-12-01
Full Text Available This research studies the accessibility of grocery stores to university students using the public transportation system, drawing from a case study of Fargo, North Dakota. Taking into consideration the combined travel time components of walking, riding, and waiting, this study measures two types of accessibilities: accessibility to reach a particular place and accessibility to reach the bus stop to ride the public transit system. These two accessibilities are interdependent and cannot perform without each other. A new method to calculate the average accessibility measure for the transit routes is proposed. A step-wise case study analysis indicates that one route provides accessibility to a grocery store in eight minutes. This also suggests that the North Dakota State University area has moderate accessibility to grocery stores.
Directory of Open Access Journals (Sweden)
Sinn-Cheng Lin
2017-03-01
Full Text Available Open access is a mode of academic communication that has been on the rise in recent years, but open access academic resources are widely dispersed across the internet, making it occasionally inconvenient in terms of its use. This research is focused on library and information science, using the OAIS reference model as the system framework, two open access platform, DOAJ and E-LIS as the data sources, and through system implementation develop a “library and information science open access journal union catalogue” system. Using the OAI-PMH protocol as the data interoperability standard, and LAMP as the development environment, four major functionalities: injest, archiving, management and access of information were designed, developed, and integrated into system build. Actual testing and verification showed this system is able to successfully collect data from DOAJ and E-LIS open journal resources related to library and information science. The system is now active and functional, and can be used by researchers in the library and science information field.
37 CFR 2.27 - Pending trademark application index; access to applications.
2010-07-01
... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Pending trademark application... Registration § 2.27 Pending trademark application index; access to applications. (a) An index of pending... particular pending application will be permitted prior to publication under § 2.80 upon written request. (c...
76 FR 18738 - Privacy Act of 1974; System of Records
2011-04-05
... Manual 7600.7-M, DoD Audit Manual; SECNAVINST 7510.7F, Department of the Navy Internal Audit and E.O... or a notarized signature as a means of proving the identity of the individual requesting access to... a means of proving the identity of the individual requesting access to the records. Contesting...
A semi-automated vascular access system for preclinical models
International Nuclear Information System (INIS)
Berry-Pusey, B N; David, J; Taschereau, R; Silverman, R W; Williams, D; Ladno, W; Stout, D; Chatziioannou, A; Chang, Y C; Prince, S W; Chu, K; Tsao, T C
2013-01-01
Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. (paper)
The optimal access system for future far-offshore wind farms
Energy Technology Data Exchange (ETDEWEB)
Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)
2013-12-15
Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.
Accessibility Guidelines for Astronomy and Astrophysics Meetings
Monkiewicz, Jacqueline; Murphy, Nicholas; Diaz-Merced, Wanda Liz; Aarnio, Alicia; Knierman, Karen; AAS Working Group for Accessibility and Disability
2018-01-01
Attendance at meetings and conferences is a critical component of an astronomer's professional life, providing opportunities for presenting one's work, staying current in the field, career networking, and scientific collaboration. Exclusion from these gatherings due to lack of accessibility and accommodation failure is a reality for disabled astronomers, and contributes substantially to low levels of representation in the senior-most levels of the field. We present a preview of the AAS Working Group for Accessibility and Disability's best practice recommendations for meetings accessibility. Applying the principles of universal access and barrier-free design, we model a paradigm of anticipating and removing accessibility barriers in advance, rather than putting the burden of requesting accommodation solely on disabled astronomers and students. We cite several professional and nonprofessional societies identified as meetings accessibility exemplars, and model our guidelines on their best practices. We establish standards for accessibility budgeting, venue choice, publication of policies online, designating point persons, and identifying barriers. We make recommendations for oral and poster presentations, event registration, receptions and banquets, excursions, and other typical conference activities. For meetings which are constrained by fixed budgets and venue choice, we identify a number of low cost/high reward accessibility steps which might still have a large beneficial impact. We likewise provide adapted recommendations for low budget meetings. THIS IS A POSTER LOCATED IN THE AAS BOOTH
Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network
DEFF Research Database (Denmark)
Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.
2016-01-01
We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....
Distributed magnetic field positioning system using code division multiple access
Prigge, Eric A. (Inventor)
2003-01-01
An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.
The design and implementation of access control management system in IHEP network
International Nuclear Information System (INIS)
Wang Yanming; An Dehai; Qi Fazhi
2010-01-01
In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)
Online Access to Weather Satellite Imagery Through the World Wide Web
Emery, W.; Baldwin, D.
1998-01-01
Both global area coverage (GAC) and high-resolution picture transmission (HRTP) data from the Advanced Very High Resolution Radiometer (AVHRR) are made available to laternet users through an online data access system. Older GOES-7 data am also available. Created as a "testbed" data system for NASA's future Earth Observing System Data and Information System (EOSDIS), this testbed provides an opportunity to test both the technical requirements of an onune'd;ta system and the different ways in which the -general user, community would employ such a system. Initiated in December 1991, the basic data system experienced five major evolutionary changes In response to user requests and requirements. Features added with these changes were the addition of online browse, user subsetting, dynamic image Processing/navigation, a stand-alone data storage system, and movement,from an X-windows graphical user Interface (GUI) to a World Wide Web (WWW) interface. Over Its lifetime, the system has had as many as 2500 registered users. The system on the WWW has had over 2500 hits since October 1995. Many of these hits are by casual users that only take the GIF images directly from the interface screens and do not specifically order digital data. Still, there b a consistent stream of users ordering the navigated image data and related products (maps and so forth). We have recently added a real-time, seven- day, northwestern United States normalized difference vegetation index (NDVI) composite that has generated considerable Interest. Index Terms-Data system, earth science, online access, satellite data.
Wagner, Craig D; Hall, John T; White, Wendy L; Miller, Luke A D; Williams, Jon D
2007-02-01
Characterization of recombinant protein purification fractions and final products by liquid chromatography-mass spectrometry (LC/MS) are requested more frequently each year. A protein open-access (OA) LC/MS system was developed in our laboratory to meet this demand. This paper compares the system that we originally implemented in our facilities in 2003 to the one now in use, and discusses, in more detail, recent enhancements that have improved its robustness, reliability, and data reporting capabilities. The system utilizes instruments equipped with reversed-phase chromatography and an orthogonal accelerated time-of-flight mass spectrometer fitted with an electrospray source. Sample analysis requests are accomplished using a simple form on a web-enabled laboratory information management system (LIMS). This distributed form is accessible from any intranet-connected company desktop computer. Automated data acquisition and processing are performed using a combination of in-house (OA-Self Service, OA-Monitor, and OA-Analysis Engine) and vendor-supplied programs (AutoLynx, and OpenLynx) located on acquisition computers and off-line processing workstations. Analysis results are then reported via the same web-based LIMS. Also presented are solutions to problems not addressed on commercially available, small-molecule OA-LC/MS systems. These include automated transforming of mass-to-charge (m/z) spectra to mass spectra and automated data interpretation that considers minor variants to the protein sequence-such as common post-translational modifications (PTMs). Currently, our protein OA-LC/MS platform runs on five LC/MS instruments located in three separate GlaxoSmithKline R&D sites in the US and UK. To date, more than 8000 protein OA-LC/MS samples have been analyzed. With these user friendly and highly automated OA systems in place, mass spectrometry plays a key role in assessing the quality of recombinant proteins, either produced at our facilities or bought from external
Design of the frame structure for a multiservice interactive system using ATM-PON
Nam, Jae-Hyun; Jang, Jongwook; Lee, Jung-Tae
1998-10-01
The MAC (Medium Access Control) protocol controls B-NT1s' (Optical Network Unit) access to the shared capacity on the PON, this protocol is very important if TDMA (Time Division Multiple Access) multiplexing is used on the upstream. To control the upstream traffic some kind of access protocol has to be implemented. There are roughly two different approaches to use request cells: in a collision free way or such that collisions in a request slot are allowed. It is the objective of this paper to describe a MAC-protocol structure that supports both approaches and hybrids of it. In our paper we grantee the QoS (Quality of Service) of each B-NT1 through LOC, LOV, LOA field that are the length field of the transmitted cell at each B-NT1. Each B-NT1 transmits its status of request on request cell.
Development of improved methods for remote access of DIII-D data and data analysis
International Nuclear Information System (INIS)
Greene, K.L.; McHarg, B.B. Jr.
1997-11-01
The DIII-D tokamak is a national fusion research facility. There is an increasing need to access data from remote sites in order to facilitate data analysis by collaborative researchers at remote locations, both nationally and internationally. In the past, this has usually been done by remotely logging into computers at the DIII-D site. With the advent of faster networking and powerful computers at remote sites, it is becoming possible to access and analyze data from anywhere in the world as if the remote user were actually at the DIII-D site. The general mechanism for accessing DIII-D data has always been via the PTDATA subroutine. Substantial enhancements are being made to that routine to make it more useful in a non-local environment. In particular, a caching mechanism is being built into PTDATA to make network data access more efficient. Studies are also being made of using Distributed File System (DFS) disk storage in a Distributed Computing Environment (DCE). A data server has been created that will migrate, on request, shot data from the DIII-D environment into the DFS environment
Summary and status of the Horizons ephemeris system
Giorgini, J.
2011-10-01
Since 1996, the Horizons system has provided searchable access to JPL ephemerides for all known solar system bodies, several dozen spacecraft, planetary system barycenters, and some libration points. Responding to 18 400 000 requests from 300 000 unique addresses, the system has recently averaged 420 000 ephemeris requests per month. Horizons is accessed and automated using three interfaces: interactive telnet, web-browser form, and e-mail command-file. Asteroid and comet ephemerides are numerically integrated from JPL's database of initial conditions. This small-body database is updated hourly by a separate process as new measurements and discoveries are reported by the Minor Planet Center and automatically incorporated into new JPL orbit solutions. Ephemerides for other objects are derived by interpolating previously developed solutions whose trajectories have been represented in a file. For asteroids and comets, such files may be dynamically created and transferred to users, effectively recording integrator output. These small-body SPK files may then be interpolated by user software to reproduce the trajectory without duplicating the numerically integrated n-body dynamical model or PPN equations of motion. Other Horizons output is numerical and in the form of plain-text observer, vector, osculating element, or close-approach tables, typically expected be read by other software as input. About one hundred quantities can be requested in various time-scales and coordinate systems. For JPL small-body solutions, this includes statistical uncertainties derived from measurement covariance and state transition matrices. With the exception of some natural satellites, Horizons is consistent with DE405/DE406, the IAU 1976 constants, ITRF93, and IAU2009 rotational models.
Towards Payment Systems for all: accessible POS
Directory of Open Access Journals (Sweden)
Begoña Pino
2014-10-01
Full Text Available The project presented here is a first step towards building a more accessible world through Payment Systems and a successful implementation of a User Centred Design. By means of a beep-system, a Point of Sale (POS payment device informs the user of those transaction steps that require his/her attention at the moment of payment, such as when: the card has been successfully read, the Personal Identification Number (PIN must be entered, the transaction has been successfully processed and the transaction has not been completed due to an error. The proposed solution increases the personal autonomy and security of blind people when paying at a merchant.
Immediate data access system for LHD experiments
International Nuclear Information System (INIS)
Emoto, M.; Iwadare, Y.; Nagayama, Y.
