WorldWideScience

Sample records for access system analysis

  1. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Science.gov (United States)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  2. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    Science.gov (United States)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  3. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  4. ATLAS, an integrated structural analysis and design system. Volume 4: Random access file catalog

    Science.gov (United States)

    Gray, F. P., Jr. (Editor)

    1979-01-01

    A complete catalog is presented for the random access files used by the ATLAS integrated structural analysis and design system. ATLAS consists of several technical computation modules which output data matrices to corresponding random access file. A description of the matrices written on these files is contained herein.

  5. Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Kim, Tai-Hoon

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  6. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  7. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  8. Providers' Access of Imaging Versus Only Reports: A System Log File Analysis.

    Science.gov (United States)

    Jung, Hye-Young; Gichoya, Judy Wawira; Vest, Joshua R

    2017-02-01

    An increasing number of technologies allow providers to access the results of imaging studies. This study examined differences in access of radiology images compared with text-only reports through a health information exchange system by health care professionals. The study sample included 157,256 historical sessions from a health information exchange system that enabled 1,670 physicians and non-physicians to access text-based reports and imaging over the period 2013 to 2014. The primary outcome was an indicator of access of an imaging study instead of access of a text-only report. Multilevel mixed-effects regression models were used to estimate the association between provider and session characteristics and access of images compared with text-only reports. Compared with primary care physicians, specialists had an 18% higher probability of accessing actual images instead of text-only reports (β = 0.18; P < .001). Compared with primary care practice settings, the probability of accessing images was 4% higher for specialty care practices (P < .05) and 8% lower for emergency departments (P < .05). Radiologists, orthopedists, and neurologists accounted for 79% of all the sessions with actual images accessed. Orthopedists, radiologists, surgeons, and pulmonary disease specialists accessed imaging more often than text-based reports only. Consideration for differences in the need to access images compared with text-only reports based on the type of provider and setting of care are needed to maximize the benefits of image sharing for patient care. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  9. Using Operational Analysis to Improve Access to Pulmonary Function Testing

    Directory of Open Access Journals (Sweden)

    Ada Ip

    2016-01-01

    Full Text Available Background. Timely pulmonary function testing is crucial to improving diagnosis and treatment of pulmonary diseases. Perceptions of poor access at an academic pulmonary function laboratory prompted analysis of system demand and capacity to identify factors contributing to poor access. Methods. Surveys and interviews identified stakeholder perspectives on operational processes and access challenges. Retrospective data on testing demand and resource capacity was analyzed to understand utilization of testing resources. Results. Qualitative analysis demonstrated that stakeholder groups had discrepant views on access and capacity in the laboratory. Mean daily resource utilization was 0.64 (SD 0.15, with monthly average utilization consistently less than 0.75. Reserved testing slots for subspecialty clinics were poorly utilized, leaving many testing slots unfilled. When subspecialty demand exceeded number of reserved slots, there was sufficient capacity in the pulmonary function schedule to accommodate added demand. Findings were shared with stakeholders and influenced scheduling process improvements. Conclusion. This study highlights the importance of operational data to identify causes of poor access, guide system decision-making, and determine effects of improvement initiatives in a variety of healthcare settings. Importantly, simple operational analysis can help to improve efficiency of health systems with little or no added financial investment.

  10. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  11. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  12. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  13. A system for success: BMC Systems Biology, a new open access journal.

    Science.gov (United States)

    Hodgkinson, Matt J; Webb, Penelope A

    2007-09-04

    BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  14. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  15. GP preferences for information systems: conjoint analysis of speed, reliability, access and users.