2004-01-01
Several kinds of computer systems are used to perform large helical device (LHD) experiments, and each produces its own data format. Therefore, it has been difficult to deal with these data simultaneously. In order to solve this problem, the Kaiseki server was developed; it has been facilitating the unified retrieval of LHD data. The data acquired or analyzed by various computer systems are converted into the unified ASCII format, or Kaiseki format, and transferred to the Kaiseki server. With this method, the researchers can visualize and analyze the data produced by various kinds of computers in the same way. Because validations are needed before registering on the Kaiseki server, it takes time to make the validated data available. However, some researchers need data as soon as it is gathered in order to adjust their instruments during the experiments. To satisfy this requirement, a new visualization system has been under development. The new system has two ways to visualize the data as physical values from the raw data. If the conversion task is not complex, the NIFSscope, a visualization tool, converts the raw data into physics data by itself. If the task is too complex to handle, it asks the ANACalc server to make physics data. When the ANACalc server receives a request, it delegates calculation programs to convert the acquired data into physics data. Because the interfaces between the server and the calculation processes are independent of programming languages and operating systems, the calculation processes can be placed on different computers and the server load can be reduced. Therefore, the system can respond to changes in requirements by replacing the calculation programs, and can easily be expanded by increasing the number of calculation servers
From System Expansion to System Contraction: Access to Higher Education in Poland
Kwiek, Marek
2013-01-01
Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…
DOE's nation-wide system for access control can solve problems for the federal government
International Nuclear Information System (INIS)
Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.
1996-07-01
The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals
A mobile console for local access to accelerator control systems.
1981-01-01
Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).
76 FR 72423 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
2011-11-23
... requests under review by the Office of Management and Budget (OMB), in compliance with the Paperwork..., NPs are poised to play a critical role in the nation's efforts to expand access to health care services. Despite the increasing number and roles of NPs, unfortunately, there are currently only limited...
Failure to review STAT clinical laboratory requests and its economical impact.
Rodriguez-Borja, Enrique; Villalba-Martinez, Celia; Barba-Serrano, Esther; Carratala-Calvo, Arturo
2016-01-01
Failure to follow-up laboratory test results has been described as one of the major processes contributing to unsafe patient care. Currently, most of the laboratories do not know with certainty not only their rate of missed (or unreviewed) requests but the economical cost and impact that this issue implies. The aim of our study was to measure that rate and calculate the resulting costs. In January 2015, we checked in our Laboratory Information Management System (LIMS) for every emergency request from 1(st) July 2011 to 30(th) June 2014, if they had been reviewed by any allowed user or not. 319,064 requests were ordered during that period of time. Results were expressed as "ordered requests", "missed requests" and its percentage. Additionally, total cost of missed requests was calculated in euros (€). "Non-productive days" were theorised (as the days producing requests that were not reviewed) based on these results. 7924 requests (2.5%) were never reviewed by clinicians. This represented a total cost of 203,039 € and 27 "non-productive" days in three years. Significant differences between inpatients, outpatients and emergency department as well as different emergencies units were found after application of statistical analysis. In terms of resources, never reviewed or missed requests appear to be a not negligible problem for the clinical laboratory management. Electronic result delivery, with electronic endorsement to indicate follow-up of requests along with better systems of electronic requesting should be investigated as a way of improving patient outcomes and save unnecessary expenses.
A Semi-Preemptive Computational Service System with Limited Resources and Dynamic Resource Ranking
Directory of Open Access Journals (Sweden)
Fang-Yie Leu
2012-03-01
Full Text Available In this paper, we integrate a grid system and a wireless network to present a convenient computational service system, called the Semi-Preemptive Computational Service system (SePCS for short, which provides users with a wireless access environment and through which a user can share his/her resources with others. In the SePCS, each node is dynamically given a score based on its CPU level, available memory size, current length of waiting queue, CPU utilization and bandwidth. With the scores, resource nodes are classified into three levels. User requests based on their time constraints are also classified into three types. Resources of higher levels are allocated to more tightly constrained requests so as to increase the total performance of the system. To achieve this, a resource broker with the Semi-Preemptive Algorithm (SPA is also proposed. When the resource broker cannot find suitable resources for the requests of higher type, it preempts the resource that is now executing a lower type request so that the request of higher type can be executed immediately. The SePCS can be applied to a Vehicular Ad Hoc Network (VANET, users of which can then exploit the convenient mobile network services and the wireless distributed computing. As a result, the performance of the system is higher than that of the tested schemes.
How does a Belgian health care provider deal with a request for emergency contraception?
Peremans, Lieve; Verhoeven, Veronique; Philips, Hilde; Denekens, Joke; Van Royen, Paul
2007-12-01
To evaluate how Belgian health care providers deal with a request for emergency contraception. In 2002-2003 we conducted 12 focus groups with pharmacists, general practitioners and school physicians. A skilled moderator accompanied by an observer conducted the focus groups using a semi-structured screenplay. All these health care providers agree with the free access to emergency contraception (EC), but experience considerable frustration with regard to the practical aspects and the legal framework. General practitioners (GPs) claim to spend a lot of time on requests for EC and they are concerned about the quality of the counselling provided in pharmacies. Pharmacists are creative when giving counselling in the pharmacy, but there is, nevertheless, a problem with a lack of privacy. School physicians are frustrated that there is no legal possibility to respond to a request for EC when they feel they are ideally placed to advise adolescents. The over-the-counter sale of EC offers women better access, but many barriers still interfere with optimal care. Pharmacists experience a lack of skills to communicate with adolescents and a lack of privacy to give counselling. GPs have good intentions, but are confronted with a lack of willingness on the part of the patients and also financial barriers. School physicians want more possibilities to help adolescents.
A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People
Elena Verdú; Cristina Pelayo G-Bustelo; Ángeles Martínez Sánchez; Rubén Gonzalez-Crespo
2017-01-01
Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to Sign Writing, a way of writing Sign Language. This system extends the functionality of a general we...
Privacy and Access Control for IHE-Based Systems
Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian
Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.
75 FR 70235 - Access to Confidential Business Information by Industrial Economics, Incorporated
2010-11-17
... Industrial Economics, Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Access to Data and Request for Comments. SUMMARY: EPA will authorize its contractor, Industrial Economics... Contracts Nos. GS-10F-0061N (EP10H000898) and EP-W-06- 065/0013, Industrial Economics, Incorporated (IEc...
75 FR 1053 - Access to Confidential Business Information by Industrial Economics, Incorporated
2010-01-08
... Industrial Economics, Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Access to Data and Request for Comments. SUMMARY: EPA will authorize its contractor, Industrial Economics... Contracts No. EP-W-6-065 and EP07H000213, Industrial Economics, Incorporated (IEc) will assist the Office of...
Bus Access Optimisation for FlexRay-based Distributed Embedded Systems
DEFF Research Database (Denmark)
Pop, Traian; Pop, Paul; Eles, Petru
2007-01-01
-real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...
A novel technique to extract events from access control system and locate persons
International Nuclear Information System (INIS)
Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.
2011-01-01
Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)
Measuring patient-centered medical home access and continuity in clinics with part-time clinicians.
Rosland, Ann-Marie; Krein, Sarah L; Kim, Hyunglin Myra; Greenstone, Clinton L; Tremblay, Adam; Ratz, David; Saffar, Darcy; Kerr, Eve A
2015-05-01
Common patient-centered medical home (PCMH) performance measures value access to a single primary care provider (PCP), which may have unintended consequences for clinics that rely on part-time PCPs and team-based care. Retrospective analysis of 110,454 primary care visits from 2 Veterans Health Administration clinics from 2010 to 2012. Multi-level models examined associations between PCP availability in clinic, and performance on access and continuity measures. Patient experiences with access and continuity were compared using 2012 patient survey data (N = 2881). Patients of PCPs with fewer half-day clinic sessions per week were significantly less likely to get a requested same-day appointment with their usual PCP (predicted probability 17% for PCPs with 2 sessions/week, 20% for 5 sessions/week, and 26% for 10 sessions/week). Among requests that did not result in a same-day appointment with the usual PCP, there were no significant differences in same-day access to a different PCP, or access within 2 to 7 days with patients' usual PCP. Overall, patients had >92% continuity with their usual PCP at the hospital-based site regardless of PCP sessions/week. Patients of full-time PCPs reported timely appointments for urgent needs more often than patients of part-time PCPs (82% vs 71%; P Part-time PCP performance appeared worse when using measures focused on same-day access to patients' usual PCP. However, clinic-level same-day access, same-week access to the usual PCP, and overall continuity were similar for patients of part-time and full-time PCPs. Measures of in-person access to a usual PCP do not capture alternate access approaches encouraged by PCMH, and often used by part-time providers, such as team-based or non-face-to-face care.
Lancaster, Owen; Beck, Tim; Atlan, David; Swertz, Morris; Thangavelu, Dhiwagaran; Veal, Colin; Dalgleish, Raymond; Brookes, Anthony J
2015-10-01
Biomedical data sharing is desirable, but problematic. Data "discovery" approaches-which establish the existence rather than the substance of data-precisely connect data owners with data seekers, and thereby promote data sharing. Cafe Variome (http://www.cafevariome.org) was therefore designed to provide a general-purpose, Web-based, data discovery tool that can be quickly installed by any genotype-phenotype data owner, or network of data owners, to make safe or sensitive content appropriately discoverable. Data fields or content of any type can be accommodated, from simple ID and label fields through to extensive genotype and phenotype details based on ontologies. The system provides a "shop window" in front of data, with main interfaces being a simple search box and a powerful "query-builder" that enable very elaborate queries to be formulated. After a successful search, counts of records are reported grouped by "openAccess" (data may be directly accessed), "linkedAccess" (a source link is provided), and "restrictedAccess" (facilitated data requests and subsequent provision of approved records). An administrator interface provides a wide range of options for system configuration, enabling highly customized single-site or federated networks to be established. Current uses include rare disease data discovery, patient matchmaking, and a Beacon Web service. © 2015 WILEY PERIODICALS, INC.
36 CFR 1202.76 - Can NARA deny my request for amendment?
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Can NARA deny my request for amendment? 1202.76 Section 1202.76 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS... Can NARA deny my request for amendment? If the system manager denies your request to amend or...
78 FR 36532 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
2013-06-18
... financial services or products that meet the definition of ``covered person'' under Section 1002(6) of the... subsection 1021(b)(5) of the Act, to ``facilitate access and innovation'' in the ``markets for consumer financial products and services.'' Request for Comments: The Bureau issued a 60-day Federal Register notice...
A Novel Approach to Reduce the Unicast Bandwidth of an IPTV System in a High-Speed Access Network
Directory of Open Access Journals (Sweden)
El Hassane Khabbiza
2017-01-01
Full Text Available Channel change time is a critical quality of experience (QOE metric for IP-based video delivery systems such as Internet Protocol Television (IPTV. An interesting channel change acceleration scheme based on peer-assisted delivery was recently proposed, which consists of deploying one FCC server (Fast Channel Change Server in the IP backbone in order to send the unicast stream to the STB (Set-Top Box before sending the normal multicast stream after each channel change. However, deploying such a solution will cause high bandwidth usage in the network because of the huge unicast traffic sent by the FCC server to the STBs. In this paper, we propose a new solution to reduce the bandwidth occupancy of the unicast traffic, by deploying the FCC server capabilities on the user STB. This means that, after each channel change request, the STB will receive the unicast traffic from another STB instead of the central server. By using this method, the unicast traffic will not pass through the IP network; it will be a peer-to-peer communication via the Access Network only. Extensive simulation results are presented to demonstrate the robustness of our new solution.
Design of pulse waveform for waveform division multiple access UWB wireless communication system.
Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu
2014-01-01
A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.
Accessing social rights in Denmark
DEFF Research Database (Denmark)
Jacqueson, Catherine
2015-01-01
are in decreasing order Polish, German and British nationals. Debates among politicians reflected in the media have since the enlargement of the EU to 10 new Member States in 2004 focused on and off on the issue of access by migrants to social benefits and the issue of social tourism. The debate and discussions...... 2014. The reason for that is the government’s change of practice in administrating family benefits, granting them to all Union citizens lawfully residing in Denmark without any requirement of prior residence in the country. This change was the result of a request from the European Commission...
2010-04-16
... on electronic storage media. Participants may not submit paper copies of their filings unless they... officer. Participants are requested not to include personal privacy information, such as social security... periods of active source usage), Licensees should, to the extent practicable, consider two modes of source...
Embedded systems for supporting computer accessibility.
Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio
2015-01-01
Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.
A Comprehensive System for Monitoring Urban Accessibility in Smart Cities.
Mora, Higinio; Gilart-Iglesias, Virgilio; Pérez-Del Hoyo, Raquel; Andújar-Montoya, María Dolores
2017-08-09
The present work discusses the possibilities offered by the evolution of Information and Communication Technologies with the aim of designing a system to dynamically obtain knowledge of accessibility issues in urban environments. This system is facilitated by technology to analyse the urban user experience and movement accessibility, which enabling accurate identification of urban barriers and monitoring its effectiveness over time. Therefore, the main purpose of the system is to meet the real needs and requirements of people with movement disabilities. The information obtained can be provided as a support service for decision-making to be used by city government, institutions, researchers, professionals and other individuals of society in general to improve the liveability and quality of the lives of citizens. The proposed system is a means of social awareness that makes the most vulnerable groups of citizens visible by involving them as active participants. To perform and implement the system, the latest communication and positioning technologies for smart sensing have been used, as well as the cloud computing paradigm. Finally, to validate the proposal, a case study has been presented using the university environment as a pre-deployment step in urban environments.
Open-Access, Low-Magnetic-Field MRI System for Lung Research
Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William
2009-01-01
An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.
Verification of Security Policy Enforcement in Enterprise Systems
Gupta, Puneet; Stoller, Scott D.
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
Tomás-Dols, Sofía; Valderrama-Zurián, Juan Carlos; Vidal-Infer, Antonio; Samper-Gras, Teresa; Hernández-Martínez, Ma Carmen; Torrijo-Rodrigo, Ma José
2007-01-01
This study aimed at identifying the factors that contribute to delaying the access of alcohol abuse patients to specific treatment centres in the Autonomous Region of Valencia (Spain). 563 patients from Addictive Behaviours Units (UCA) and Alcohology Units (UA) were interviewed. A survey was conducted which included items on previous requested treatment in other centres and on barriers of accessibility to treatment in specific ambulatory centres. A descriptive analysis and t-student and ANOVA with Scheffé post-hoc tests were carried out. 59.7% of respondents said they had requested previous treatment in non-specific resources due to physical or psychical trouble that they now relate to their alcohol use although they did not do so at the time, in addition to being motivated by their own alcohol abuse (42.8%). The most attended resources were Primary Care and Specialist Unit Care. Women showed a higher demand for treatment in Mental Health Services (p gender differences in barriers that delay access to treatment do exist. It is necessary to build gender-adapted intervention guidelines to be used in Primary Care and Mental Health services to reduce the accessibility barriers to treatment.
Does the public deserve free access to climate system science?
Grigorov, Ivo
2010-05-01
Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?
Schaap, D. M. A.; Maudire, G.
2009-04-01
is known as the Common Data Index (CDI) V0 system Version 1: harmonisation and upgrading of the metadatabases through adoption of the ISO 19115 metadata standard and provision of transparent data access and download services from all partner data centres through upgrading the Common Data Index and deployment of a data object delivery service. Version 2: adding data product services and OGC compliant viewing services and further virtualisation of data access. SeaDataNet Version 0: The SeaDataNet portal has been set up at http://www.seadatanet.org and it provides a platform for all SeaDataNet services and standards as well as background information about the project and its partners. It includes discovery services via the following catalogues: CSR - Cruise Summary Reports of research vessels; EDIOS - Locations and details of monitoring stations and networks / programmes; EDMED - High level inventory of Marine Environmental Data sets collected and managed by research institutes and organisations; EDMERP - Marine Environmental Research Projects ; EDMO - Marine Organisations. These catalogues are interrelated, where possible, to facilitate cross searching and context searching. These catalogues connect to the Common Data Index (CDI). Common Data Index (CDI) The CDI gives detailed insight in available datasets at partners databases and paves the way to direct online data access or direct online requests for data access / data delivery. The CDI V0 metadatabase contains more than 340.000 individual data entries from 36 CDI partners from 29 countries across Europe, covering a broad scope and range of data, held by these organisations. For purposes of standardisation and international exchange the ISO19115 metadata standard has been adopted. The CDI format is defined as a dedicated subset of this standard. A CDI XML format supports the exchange between CDI-partners and the central CDI manager, and ensures interoperability with other systems and networks. CDI XML entries are
Improving access to urologists through an electronic consultation service
Witherspoon, Luke; Liddy, Clare; Afkham, Amir; Keely, Erin; Mahoney, John
2017-01-01
Introduction Access to specialist services is limited by wait times and geographic availability. Champlain Building Access to Specialist Advice (BASE) has been implemented in our service region to facilitate access to specialists by primary care providers (PCPs). Through a secure web-based system, PCPs are able to send eConsults instead of requesting a formal in-office consultation. Methods Urology eConsults completed through the Champlain BASE service from March 2013 to January 2015 were analyzed. Each consult was characterized in regard to the type of question asked by the referring physician and the clinical content of the referral. Using the mandatory close-out surveys, we analyzed rates of referral avoidance, physician satisfaction, and overall impact on patient care. Results Of 190 eConsultations, 70% were completed in less than 10 minutes. The most common clinical questions related to the interpretation of imaging reports (16%) and tests to choose for investigating a condition (15%). The most common diagnoses were hematuria (13%) and renal mass (8%). In 35% of cases, referral to a urologist had originally been contemplated and was avoided. In 8% of cases, a PCP did not believe a consultation was initially needed, but a referral was ultimately initiated after the eConsultation. Conclusions Our study shows that although certain clinical presentations still require a formal in-person urological consultation, eConsultations can potentially reduce unnecessary clinic visits while identifying patients who may benefit from early urological consultation. Through both these mechanisms, we may improve timely access to urologists. PMID:28798830
Securing the Global Airspace System Via Identity-Based Security
Ivancic, William D.
2015-01-01
Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.
Vetting requests for body computed tomography
International Nuclear Information System (INIS)
Harrison, R.L.; Housden, B.; Hay, C.; Dixon, A.K.
2000-01-01
The aim of this study was to assess the process and outcome of hospitalised patients (inpatients) for whom whole-body CT was requested but not performed. For 6 months the reasons why CT was not performed were recorded, together with relevant discussions with clinicians. Subsequent referrals for alternative investigations were noted. The eventual outcome of the patients was monitored via the patients' records. Eighty-three (8 %) of 1001 inpatient requests were identified for which body CT was not performed after an electronically generated request. Fifty-five requests were not accepted by the radiology department during the vetting process for a variety of reasons (often more than one): criteria used for rejection often overlapped and included referrals outside national guidelines (n = 20), better alternative investigations (n = 29), time constraints (n = 19), over-zealous requests (n = 17) and clinicians' erroneous interpretation of preceding imaging investigations (n = 9). Sixteen CT exams were cancelled by a clinician. An additional 12 exams were not performed for miscellaneous non-medical reasons. In no case could a patient's death be ascribed to CT not being performed. Most (981 of 1001, 98 %) CT requests comply with current guidelines, disproving a perception that many radiological referrals are inappropriate. In our health care system radiologists have to turn down some appropriate CT referrals due to a lack of CT capacity. Although lack of CT contributed to delay in diagnosis, no patient died as a direct result of not having CT. (orig.)
2013-07-22
... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...
12 CFR 1403.7 - Request for amendment to record.
2010-01-01
... 1403.7 Banks and Banking FARM CREDIT SYSTEM INSURANCE CORPORATION PRIVACY ACT REGULATIONS § 1403.7... that the record be amended. Such a request shall be submitted to the Privacy Act Officer and shall... Privacy Act Officer shall acknowledge receipt of the request within 10 days (excluding Saturdays, Sundays...
2010-01-01
... Office. (c) Minors are not precluded from exercising personally those rights provided them by the Privacy... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Access by the parent of a minor or by the... Request for Access § 297.203 Access by the parent of a minor or by the legal guardian of an individual...
A Rewritable, Random-Access DNA-Based Storage System.
Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica
2015-09-18
We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.
45 CFR 164.524 - Access of individuals to protected health information.
2010-10-01
... individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format; or, if not, in a readable hard copy form or such other form or format as agreed to by the covered entity and the individual. (ii) The covered entity may...
The assessment of exploitation process of power for access control system
Wiśnios, Michał; Paś, Jacek
2017-10-01
The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.
#DDOD Use Case: Access to Medicare Part D Drug Event File (PDE) for cost transparency
U.S. Department of Health & Human Services — SUMMARY DDOD use case to request access to Medicare Part D Drug Event File (PDE) for cost transparency to pharmacies and patients. WHAT IS A USE CASE? A “Use Case”...
Seed quality of common bean accessions under organic and conventional farming systems
Directory of Open Access Journals (Sweden)
Diego Medeiros Gindri
2017-06-01
Full Text Available Agrobiodiversity is essential for a sustainable food production, and the knowledge of the potential characteristics of landrace seeds may prompt farmers to adopt the habit of seed conservation for this species. This study aimed at categorizing landrace and commercial common bean (Phaseolus vulgaris L. accessions, according to the physiological quality (viability and vigor of seeds produced in the field, during two growing seasons, under organic and conventional farming systems. Germination percentage, field emergence, electrical conductivity, accelerated aging, cold test and seedling length were assessed. The landrace bean accessions exhibit diversity in the physiological seed quality, in terms of their viability and vigor. No differences were observed between the farming systems, in relation to the physiological quality of the seeds produced. The categorization of landrace common bean accessions allows to identify those with superior physiological seed quality.
Safety Training: Access rights underground and safety training
Laetitia Laddada
2004-01-01
This is to remind all CERN Group Leaders/GLIMOS of their obligation to ensure that members of their group/experiment or personnel belonging to firms holding contracts under their responsibility have received the necessary training/instruction in safety before start of work. Access underground will only be authorized upon attendance at safety courses level 1, 2 and 3, provided by the CERN Fire Brigade. All persons not having attended these courses will be locked out. All individuals concerned, as well as their Group Leaders/GLIMOS should check the access rights of their staff at the URL: https://hrt.cern.ch/servlet/cern.hrt.Access.Access In case you or your collaborators do not have the requested authorisation, you/they must attend the safety courses provided every Tuesday by the Fire Brigade or the additional courses on: 16 June, course given in French, 9 a.m. - 12 a.m., AB Auditorium I (Bldg. 6/2-024), 17 June, course given in English, 2 p.m. - 5 p.m., AB Auditorium I (Bldg. 6/2-024). Formation en SEC...