    Science.gov (United States)

    Wyatt, Jeremy C; Batley, Richard P; Keen, Justin

    2010-10-01

    To elicit the preferences and trade-offs of UK general practitioners about key features of health information systems, to help inform the design of such systems in future. A stated choice study to uncover implicit preferences based on a binary choice between scenarios presented in random order. were all 303 general practice members of the UK Internet service provider, Medix who were approached by email to participate. The main outcome measure was the number of seconds delay in system response that general practitioners were willing to trade off for each key system feature: the reliability of the system, the sites from which the system could be accessed and which staff are able to view patient data. Doctors valued speed of response most in information systems but would be prepared to wait 28 seconds to access a system in exchange for improved reliability from 95% to 99%, a further 2 seconds for an improvement to 99.9% and 27 seconds for access to data from anywhere including their own home compared with one place in a single health care premises. However, they would require a system that was 14 seconds faster to compensate for allowing social care as well as National Health Service staff to read patient data. These results provide important new evidence about which system characteristics doctors value highly, and hence which characteristics designers need to focus on when large scale health information systems are planned. © 2010 Blackwell Publishing Ltd.

  16. Open access for ALICE analysis based on virtualization technology

    International Nuclear Information System (INIS)

    Buncic, P; Gheata, M; Schutz, Y

    2015-01-01

    Open access is one of the important leverages for long-term data preservation for a HEP experiment. To guarantee the usability of data analysis tools beyond the experiment lifetime it is crucial that third party users from the scientific community have access to the data and associated software. The ALICE Collaboration has developed a layer of lightweight components built on top of virtualization technology to hide the complexity and details of the experiment-specific software. Users can perform basic analysis tasks within CernVM, a lightweight generic virtual machine, paired with an ALICE specific contextualization. Once the virtual machine is launched, a graphical user interface is automatically started without any additional configuration. This interface allows downloading the base ALICE analysis software and running a set of ALICE analysis modules. Currently the available tools include fully documented tutorials for ALICE analysis, such as the measurement of strange particle production or the nuclear modification factor in Pb-Pb collisions. The interface can be easily extended to include an arbitrary number of additional analysis modules. We present the current status of the tools used by ALICE through the CERN open access portal, and the plans for future extensions of this system. (paper)

  17. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  18. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    Science.gov (United States)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  19. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  20. Radiation analysis of the CIT [Compact Ignition Tokamak] pellet injector system and its impact on personnel access

    International Nuclear Information System (INIS)

    Selcow, E.C.; Stevens, P.N.; Gomes, I.C.; Gomes, L.M.

    1988-08-01

    The conceptual design of the Compact Ignition Tokamak (CIT) is nearing completion. The CIT is a short-pulse ignition experiment, which is planned to follow the operations of the Tokamak Fusion Test Reactor (TFTR) at the Princeton Plasma Physics Laboratory (PPPL). The high neutron wall loadings, 4--5 MW/m 2 , associated with the operation of this device require that neutronics-related issues be considered in the overall system design. Radiation shielding is required for the protection of device components as well as personnel. A close-in igloo shield has been designed around the periphery of the tokamak structure, and the entire experiment is housed in a circular test cell facility that has a radius of 12 m. The most critical radiation concerns in the CIT design process relate to the numerous penetrations in the device. This report discusses the impact of a major penetration on the design and operation of the pellet injection system in the CIT. The pellet injector is a major component, and it has a line-of-sight penetration through the igloo and test cell wall. All current options for maintenance of the injector require hands-on-access. A nuclear analysis has been performed to establish the feasibility of hands-on-access. A coupled Monte Carlo/discrete-ordinates methodology was used to perform the analysis. This problem is characterized by deep penetration and streaming with very large length-to-diameter ratios. Results from this study indicate that personnel access to the pellet injector glovebox is possible. 14 refs., 3 figs., 3 tabs

  1. ANALYSIS OF MPC ACCESS REQUIREMENTS FOR ADDITION OF FILLER MATERIALS

    International Nuclear Information System (INIS)

    W. Wallin

    1996-01-01

    This analysis is prepared by the Mined Geologic Disposal System (MGDS) Waste Package Development Department (WPDD) in response to a request received via a QAP-3-12 Design Input Data Request (Ref. 5.1) from WAST Design (formerly MRSMPC Design). The request is to provide: Specific MPC access requirements for the addition of filler materials at the MGDS (i.e., location and size of access required). The objective of this analysis is to provide a response to the foregoing request. The purpose of this analysis is to provide a documented record of the basis for the response. The response is stated in Section 8 herein. The response is based upon requirements from an MGDS perspective

  2. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  3. A system for success: BMC Systems Biology, a new open access journal

    OpenAIRE

    Webb Penelope A; Hodgkinson Matt J

    2007-01-01

    Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  4. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  5. Radiation analysis of the CIT (Compact Ignition Tokamak) pellet injector system and its impact on personnel access

    Energy Technology Data Exchange (ETDEWEB)

    Selcow, E.C.; Stevens, P.N.; Gomes, I.C.; Gomes, L.M.