Distributed data access in the sequential access model at the D0 experiment at Fermilab
International Nuclear Information System (INIS)
Terekhov, Igor; White, Victoria
2000-01-01
The authors present the Sequential Access Model (SAM), which is the data handling system for D0, one of two primary High Energy Experiments at Fermilab. During the next several years, the D0 experiment will store a total of about 1 PByte of data, including raw detector data and data processed at various levels. The design of SAM is not specific to the D0 experiment and carries few assumptions about the underlying mass storage level; its ideas are applicable to any sequential data access. By definition, in the sequential access mode a user application needs to process a stream of data, by accessing each data unit exactly once, the order of data units in the stream being irrelevant. The units of data are laid out sequentially in files. The adopted model allows for significant optimizations of system performance, decrease of user file latency and increase of overall throughput. In particular, caching is done with the knowledge of all the files needed in the near future, defined as all the files of the already running or submitted jobs. The bulk of the data is stored in files on tape in the mass storage system (MSS) called Enstore[2] and also developed at Fermilab. (The tape drives are served by an ADIC AML/2 Automated Tape Library). At any given time, SAM has a small fraction of the data cached on disk for processing. In the present paper, the authors discuss how data is delivered onto disk and how it is accessed by user applications. They will concentrate on data retrieval (consumption) from the MSS; when SAM is used for storing of data, the mechanisms are rather symmetrical. All of the data managed by SAM is cataloged in great detail in a relational database (ORACLE). The database also serves as the persistency mechanism for the SAM servers described in this paper. Any client or server in the SAM system which needs to store or retrieve information from the database does so through the interfaces of a CORBA-based database server. The users (physicists) use the
Durso, Francis T.; Johnson, Brian R.; Crutchfield, Jerry M.
2010-01-01
In an effort to determine the information needs of tower air traffic controllers, instructors from the Federal Aviation Administration's Academy in Oklahoma City were asked to control traffic in a high-fidelity tower cab simulator. Information requests were made apparent by eliminating access to standard tower information sources. Instead,…
2012-05-02
... education and training, (3) measures of student debt and financial aid, and (4) the extent of participation... DEPARTMENT OF EDUCATION Notice of Proposed Information Collection Requests; Institute of Education... Education that focuses on the effects of expanded access to Pell grants on students' employment and earnings...
Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang
Directory of Open Access Journals (Sweden)
Ahmad Budi Setiawan
2012-03-01
Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.
An end-to-end secure patient information access card system.
Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T
2000-03-01
The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.
Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)
Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...
16 CFR 1014.8 - Appeal of initial denial of access, correction or amendment.
2010-01-01
... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Appeal of initial denial of access, correction or amendment. 1014.8 Section 1014.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION... Federal District Court for judicial review of the decision; and (3) The right of the requester to file...
28 CFR 16.72 - Exemption of Office of the Associate Attorney General System-limited access.
2010-07-01
... Attorney General System-limited access. 16.72 Section 16.72 Judicial Administration DEPARTMENT OF JUSTICE....72 Exemption of Office of the Associate Attorney General System—limited access. (a) The following...) General Files System of the Office of the Associate Attorney General (JUSTICE/AAG-001). These exemptions...
Directory of Open Access Journals (Sweden)
Andrey V. Degtyarev
2015-01-01
Full Text Available The task of administering software-information complex occurs duringthe development of application systems for managing business-processes and is connected with the organization of access forusers to information resources in conditions of multi-user information systems for management. For solution of this problem proposed theapproach, which is based on a hierarchical system of access rightsto information resources on the levels: tool, object and procedural.Keywords: software-information complex, information resources,administering, permissions, separation of powers, access model.
Access to Justice in the European Convention on Human Rights System
Glas, L.R.; Gerards, J.H.
2017-01-01
The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference
2013-05-28
... Information Collection for Public Comment; Request Voucher for Grant Payment and Line of Credit Control System... information: Title Of Proposal: Request Voucher for Grant Payment and Line of Credit Control System (LOCCS... and proposed use: Payment request vouchers for distribution of grant funds using the automated Voice...
Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems
Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu
5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.
78 FR 123 - Diablo Canyon, Independent Spent Fuel Storage Installation; License Amendment Request...
2013-01-02
... information previously available; and (iii) the filing has been submitted in a timely fashion based on the... appearance under 10 CFR 2.315(a), by making an oral or written statement of his or her position on the issues... and resolve requests for access to SUNSI, and motions for protective orders, in a timely fashion in...
Berk, G.; Jean, P. N.; Rotholz, E.
1982-01-01
Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.
Enabling remote access to projects in a large collaborative environment
International Nuclear Information System (INIS)
Pais, V.F.; Balme, S.; Akpangny, H.S.; Iannone, F.; Strand, P.
2010-01-01
In the context of the Integrated Tokamak Modelling Task Force, a large number of software projects are made available to the task force members, including developers and end-users. This has been achieved through a combination of tools and technologies. The front-end is represented by a Java based portal system exposing a PHP project management system, GForge. These two applications are linked by a single sign-on mechanism, Shibboleth , and through secure HTTP request rewriting, where appropriate. Furthermore, the underlying storage facility is an OpenAFS distributed file system and the user base comes from both a network information server and an LDAP directory. Security mechanisms are those of a distributed system, with multiple access points and protocols used for reading and writing data. The present paper presents the challenges of integrating these different technologies and programming languages into a single, working, application presented to its users as a web portal. Chaining of the tools is explored through the user perspective, with an in-depth overview of the background transitions between the various systems involved with regard to security requirements for the front-end nodes and the policies as seen by the users.
Enabling remote access to projects in a large collaborative environment
Energy Technology Data Exchange (ETDEWEB)
Pais, V.F., E-mail: pvf2005@gmail.co [Laser Department, National Institute for Laser, Plasma and Radiation Physics, P.O. Box MG-36, Bucharest 077125, Association EURATOM/MEdC (Romania); Balme, S.; Akpangny, H.S. [Association EURATOM CEA/IRFM CEA-Cadarache (France); Iannone, F. [Associazione EURATOM-ENEA sulla Fusione, C.R.ENEA Frascati, via E.Fermi 45, 00044 Frascati, Rome (Italy); Strand, P. [Department of Radio and Space Science, Chalmers University of Technology, SE-412 96 Goteborg (Sweden)
2010-07-15
In the context of the Integrated Tokamak Modelling Task Force, a large number of software projects are made available to the task force members, including developers and end-users. This has been achieved through a combination of tools and technologies. The front-end is represented by a Java based portal system exposing a PHP project management system, GForge. These two applications are linked by a single sign-on mechanism, Shibboleth , and through secure HTTP request rewriting, where appropriate. Furthermore, the underlying storage facility is an OpenAFS distributed file system and the user base comes from both a network information server and an LDAP directory. Security mechanisms are those of a distributed system, with multiple access points and protocols used for reading and writing data. The present paper presents the challenges of integrating these different technologies and programming languages into a single, working, application presented to its users as a web portal. Chaining of the tools is explored through the user perspective, with an in-depth overview of the background transitions between the various systems involved with regard to security requirements for the front-end nodes and the policies as seen by the users.
Rustamov, Samir; Mustafayev, Elshan; Clements, Mark A.
2018-04-01
The context analysis of customer requests in a natural language call routing problem is investigated in the paper. One of the most significant problems in natural language call routing is a comprehension of client request. With the aim of finding a solution to this issue, the Hybrid HMM and ANFIS models become a subject to an examination. Combining different types of models (ANFIS and HMM) can prevent misunderstanding by the system for identification of user intention in dialogue system. Based on these models, the hybrid system may be employed in various language and call routing domains due to nonusage of lexical or syntactic analysis in classification process.
Directory of Open Access Journals (Sweden)
Rustamov Samir
2018-04-01
Full Text Available The context analysis of customer requests in a natural language call routing problem is investigated in the paper. One of the most significant problems in natural language call routing is a comprehension of client request. With the aim of finding a solution to this issue, the Hybrid HMM and ANFIS models become a subject to an examination. Combining different types of models (ANFIS and HMM can prevent misunderstanding by the system for identification of user intention in dialogue system. Based on these models, the hybrid system may be employed in various language and call routing domains due to nonusage of lexical or syntactic analysis in classification process.
Boesch, Miriam C.; Wendt, Oliver; Subramanian, Anu; Hsu, Ning
2013-01-01
An experimental, single-subject research study investigated the comparative efficacy of the Picture Exchange Communication System (PECS) versus a speech-generating device (SGD) in developing requesting skills for three elementary-age children with severe autism and little to no functional speech. Results demonstrated increases in requesting…
International Nuclear Information System (INIS)
Brown, J.C.
1994-08-01
Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today's situation analyst's have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today's technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses
GP preferences for information systems: conjoint analysis of speed, reliability, access and users.
Wyatt, Jeremy C; Batley, Richard P; Keen, Justin
2010-10-01
To elicit the preferences and trade-offs of UK general practitioners about key features of health information systems, to help inform the design of such systems in future. A stated choice study to uncover implicit preferences based on a binary choice between scenarios presented in random order. were all 303 general practice members of the UK Internet service provider, Medix who were approached by email to participate. The main outcome measure was the number of seconds delay in system response that general practitioners were willing to trade off for each key system feature: the reliability of the system, the sites from which the system could be accessed and which staff are able to view patient data. Doctors valued speed of response most in information systems but would be prepared to wait 28 seconds to access a system in exchange for improved reliability from 95% to 99%, a further 2 seconds for an improvement to 99.9% and 27 seconds for access to data from anywhere including their own home compared with one place in a single health care premises. However, they would require a system that was 14 seconds faster to compensate for allowing social care as well as National Health Service staff to read patient data. These results provide important new evidence about which system characteristics doctors value highly, and hence which characteristics designers need to focus on when large scale health information systems are planned. © 2010 Blackwell Publishing Ltd.
Young, Millennia; Van Baalen, Mary
2016-01-01
This session is intended to provide to HRP IWS attendees instant feedback on archived astronaut data, including such topics as content of archives, access, request processing, and data format. Members of the LSAH and LSDA teams will be available at a 'help desk' during the poster sessions to answer questions from researchers.
2012-06-19
... PERFORMS, the performance management system for the UI program. UI PERFORMS incorporates a strategic... collection request (ICR) titled, ``Tax Performance System,'' to the Office of Management and Budget (OMB) for... for OMB Review; Comment Request; Tax Performance System ACTION: Notice. SUMMARY: The Department of...
28 CFR 16.83 - Exemption of the Executive Office for Immigration Review System-limited access.
2010-07-01
... Immigration Review System-limited access. 16.83 Section 16.83 Judicial Administration DEPARTMENT OF JUSTICE....83 Exemption of the Executive Office for Immigration Review System—limited access. (a) The following system of records is exempt from 5 U.S.C. 552a(d): (1) The Executive Office for Immigration Review's...
Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System
Toh, Keat Beng; Tachikawa, Shin'ichi
This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.
Optimal Cognitive Access and Packet Selection Under a Primary ARQ Process via Chain Decoding
DEFF Research Database (Denmark)
Michelusi, Nicolò; Popovski, Petar; Zorzi, Michele
2016-01-01
This paper introduces a novel technique that enables access by a cognitive secondary user (SU) to a spectrum occupied by an incumbent primary user (PU) that employs Type-I hybrid automatic retransmission request (ARQ). The technique allows the SU to perform selective retransmissions of SU data pa...
Digital Autonomous Terminal Access Communication (DATAC) system
Novacki, Stanley M., III
1987-01-01
In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.
2013-04-03
... Request; Comment Request; Reformulated Gasoline Commingling Provisions AGENCY: Environmental Protection... information collection request (ICR), ``Reformulated Gasoline Commingling Provisions'' (EPA ICR No.2228.04.... Abstract: EPA would like to continue collecting notifications from gasoline retailers and wholesale...
2010-06-14
...On May 11, 2010, the Department of Energy (DOE) published a Request for Information seeking comments and information from interested parties to assist DOE in understanding current and potential practices and policies for the states and other entities to empower consumers (and perhaps others) through access to detailed energy information in electronic form--including real-time information from smart meters, historical consumption data, and pricing and billing information. DOE will hold a public meeting as part of this request for information.
Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul
2016-01-01
ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.
Usage Control Enhanced Access Control Based on XACML%使用控制支持的基于XACML的访问控制
Institute of Scientific and Technical Information of China (English)
陶宇炜; 符彦惟
2011-01-01
针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型.用可扩展访问标记语占XACML描述访问控制的授权策略,结合SAML声明和请求/响应机制,根据用户、资源、环境的属性进行访问控制决策,可动态地评估访问请求,提供细粒度的访问控制和良好的互操作性.%Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML. The paper describes authorization policy about access control by XACML, combines SAML statement and request/response mechanism, executes access control decision based on user, resource and environment attributes, evaluates access request dynamically, and provides fine-grained access control and good interoperability.
A High Speed Mobile Communication System implementing Bicasting Architecture on the IP Layer
Yamada, Kazuhiro
2012-01-01
Having a broadband connection on high speed rails is something that business travelers want most. Increasing number of passengers is requesting even higher access speeds. We are proposing the Media Convergence System as an ideal communication system for future high speed mobile entities. The Media Convergence System recognizes plural wireless communication media between the ground network and each train, and then traffic is load-balanced over active media which varies according to circumstanc...
The new space and earth science information systems at NASA's archive
Energy Technology Data Exchange (ETDEWEB)
Green, J.L. (NASA, Goddard Space Flight Center, Greenbelt, MD (USA))
1990-01-01
The on-line interactive systems of the National Space Science Data Center (NSSDC) are examined. The worldwide computer network connections that allow access to NSSDC users are outlined. The services offered by the NSSDC new technology on-line systems are presented, including the IUE request system, ozone TOMS data, and data sets on astrophysics, atmospheric science, land sciences, and space plasma physics. Plans for future increases in the NSSDC data holdings are considered. 8 refs.
REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS
Relations with the Host States Service
2002-01-01
The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards.Relations with the Host States Service Tel. 72848
Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.
1988-01-01
The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.
2010-08-03
... DEPARTMENT OF AGRICULTURE Farm Service Agency Information Collection; Customer Data Worksheet Request for Service Center Information Management System (SCIMS) Record Changes AGENCY: Farm Service... Customer Data Worksheet Request for Service Center Information Management System (SCIMS) that contains the...
Inaty, Elie; Raad, Robert; Tablieh, Nicole
2011-08-01
Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.
Directory of Open Access Journals (Sweden)
Brian D Nicholson
Full Text Available The 2015 NICE guidelines for suspected cancer recommend that English General Practitioners have direct access to diagnostic tests to investigate symptoms of cancer that do not meet the criteria for urgent referral. We aimed to identify the proportion of GPs in England with direct access to these tests.We recruited 533 English GPs through a national clinical research network to complete an online survey about direct access to laboratory, radiology, and endoscopy tests in the three months leading up to the release of the 2015 NICE guidance. If they had direct access to a diagnostic test, GPs were asked about the time necessary to arrange a test and receive a report. Results are reported by NHS sub-region and, adjusting for sampling, for England as a whole.Almost all GPs reported direct access to x-ray and laboratory investigations except faecal occult blood testing (54%, 95% CI 49-59% and urine protein electrophoresis (89%, 95% CI 84-92%. Fewer GPs had direct access to CT scans (54%, 95% CI 49-59% or endoscopy (colonoscopy 32%, 95% CI 28-37%; gastroscopy 72%, 95% CI 67-77%. There was significant variation in direct access between NHS regions for the majority of imaging tests-for example, from 20 to 85% to MRI. Apart from x-ray, very few GPs (1-22% could access radiology and endoscopy within the timescales recommended by NICE. The modal request to test time was 2-4 weeks for routine radiology and 4-6 weeks for routine endoscopy with results taking another 1-2 weeks.At the time that the 2015 NICE guideline was released, local investment was required to not only provide direct access but also reduce the interval between request and test and speed up reporting. Further research using our data as a benchmark is now required to identify whether local improvements in direct access have been achieved in response to the NICE targets. If alternative approaches to test access are to be proposed they must be piloted comprehensively and underpinned by robust
Broadband and scalable mobile satellite communication system for future access networks
Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi
2005-07-01
Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.
International Nuclear Information System (INIS)
Hata, Yasuhiro; Morita, Sojiro; Morita, Yoshitaka; Awatani, Toshihide; Takasaki, Motohiro; Horimi, Tadashi; Ozawa, Zen
1998-01-01
Purpose: We describe the technique, efficacy, and complications of fluoroscopy-guided implantation of a central venous access device using a peripherally accessed system (PAS) port via the forearm. Methods: Beginning in July 1994, 105 central venous access devices were implanted in 104 patients for the long-term infusion of antibiotics or antineoplasmic agents, blood products, or parenteral nutrition. The devices was inserted under fluoroscopic guidance with real-time venography from a peripheral route. Results: All ports were successfully implanted. There were no procedure-related complications. No thrombosis or local infection was observed; however, in six patients catheter-related phlebitis occurred. Conclusion: Fluoroscopy-guided implantation of a central venous access device using a PAS port via the forearm is safe and efficacious, and injection of contrast medium through a peripheral IV catheter before introduction of the catheter helps to avoid catheter-related phlebitis
Salehi, Jawad A.; Brackett, Charles A.
1989-08-01
A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.
Dynamic RACH Partition for Massive Access of Differentiated M2M Services
Directory of Open Access Journals (Sweden)
Qinghe Du
2016-03-01
Full Text Available In machine-to-machine (M2M networks, a key challenge is to overcome the overload problem caused by random access requests from massive machine-type communication (MTC devices. When differentiated services coexist, such as delay-sensitive and delay-tolerant services, the problem becomes more complicated and challenging. This is because delay-sensitive services often use more aggressive policies, and thus, delay-tolerant services get much fewer chances to access the network. To conquer the problem, we propose an efficient mechanism for massive access control over differentiated M2M services, including delay-sensitive and delay-tolerant services. Specifically, based on the traffic loads of the two types of services, the proposed scheme dynamically partitions and allocates the random access channel (RACH resource to each type of services. The RACH partition strategy is thoroughly optimized to increase the access performances of M2M networks. Analyses and simulation demonstrate the effectiveness of our design. The proposed scheme can outperform the baseline access class barring (ACB scheme, which ignores service types in access control, in terms of access success probability and the average access delay.
Access Denied! Contrasting Data Access in the United States and Ireland
Directory of Open Access Journals (Sweden)
Grogan Samuel
2016-07-01
Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.
Directory of Open Access Journals (Sweden)
Gonzalo Iglesias Rossini
2014-06-01
Full Text Available Our country has followed a clear trend towards the recognition of various mechanisms of citizen participation and access to public information regarding environmental issues A few years ago, if, for instance, a person or group of people, concerned about the potential environmental impact caused by the establishment of a factory in their neighborhood, requested information from the Authorities, such request would have most likely been rejected. At present, there is a clear law-making policy towards acknowledging the possibility for a diversity of social players to be involved at different levels. In a State structured under a social rule of law, both community participation and civil society access to information in possession of the State, regarding issues that may affect the environment, are fundamental rights. Both concepts, information and participation, must go hand in hand, as the first operates as a condition to exercise the second. Civil society involvement in an environmental issue could never occur if, for instance, information held by the Government is not made available. In addition to protecting fundamental human rights, these concepts are enshrined in participatory democracy. They also enable civil society to be involved in environmental pollution issues. This paper is intended to provide a detailed research on the different instruments enshrining citizen participation and access to public information about environmental issues.
A Novel Medium Access Control for Ad hoc Networks Based on OFDM System
Institute of Scientific and Technical Information of China (English)
YU Yi-fan; YIN Chang-chuan; YUE Guang-xin
2005-01-01
Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.
22 CFR 212.36 - Denial of request for access to records.
2010-04-01
... Section 212.36 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency... responsible for the denial, and the right of the person to appeal the adverse determination. (b) The denial of... Administrative Services, Bureau for Management, Room 803, SA-2, Agency for International Development, 21st and...
Market opening and information systems
International Nuclear Information System (INIS)
Dardevet, G.; Dardoise, P.; Dreyer, P.; Flahaut, P.
2007-01-01
The opening of energy markets to competition requires relevant information systems accessible to all end-users in concern without any discrimination. So, how existing information systems can be changed to become conformable with the requested requirements? Concerning the last step of the opening of energy markets which concerns several millions of clients, how this problem will be overcome considering the huge volume of processing needed? Who will decide or pay the forthcoming upgrades of the information system with respect to the evolution of actors' needs? Four participants were invited to this round table to answer these questions. Their answers are reported in this article. (J.S.)
Programmatic access to logical models in the Cell Collective modeling environment via a REST API.
Kowal, Bryan M; Schreier, Travis R; Dauer, Joseph T; Helikar, Tomáš
2016-01-01
Cell Collective (www.cellcollective.org) is a web-based interactive environment for constructing, simulating and analyzing logical models of biological systems. Herein, we present a Web service to access models, annotations, and simulation data in the Cell Collective platform through the Representational State Transfer (REST) Application Programming Interface (API). The REST API provides a convenient method for obtaining Cell Collective data through almost any programming language. To ensure easy processing of the retrieved data, the request output from the API is available in a standard JSON format. The Cell Collective REST API is freely available at http://thecellcollective.org/tccapi. All public models in Cell Collective are available through the REST API. For users interested in creating and accessing their own models through the REST API first need to create an account in Cell Collective (http://thecellcollective.org). thelikar2@unl.edu. Technical user documentation: https://goo.gl/U52GWo. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Health Information System Role-Based Access Control Current Security Trends and Challenges.
de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo
2018-01-01
This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
78 FR 46332 - Proposed Information Collection Request; Comment Request; National Estuary Program
2013-07-31
... Request; Comment Request; National Estuary Program AGENCY: Environmental Protection Agency (EPA). ACTION... request (ICR), ``National Estuary Program'' (EPA ICR No. 1500.08, OMB Control No. 2040-0138 to the Office... comments to OMB. Abstract: The National Estuary Program (NEP) involves collecting information from the...