    1987-01-01

    Conceptual design of the Compact Ignition Tokamak (CIT) is near completion. This short-pulse ignition experiment is planned to follow the operations of the Tokamak Fusion Test Reactor (TFTR) at the Princeton Plasma Physics Laboratory. The high neutron wall loadings, /approximately/4-5 MW/m/sup 2/, associated with the operation of this device require that neutronics-related issues be considered in the overall system design. Radiation shielding is required for the protection of device components and personnel. A close-in igloo shield has been designed around the periphery of the tokamak structure, and the entire experiment is housed in a circular test cell facility with a radius of /approximately/12 m. The most critical radiation concern in the CIT design process relates to the numerous penetrations in the device. This paper discusses the impact of a major penetration on the design and operations of the CIT pellet injection system. The pellet injector is a major component, which has a line-of-sight penetration through the igloo and test cell wall. All current options for maintenance of the injector require personnel access. A nuclear analysis has been performed to determine the feasibility of hands-on access. Results indicate that personnel access to the pellet injector glovebox is possible. 10 refs., 3 figs., 3 tabs.

  6. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  7. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  8. Internet-accessible real-time weather information system

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.

    An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...

  9. Analysis of the LTE Access Reservation Protocol for Real-Time Traffic

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based...... of the two-phase LTE reservation protocol and asses its performance, when assumptions (1) and (2) do not hold....

  10. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  11. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  12. Earth System Model Development and Analysis using FRE-Curator and Live Access Servers: On-demand analysis of climate model output with data provenance.

    Science.gov (United States)

    Radhakrishnan, A.; Balaji, V.; Schweitzer, R.; Nikonov, S.; O'Brien, K.; Vahlenkamp, H.; Burger, E. F.

    2016-12-01

    There are distinct phases in the development cycle of an Earth system model. During the model development phase, scientists make changes to code and parameters and require rapid access to results for evaluation. During the production phase, scientists may make an ensemble of runs with different settings, and produce large quantities of output, that must be further analyzed and quality controlled for scientific papers and submission to international projects such as the Climate Model Intercomparison Project (CMIP). During this phase, provenance is a key concern:being able to track back from outputs to inputs. We will discuss one of the paths taken at GFDL in delivering tools across this lifecycle, offering on-demand analysis of data by integrating the use of GFDL's in-house FRE-Curator, Unidata's THREDDS and NOAA PMEL's Live Access Servers (LAS).Experience over this lifecycle suggests that a major difficulty in developing analysis capabilities is only partially the scientific content, but often devoted to answering the questions "where is the data?" and "how do I get to it?". "FRE-Curator" is the name of a database-centric paradigm used at NOAA GFDL to ingest information about the model runs into an RDBMS (Curator database). The components of FRE-Curator are integrated into Flexible Runtime Environment workflow and can be invoked during climate model simulation. The front end to FRE-Curator, known as the Model Development Database Interface (MDBI) provides an in-house web-based access to GFDL experiments: metadata, analysis output and more. In order to provide on-demand visualization, MDBI uses Live Access Servers which is a highly configurable web server designed to provide flexible access to geo-referenced scientific data, that makes use of OPeNDAP. Model output saved in GFDL's tape archive, the size of the database and experiments, continuous model development initiatives with more dynamic configurations add complexity and challenges in providing an on

  13. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  14. Accessing the nanostructural analysis network organisation (NANO)

    International Nuclear Information System (INIS)

    Hicks, R.; Ringer, S.