28 CFR 513.11 - Procedures for requesting a FBI identification record or a NCIC/III record.
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Procedures for requesting a FBI identification record or a NCIC/III record. 513.11 Section 513.11 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE GENERAL MANAGEMENT AND ADMINISTRATION ACCESS TO RECORDS Production or Disclosure of FBI...
Directory of Open Access Journals (Sweden)
Carmelo R. García
2015-08-01
Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.
Maximilien Brice
2006-01-01
The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.
Directory of Open Access Journals (Sweden)
Emilio Guichot Reina
2017-11-01
Full Text Available The new public independent authorities in charge of access to information’s claims have adopted conflicting positions on the rules applicable to requests for information made by political representatives and on their own competence to hear complaints they may raise. The right of access to the information of the political representatives cannot have a smaller scope in its substantive, procedural and guarantees content than the one that the new regulation on transparency and access to the information recognizes to any person. The case law of the Supreme Court has consistently affirmed this. It would contribute to legal certainty if this criterion was followed by every new public independent authorities and it was expressly established by a future legislative reform.
REMINDER - PERIOD OF VALIDITY OF CERN (ACCESS) CARDS
Relations with the Host States Service
2003-01-01
The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848
REMINDER PERIOD OF VALIDITY OF CERN (ACCESS) CARDS
Relations with the Host States Service
2002-01-01
The period of validity of CERN (access) cards not bearing an expiry date has been extended from 30 June to 31 December 2002 (see paragraph 17.4 of the Implementation Measures relating to Operational Circular n° 2). Holders of such cards are kindly requested to have their cards renewed either at the Users Office (in the case of Users) or at the Registration Service (all the others) from 1 August 2002 onwards. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848
Directory of Open Access Journals (Sweden)
Svetlana A. Firsova
2016-06-01
Full Text Available Introduction: this article explores the pedagogical technology employed to teach medical students foundations of work with MICROSOFT ACCESS databases. The above technology is based on integrative approach to the information modeling in public health practice, drawing upon basic didactic concepts that pertain to objects and tools databases created in MICROSOFT ACCESS. The article examines successive steps in teaching the topic “Queries in MICROSOFT ACCESS” – from simple queries to complex ones. The main attention is paid to such components of methodological system, as the principles and teaching methods classified according to the degree of learners’ active cognitive activity. The most interesting is the diagram of the relationship of learning principles, teaching methods and specific types of requests. Materials and Methods: the authors used comparative analysis of literature, syllabi, curricula in medical informatics taught at leading medical universities in Russia. Results: the original technique of training in putting queries with databases of MICROSOFT ACCESS is presented for analysis of information models in practical health care. Discussion and Conclusions: it is argued that the proposed pedagogical technology will significantly improve the effectiveness of teaching the course “Medical Informatics”, that includes development and application of models to simulate the operation of certain facilities and services of the health system which, in turn, increases the level of information culture of practitioners.
Is the Japanese Distribution System Becoming More Accessible to Foreign Firms?
Ralf bebenroth; Nir Kshetri; Reinhard Hunerberg
2009-01-01
Complexities in the Japanese distribution system are well-publicized. An emerging body of literature has documented recent changes in the Japanese distribution system. In this paper, it is examined whether foreign firms' accessibility to the Japanese distribution system has changed in a favorable direction in recent years. Furthermore, as foreign firms vary widely in terms of institutional barriers and complexity they face in the Japanese market, the authors also investigate the determinants ...
National Geothermal Data System: an Exemplar of Open Access to Data
Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.
2013-12-01
The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational
DEFF Research Database (Denmark)
Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick
2015-01-01
This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...
Remotely Sensed Land Imagery and Access Systems: USGS Updates
Lamb, R.; Pieschke, R.; Lemig, K.
2017-12-01
The U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center has implemented a number of updates to its suite of remotely sensed products and distribution systems. These changes will greatly expand the availability, accessibility, and usability of the image products from USGS. As of late 2017, several new datasets are available for public download at no charge from USGS/EROS Center. These products include Multispectral Instrument (MSI) Level-1C data from the Sentinel-2B satellite, which was launched in March 2017. Along with Sentinel-2A, the Sentinel-2B images are now being distributed through USGS systems as part of a collaborative effort with the European Space Agency (ESA). The Sentinel-2 imagery is highly complementary to multispectral data collected by the USGS Landsat 7 and 8 satellites. With these two missions operating together, the potential local revisit rate can be reduced to 2-4 days. Another product addition is Resourcesat-2 data acquired over the United States by the Indian Space Research Organisation (ISRO). The Resourcesat-2 products from USGS consist of Advanced Wide Field Sensor (AWiFS) and Linear Imaging Self-Scanning Sensor Three (LISS-3) images acquired August 2016 to present. In an effort to maximize future Landsat data interoperability, including time series analysis of the 45+ year archive, the reprocessing of Collection 1 for all historical Landsat Level 1 products is nearly complete. The USGS is now working on operational release of higher-level science products to support analysis of the Landsat archive at the pixel level. Major upgrades were also completed in 2017 for several USGS data discovery and access systems, including the LandsatLook Viewer (https://landsatlook.usgs.gov/) and GloVis Tool (https://glovis.usgs.gov/). Other options are now being developed to further enhance data access and overall user experience. These future options will be discussed and community feedback will be encouraged.
Shared random access memory resource for multiprocessor real-time systems
International Nuclear Information System (INIS)
Dimmler, D.G.; Hardy, W.H. II
1977-01-01
A shared random-access memory resource is described which is used within real-time data acquisition and control systems with multiprocessor and multibus organizations. Hardware and software aspects are discussed in a specific example where interconnections are done via a UNIBUS. The general applicability of the approach is also discussed
International Nuclear Information System (INIS)
Wu, Xinxing; Wang, Jianjun
2016-01-01
Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.
Web-Based Requesting and Scheduling Use of Facilities
Yeager, Carolyn M.
2010-01-01
Automated User's Training Operations Facility Utilization Request (AutoFUR) is prototype software that administers a Web-based system for requesting and allocating facilities and equipment for astronaut-training classes in conjunction with scheduling the classes. AutoFUR also has potential for similar use in such applications as scheduling flight-simulation equipment and instructors in commercial airplane-pilot training, managing preventive- maintenance facilities, and scheduling operating rooms, doctors, nurses, and medical equipment for surgery. Whereas requesting and allocation of facilities was previously a manual process that entailed examination of documents (including paper drawings) from different sources, AutoFUR partly automates the process and makes all of the relevant information available via the requester s computer. By use of AutoFUR, an instructor can fill out a facility-utilization request (FUR) form on line, consult the applicable flight manifest(s) to determine what equipment is needed and where it should be placed in the training facility, reserve the corresponding hardware listed in a training-hardware inventory database, search for alternative hardware if necessary, submit the FUR for processing, and cause paper forms to be printed. Auto-FUR also maintains a searchable archive of prior FURs.
Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy
International Nuclear Information System (INIS)
Kulcsar, Zsolt; Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.
2010-01-01
In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.
2012-08-17
...Authentication Service (eAuth), located at http://www.eauth.egov.usda.gov . The USDA eAuth service provides the... Electronic Access Code. OMB Number: 0503-0014. Expiration Date of Approval: August 31, 2013. Type of Request... eAuth as a management and technical process that addresses user authentication and authorization...
Aiken, Abigail R A; Guthrie, Katherine A; Schellekens, Marlies; Trussell, James; Gomperts, Rebecca
2018-02-01
To examine reasons for seeking abortion services outside the formal healthcare system in Great Britain, where abortion is legally available. We conducted a mixed-methods study among women resident in England, Scotland, and Wales who requested at-home medication abortion through online telemedicine initiative Women on Web (WoW) between November 22, 2016, and March 22, 2017. We examined the demographics and circumstances of all women requesting early medication abortion and conducted a content analysis of a sample of their anonymized emails to the service to explore their reasons for seeking help. Over a 4-month period, 519 women contacted WoW seeking medication abortion. These women were diverse with respect to age, parity, and circumstance. One hundred eighty women reported 209 reasons for seeking abortion outside the formal healthcare setting. Among all reasons, 49% were access barriers, including long waiting times, distance to clinic, work or childcare commitments, lack of eligibility for free NHS services, and prior negative experiences of abortion care; 30% were privacy concerns, including lack of confidentiality of services, perceived or experienced stigma, and preferring the privacy and comfort of using pills at home; and 18% were controlling circumstances, including partner violence and partner/family control. Despite the presence of abortion services in Great Britain, a diverse group of women still experiences logistical and personal barriers to accessing care through the formal healthcare system, or prefer the privacy of conducting their abortions in their own homes. Health services commissioning bodies could address existing barriers if supported by policy frameworks. The presence of multiple barriers to accessing abortion care in Great Britain highlights the need for future guidelines to recommend a more woman-centered approach to service provision. Reducing the number of clinic visits and designing services to meet the needs of those living in
2013-07-12
... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OECA-2013-0413; FRL--9832-8] Proposed Information Collection Request; Comment Request; Performance Evaluation Studies on Wastewater Laboratories (Renewal); EPA... request (ICR), ``Performance Evaluation Studies on Wastewater Laboratories'' (EPA ICR No. 0234.11, OMB...
32 CFR 806.29 - Administrative processing of Air Force FOIA requests.
2010-07-01
... FORCE ADMINISTRATION AIR FORCE FREEDOM OF INFORMATION ACT PROGRAM § 806.29 Administrative processing of... information systems by processing a simple request/providing a response in the electronic format requested.../service/a nongovernment source (Exemption 4), records are part of the Air Force's decision-making process...
ATLAS, an integrated structural analysis and design system. Volume 4: Random access file catalog
Gray, F. P., Jr. (Editor)
1979-01-01
A complete catalog is presented for the random access files used by the ATLAS integrated structural analysis and design system. ATLAS consists of several technical computation modules which output data matrices to corresponding random access file. A description of the matrices written on these files is contained herein.
Request for Travel Funds for Systems Radiation Biology Workshop
Energy Technology Data Exchange (ETDEWEB)
Barcellos-Hoff, Mary Helen [NYU School of Medicine
2014-03-22
The 3rd International Systems Radiation Biology Workshop brought together the major European, US and Japanese research programs on radiation risk as well as selected experts representing systems biological approaches to discuss how the new methodologies could be best exploited for low dose research. A significant part of the workshop was devoted to discussions organised as breakout group sessions. To facilitate discussions number of participants was limited to 60 persons. To achieve the goals of this symposium in this international conference, support from DOE is vital. Hence, this proposal requested support in the amount of $15,000 to cover the travel expenses of international experts and radiation biology scientists from the United States. This supporting mechanism was clearly identified to the selected US participants as a conference support award from the DOE (See attached PDF). The workshop was an outstanding opportunity to strengthen interactions between leading experts in the emerging areas of radiation sciences, and will also provide opportunities for younger scientists to meet with experts and discuss their results. This workshop was designed to endorse active engagement in international collaboration. A major objective of this conference was to effectively communicate research results, in order to ensure that current thinking reflects sound science of radiation biology. Further, this international event addressed the use and success of scientific initiatives in radiation biology for policymakers, standard-setters, and the general public.
First Experiences Using XACML for Access Control in Distributed Systems
Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit
2003-01-01
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.
Directory of Open Access Journals (Sweden)
Luis Joyanes Aguilar
2009-12-01
Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.
National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents
Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.
2014-12-01
The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using
Enabling remote access to projects in a large collaborative environment
Energy Technology Data Exchange (ETDEWEB)
Pais, V. [INFLPR National Institute for Laser, Plasma and Radiation Physics, Magurele (Romania); Balme, S. [CEA Cadarache, IRFM, 13 - Saint-Paul-lez-Durance (France); Iannonec, F. [Associazione EURATOM-ENEA sulla Fusione, Frascati (Italy); Strand, P. [Department of Radio and Space Science, Chalmers University of Technology, Goteborg (Sweden)
2009-07-01
In the context of the Integrated Tokamak Modeling Task Force, a large number of software projects are made available to the task force members, including developers and end-users. This has been achieved through a combination of tools and technologies. The front-end is represented by a Java based portal system exposing a PHP project management system, Gforge. These two applications are linked by a single sign-on mechanism, Shibboleth, and through secure HTTP request rewriting, where appropriate. Furthermore, the underlying storage facility is an OpenAFS distributed file system and the user base comes from both a network information server and an LDAP directory. Security mechanisms are those of a distributed system, with multiple access points and protocols used for reading and writing data. This document presents the challenges of integrating these different technologies and programming languages into a single, working, application presented to its users as a web portal. The chaining of the tools is explored through the user perspective, with an in-depth overview of the background transitions between the various systems involved with regard to security requirements for the front-end nodes and the policies as seen by the users. This document is composed of a poster and its abstract. (authors)
Remote Memory Access Protocol Target Node Intellectual Property
Haddad, Omar
2013-01-01
The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.
Sarkar, Urmimala; Karter, Andrew J; Liu, Jennifer Y; Adler, Nancy E; Nguyen, Robert; López, Andrea; Schillinger, Dean
2011-05-01
The authors investigated use of the internet-based patient portal, kp.org, among a well-characterized population of adults with diabetes in Northern California. Among 14,102 diverse patients, 5671 (40%) requested a password for the patient portal. Of these, 4311 (76%) activated their accounts, and 3922 (69%), logged on to the patient portal one or more times; 2990 (53%) participants viewed laboratory results, 2132 (38%) requested medication refills, 2093 (37%) sent email messages, and 835 (15%) made medical appointments. After adjustment for age, gender, race/ethnicity, immigration status, educational attainment, and employment status, compared to non-Hispanic Caucasians, African-Americans and Latinos had higher odds of never logging on (OR 2.6 (2.3 to 2.9); OR 2.3 (1.9 to 2.6)), as did those without an educational degree (OR compared to college graduates, 2.3 (1.9 to 2.7)). Those most at risk for poor diabetes outcomes may fall further behind as health systems increasingly rely on the internet and limit current modes of access and communication.
2013-04-03
... Collection; Comments Requested: Request for Recognition of a Non-profit Religious, Charitable, Social Service... Approved Collection. (2) Title of the Form/Collection: Request for Recognition of a Non- profit Religious, Charitable, Social Service, or Similar Organization. (3) Agency form number, if any, and the applicable...
Byun, Tae-Young
This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.
2011-04-07
... you will need and tell us how to contact you if we need more information. Make your request as early...-418-2498 (voice), 202-418-1169 (TTY), or [email protected] (e-mail); or Alison Neplokh, Media Bureau... or digital broadcast television; accessible user interfaces on video programming devices; and...
Compilation of requests for nuclear data
International Nuclear Information System (INIS)
Weston, L.W.; Larson, D.C.
1993-02-01
This compilation represents the current needs for nuclear data measurements and evaluations as expressed by interested fission and fusion reactor designers, medical users of nuclear data, nuclear data evaluators, CSEWG members and other interested parties. The requests and justifications are reviewed by the Data Request and Status Subcommittee of CSEWG as well as most of the general CSEWG membership. The basic format and computer programs for the Request List were produced by the National Nuclear Data Center (NNDC) at Brookhaven National Laboratory. The NNDC produced the Request List for many years. The Request List is compiled from a computerized data file. Each request has a unique isotope, reaction type, requestor and identifying number. The first two digits of the identifying number are the year in which the request was initiated. Every effort has been made to restrict the notations to those used in common nuclear physics textbooks. Most requests are for individual isotopes as are most ENDF evaluations, however, there are some requests for elemental measurements. Each request gives a priority rating which will be discussed in Section 2, the neutron energy range for which the request is made, the accuracy requested in terms of one standard deviation, and the requested energy resolution in terms of one standard deviation. Also given is the requestor with the comments which were furnished with the request. The addresses and telephone numbers of the requestors are given in Appendix 1. ENDF evaluators who may be contacted concerning evaluations are given in Appendix 2. Experimentalists contemplating making one of the requested measurements are encouraged to contact both the requestor and evaluator who may provide valuable information. This is a working document in that it will change with time. New requests or comments may be submitted to the editors or a regular CSEWG member at any time
International Nuclear Information System (INIS)
Mele, Salvatore
2007-01-01
The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.
2012-04-27
... Collection; Comments Requested; Request for Recognition of a Non-Profit Religious, Charitable, Social Service...) Title of the Form/Collection: Request for Recognition of a Non- profit Religious, Charitable, Social... organization meets the regulatory and relevant case law requirements for recognition by the Board as a legal...
2013-06-18
... Collection; Comments Requested: Request for Recognition of a Non-Profit Religious, Charitable, Social Service... Collection. (2) Title of the Form/Collection: Request for Recognition of a Non- profit Religious, Charitable, Social Service, or Similar Organization. (3) Agency form number, if any, and the applicable component of...
Predictors of appendiceal perforation in an equal access system.
Walker, Avery; Hatch, Quinton; Drake, Thurston; Nelson, Daniel W; Fitzpatrick, Emilie; Bingham, Jason; Black, George; Maykel, Justin A; Steele, Scott R
2014-07-01
Discrepancies in socioeconomic factors have been associated with higher rates of perforated appendicitis. As an equal-access health care system theoretically removes these barriers, we aimed to determine if remaining differences in demographics, education, and pay result in disparate outcomes in the rate of perforated appendicitis. All patients undergoing appendectomy for acute appendicitis (November 2004-October 2009) at a tertiary care equal access institution were categorized by demographics and perioperative data. Rank of the sponsor was used as a surrogate for economic status. A multivariate logistic regression model was performed to determine patient and clinical characteristics associated with perforated appendicitis. A total of 680 patients (mean age 30±16 y; 37% female) were included. The majority were Caucasian (56.4% [n=384]; African Americans 5.6% [n=38]; Asians 1.9% [n=13]; and other 48.9% [n=245]) and enlisted (87.2%). Overall, 6.4% presented with perforation, with rates of 6.6%, 5.8%, and 6.7% (P=0.96) for officers, enlisted soldiers, and contractors, respectively. There was no difference in perforation when stratified by junior or senior status for either officers or enlisted (9.3% junior versus 4.40% senior officers, P=0.273; 6.60% junior versus 5.50% senior enlisted, P=0.369). On multivariate analysis, parameters such as leukocytosis and temperature, as well as race and rank were not associated with perforation (P=0.7). Only age had a correlation, with individuals aged 66-75 y having higher perforation rates (odds ratio, 1.04; 95% confidence interval, 1.02-1.05; P<0.001). In an equal-access health care system, older age, not socioeconomic factors, correlated with increased appendiceal perforation rates. Published by Elsevier Inc.
Wanderer, Jonathan P; Charnin, Jonathan; Driscoll, William D; Bailin, Michael T; Baker, Keith
2013-08-01
Our goal in this study was to develop decision support systems for resident operating room (OR) assignments using anesthesia information management system (AIMS) records and Accreditation Council for Graduate Medical Education (ACGME) case logs and evaluate the implementations. We developed 2 Web-based systems: an ACGME case-log visualization tool, and Residents Helping in Navigating OR Scheduling (Rhinos), an interactive system that solicits OR assignment requests from residents and creates resident profiles. Resident profiles are snapshots of the cases and procedures each resident has done and were derived from AIMS records and ACGME case logs. A Rhinos pilot was performed for 6 weeks on 2 clinical services. One hundred sixty-five requests were entered and used in OR assignment decisions by a single attending anesthesiologist. Each request consisted of a rank ordered list of up to 3 ORs. Residents had access to detailed information about these cases including surgeon and patient name, age, procedure type, and admission status. Success rates at matching resident requests were determined by comparing requests with AIMS records. Of the 165 requests, 87 first-choice matches (52.7%), 27 second-choice matches (16.4%), and 8 third-choice matches (4.8%) were made. Forty-three requests were unmatched (26.1%). Thirty-nine first-choice requests overlapped (23.6%). Full implementation followed on 8 clinical services for 8 weeks. Seven hundred fifty-four requests were reviewed by 15 attending anesthesiologists, with 339 first-choice matches (45.0%), 122 second-choice matches (16.2%), 55 third-choice matches (7.3%), and 238 unmatched (31.5%). There were 279 overlapping first-choice requests (37.0%). The overall combined match success rate was 69.4%. Separately, we developed an ACGME case-log visualization tool that allows individual resident experiences to be compared against case minimums as well as resident peer groups. We conclude that it is feasible to use ACGME case
Daniela LIŢAN
2015-01-01
In recent years, the activities of companies and Public Administration had been automated and adapted to the current information system. Therefore, in this paper, I will present and exemplify the benefits of m-government computer systems development and implementation (which can be accessed from mobile devices and which are specific to the workflow of Public Administrations) starting from the “experience” of e-government systems implementation in the context of their access and usage through ...
Access systems strategy in the accelerator complex and experimental areas
International Nuclear Information System (INIS)
Nunes, R.; Ninin, P.; Sanchez-Corral, E.; Ladzinski, T.
2012-01-01
This paper reviews the main features of the new PS Personnel Protection System (PSPSS) as well as the main milestones for its deployment during the Long Shutdown of 2013-2014. Access conditions in the PS, SPS and LHC complexes during this period shall be described as well as the upgrades and improvements that are under preparation. (authors)
2013-01-24
... apparel industry is being adversely impacted by imports of these products from Oman, thereby allowing CITA... Proclamation, an interested party in the U.S. domestic textile and apparel industry may file a request for a... Request; Procedures for Considering Requests and Comments From the Public for Textile and Apparel...
National Research Council Canada - National Science Library
2008-01-01
.... According to the Strategic Services Sourcing (S3) performance work statement the purpose of the BISA is to provide a biometric base access control system that can operate in a hostile environment...
Guide on Project Web Access of SFR R and D and Technology Monitoring System
International Nuclear Information System (INIS)
Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee
2008-09-01
The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4
Sikder, Somali; Ghosh, Shila
2018-02-01
This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.
Guide on Project Web Access of SFR R and D and Technology Monitoring System
Energy Technology Data Exchange (ETDEWEB)
Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee
2008-09-15
The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4.
Directory of Open Access Journals (Sweden)
Qing Lu
2016-06-01
Full Text Available City governments around the world are developing and expanding how they connect to citizens. Technologies play an important role in making this connection, and one frequent way that cities connect with citizens is through 311-style request systems. 311 is a non-emergency municipal notification system that uses telephone, email, web forms, and increasingly, mobile applications to allow citizens to notify government of infrastructure issues and make requests for municipal services. In many ways, this process of citizen contribution mirrors the provision of volunteered geographic information, that is spatially-referenced user generated content. This research presents a case study of the city of Edmonton, Canada, an early adopter of multi-channel 311 service request systems, including telephone, email, web form, and mobile app 311 request channels. Three methods of analysis are used to characterize and compare these different channels over three years of request data; a comparison of relative request share for each channel, a spatial hot spot analysis, and regression models to compare channel usage with sociodemographic variables. The results of this study indicate a shift in channel usage from traditional to Internet-enabled, that this shift is mirrored in the hotspots of request activity, and that specific digital inequalities exist that reinforce this distinction between traditional and Internet-enabled reporting channels.
Scheduling with Bus Access Optimization for Distributed Embedded Systems
DEFF Research Database (Denmark)
Eles, Petru; Doboli, Alex; Pop, Paul
2000-01-01
of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have......In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow......, generates an efficient bus access scheme as well as the schedule tables for activation of processes and communications....
2010-03-08
..., including the identity of any expert, consultant, or assistant who will aid the requestor in evaluating the... shown by reliance on a qualified expert, consultant, or assistant who satisfies these criteria. (b) A... and resolve requests for access to SGI, and motions for protective orders, in a timely fashion in...
Introduction to the Personal Access Satellite System Study
Sue, Miles K.
1990-01-01
A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.
Variation in Direct Access to Tests to Investigate Cancer: A Survey of English General Practitioners
Nicholson, Brian D.; Oke, Jason L.; Rose, Peter W.; Mant, David
2016-01-01
Background The 2015 NICE guidelines for suspected cancer recommend that English General Practitioners have direct access to diagnostic tests to investigate symptoms of cancer that do not meet the criteria for urgent referral. We aimed to identify the proportion of GPs in England with direct access to these tests. Methods We recruited 533 English GPs through a national clinical research network to complete an online survey about direct access to laboratory, radiology, and endoscopy tests in the three months leading up to the release of the 2015 NICE guidance. If they had direct access to a diagnostic test, GPs were asked about the time necessary to arrange a test and receive a report. Results are reported by NHS sub-region and, adjusting for sampling, for England as a whole. Results Almost all GPs reported direct access to x-ray and laboratory investigations except faecal occult blood testing (54%, 95% CI 49–59%) and urine protein electrophoresis (89%, 95% CI 84–92%). Fewer GPs had direct access to CT scans (54%, 95% CI 49–59%) or endoscopy (colonoscopy 32%, 95% CI 28–37%; gastroscopy 72%, 95% CI 67–77%). There was significant variation in direct access between NHS regions for the majority of imaging tests—for example, from 20 to 85% to MRI. Apart from x-ray, very few GPs (1–22%) could access radiology and endoscopy within the timescales recommended by NICE. The modal request to test time was 2–4 weeks for routine radiology and 4–6 weeks for routine endoscopy with results taking another 1–2 weeks. Conclusion At the time that the 2015 NICE guideline was released, local investment was required to not only provide direct access but also reduce the interval between request and test and speed up reporting. Further research using our data as a benchmark is now required to identify whether local improvements in direct access have been achieved in response to the NICE targets. If alternative approaches to test access are to be proposed they must be
12 CFR 1408.41 - Requesting current paying agency to offset salary.
2010-01-01
... salary. 1408.41 Section 1408.41 Banks and Banking FARM CREDIT SYSTEM INSURANCE CORPORATION COLLECTION OF CLAIMS OWED THE UNITED STATES Offset Against Salary § 1408.41 Requesting current paying agency to offset salary. (a) To request a paying agency to impose a salary offset against amounts owed to the debtor, the...
Directory of Open Access Journals (Sweden)
Wen-Jye Shyr
2013-02-01
Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.
Welcome to Systems — A New Interdisciplinary Open Access Journal for Systems Science and Engineering
Directory of Open Access Journals (Sweden)
Thomas Huynh
2012-04-01
Full Text Available Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies. Understanding of natural systems is essential to the survival of the human species, which is intertwined with the survival of other species on earth. Having the knowledge and ability to build human-made systems is critical to the employment of systems that effectively serve the needs of their users. To gain such understanding and to acquire such knowledge and ability, it is necessary that cutting-edge research in systems science, systems engineering, and systems-related fields continue. This open access journal aims to achieve quick and global dissemination of results of such research. [...
Danilova, Olga; Semenova, Zinaida
2018-04-01
The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.
Pohl, Fabian; Hartmann, Werner; Holzmann, Thomas; Gensicke, Sandra; Kölbl, Oliver; Hautmann, Matthias G
2014-01-25
Many cancer patients receive a central venous catheter or port system prior to therapy to assure correct drug administration. Even appropriate hygienic intervention maintenance carries the risk of contaminating the middle port (C-port) of a three-way cock (TWC), a risk that increases with the number of medical interventions. Because of the complexity of the cleaning procedure with disconnection and reconnection of the standard luer lock cap (referred as "intervention"), we compared luer lock caps with a "closed access system" consisting of a luer access split septum system with regard to process optimization (work simplification, process time), efficiency (costs) and hygiene (patient safety). For determination of process optimization the workflow of an intervention according to the usual practice and risks was depicted in a process diagram. For determining the actual process costs, we analyzed use of material and time parameters per intervention and used the process parameters for programming the process into a simulation run (n = 1000) to determine the process costs as well as their differences (ACTUAL vs. NOMINAL) within the framework of a discrete event simulation.Additionally cultures were carried out at the TWC C-ports to evaluate possible contamination. With the closed access system, the mean working time of 5.5 minutes could be reduced to 2.97 minutes. The results for average process costs (labour and material costs per use) were 3.92 € for luer lock caps and 2.55 € for the closed access system. The hypothesis test (2-sample t-test, CI 0.95, p-valuerisks (related to material, surroundings, staff handling) could be reduced by 65.38%. In the present research, the closed access system with a divided split septum was superior to conventional luer lock caps. The advantage of the closed access system lies in the simplified handling for staff, which results in a reduced risk of patient infection due to improved clinical hygiene.
2013-11-20
... Collection Request; Comment Request; Approval of State Coastal Nonpoint Pollution Control Programs AGENCY... to submit an information collection request (ICR), ``Approval of State Coastal Nonpoint Pollution... Watershed Protection Division, Office of Wetlands Oceans and Watersheds, Mail Code 4503-T, Environmental...
Study and development of a document file system with selective access
International Nuclear Information System (INIS)
Mathieu, Jean-Claude
1974-01-01
The objective of this research thesis was to design and to develop a set of software aimed at an efficient management of a document file system by using methods of selective access to information. Thus, the three main aspects of file processing (creation, modification, reorganisation) have been addressed. The author first presents the main problems related to the development of a comprehensive automatic documentation system, and their conventional solutions. Some future aspects, notably dealing with the development of peripheral computer technology, are also evoked. He presents the characteristics of INIS bibliographic records provided by the IAEA which have been used to create the files. In the second part, he briefly describes the file system general organisation. This system is based on the use of two main files: an inverse file which contains for each descriptor a list of of numbers of files indexed by this descriptor, and a dictionary of descriptor or input file which gives access to the inverse file. The organisation of these both files is then describes in a detailed way. Other related or associated files are created, and the overall architecture and mechanisms integrated into the file data input software are described, as well as various processing applied to these different files. Performance and possible development are finally discussed
U-Access: a web-based system for routing pedestrians of differing abilities
Sobek, Adam D.; Miller, Harvey J.
2006-09-01
For most people, traveling through urban and built environments is straightforward. However, for people with physical disabilities, even a short trip can be difficult and perhaps impossible. This paper provides the design and implementation of a web-based system for the routing and prescriptive analysis of pedestrians with different physical abilities within built environments. U-Access, as a routing tool, provides pedestrians with the shortest feasible route with respect to one of three differing ability levels, namely, peripatetic (unaided mobility), aided mobility (mobility with the help of a cane, walker or crutches) and wheelchair users. U-Access is also an analytical tool that can help identify obstacles in built environments that create routing discrepancies among pedestrians with different physical abilities. This paper discusses the system design, including database, algorithm and interface specifications, and technologies for efficiently delivering results through the World Wide Web (WWW). This paper also provides an illustrative example of a routing problem and an analytical evaluation of the existing infrastructure which identifies the obstacles that pose the greatest discrepancies between physical ability levels. U-Access was evaluated by wheelchair users and route experts from the Center for Disability Services at The University of Utah, USA.
Common Patterns with End-to-end Interoperability for Data Access
Gallagher, J.; Potter, N.; Jones, M. B.
2010-12-01
At first glance, using common storage formats and open standards should be enough to ensure interoperability between data servers and client applications, but that is often not the case. In the REAP (Realtime Environment for Analytical Processing; NSF #0619060) project we integrated access to data from OPeNDAP servers into the Kepler workflow system and found that, as in previous cases, we spent the bulk of our effort addressing the twin issues of data model compatibility and integration strategies. Implementing seamless data access between a remote data source and a client application (data sink) can be broken down into two kinds of issues. First, the solution must address any differences in the data models used by the data source (OPeNDAP) and the data sink (the Kepler workflow system). If these models match completely, there is little work to be done. However, that is rarely the case. To map OPeNDAP's data model to Kepler's, we used two techniques (ignoring trivial conversions): On-the-fly type mapping and out-of-band communication. Type conversion takes place both for data and metadata because Kepler requires a priori knowledge of some aspects (e.g., syntactic metadata) of the data to build a workflow. In addition, OPeNDAP's constraint expression syntax was used to send out-of-band information to restrict the data requested from the server, facilitating changes in the returned data's type. This technique provides a way for users to exert fine-grained control over the data request, a potentially useful technique, at the cost of requiring that users understand a little about the data source's processing capabilities. The second set of issues for end-to-end data access are integration strategies. OPeNDAP provides several different tools for bringing data into an application: C++, C and Java libraries that provide functions for newly written software; The netCDF library which enables existing applications to read from servers using an older interface; and simple
Directory of Open Access Journals (Sweden)
Bendaoud Zakaria
2014-12-01
Full Text Available The number of people using public transport is continuously increasing. Transport companies want to fulfil travellers’ expectations wherever possible. However, the great number of public transport companies operating in the same area can sometimes confuse travellers as to which route they should take and how to obtain the information relative to their journey. In this paper we suggest integrating several traveller information systems from different companies into the same multimodal information system, offering companies the choice not to share their data. This encourages them to join the system. Additionally, we have minimised the number of nodes involved when processing travellers’ requests in order to simplify the calculation process. To put our plan into action, we have opted for a multi-agent system coupled with the Voronoi decomposition for managing the network.
32 CFR 319.5 - Procedures for requests pertaining to individual records in a record system.
2010-07-01
..., or to be provided an accounting of disclosures from such records, shall submit his or her request in..., review or copies, and an accounting of disclosures will provide in writing his or her full name, address, social security account number or date of birth and a telephone number where the requester can be...
An API-based search system for one click access to information
Ionita, Dan; Tax, Niek; Hiemstra, Djoerd
This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on
Tsay, Ming-Yueh; Wu, Tai-Luan; Tseng, Ling-Li
2017-01-01
This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic), two aggregate institutional repositories (OAIster and OpenDOAR), and two physics-related open sources (arXiv.org and Astrophysics Data System). The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.