    2003-01-01

    Full text: As a Major National Research Facility (MNRF), NANO unites five Australian microscopy and microanalysis centres to form the peak Australian facility for nanometric analysis of the structure and chemistry of materials. NANO is headquartered at the Australian Key Centre for Microscopy and Microanalysis at the University of Sydney and involves the Centres for Microscopy and Microanalysis at the Universities of Queensland and Western Australia, the Electron Microscope Unit at the University of New South Wales and the Microanalytical Research Centre at the University of Melbourne. Together these major centres maintain a wide range of complementary instrumentation for the characterisation of nanostructure. NANO links them into a co-ordinated national facility with unified charges and booking systems. The facility will provide open access to a wide range of present and future partners involving local and international linkages. For this reason, NANO is designed to allow the incorporation of other groups as additional nodes. All Australian researchers are eligible to apply for support to use NANO through the Travel and Access Program (NANO-TAP), which will support basic travel and accommodation costs as well as instrument time. Access to the national grid may involve on-site presence at a particular node or remote telemicroscopy. Both passive (observation) and active (operation) modes of telemicroscopy are available. This presentation will address the NANO-TAP application procedure, the use of remote telemicroscopy and the formation of additional nodes. Copyright (2003) Australian Microbeam Analysis Society

  15. Accessibility analysis in manufacturing processes using visibility cones

    Institute of Scientific and Technical Information of China (English)

    尹周平; 丁汉; 熊有伦

    2002-01-01

    Accessibility is a kind of important design feature of products,and accessibility analysis has been acknowledged as a powerful tool for solving computational manufacturing problems arising from different manufacturing processes.After exploring the relations among approachability,accessibility and visibility,a general method for accessibility analysis using visibility cones (VC) is proposed.With the definition of VC of a point,three kinds of visibility of a feature,namely complete visibility cone (CVC),partial visibility cone (PVC) and local visibility cone (LVC),are defined.A novel approach to computing VCs is formulated by identifying C-obstacles in the C-space,for which a general and efficient algorithm is proposed and implemented by making use of visibility culling.Lastly,we discuss briefly how to realize accessibility analysis in numerically controlled (NC) machining planning,coordinate measuring machines (CMMs) inspection planning and assembly sequence planning with the proposed methods.

  16. Average opportunity-based accessibility of public transit systems to grocery stores in small urban areas

    Directory of Open Access Journals (Sweden)

    Nimish Dharmadhikari

    2015-12-01

    Full Text Available This research studies the accessibility of grocery stores to university students using the public transportation system, drawing from a case study of Fargo, North Dakota. Taking into consideration the combined travel time components of walking, riding, and waiting, this study measures two types of accessibilities: accessibility to reach a particular place and accessibility to reach the bus stop to ride the public transit system. These two accessibilities are interdependent and cannot perform without each other. A new method to calculate the average accessibility measure for the transit routes is proposed. A step-wise case study analysis indicates that one route provides accessibility to a grocery store in eight minutes. This also suggests that the North Dakota State University area has moderate accessibility to grocery stores.

  17. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  18. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  19. Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code

    Science.gov (United States)

    Sikder, Somali; Ghosh, Shila

    2018-02-01

    This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.

  20. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  1. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  2. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  3. Nuclear information access system

    International Nuclear Information System (INIS)

    Ham, C. H.; Yang, M. H.; Yoon, S. W.

    1998-01-01

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  4. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  5. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  6. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  7. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  8. Interactive water monitoring system accessible by cordless telephone

    Science.gov (United States)

    Volpicelli, Richard; Andeweg, Pierre; Hagar, William G.

    1985-12-01

    A battery-operated, microcomputer-controlled monitoring device linked with a cordless telephone has been developed for remote measurements. This environmental sensor is self-contained and collects and processes data according to the information sent to its on-board computer system. An RCA model 1805 microprocessor forms the basic controller with a program encoded in memory for data acquisition and analysis. Signals from analog sensing devices used to monitor the environment are converted into digital signals and stored in random access memory of the microcomputer. This remote sensing system is linked to the laboratory by means of a cordless telephone whose base unit is connected to regular telephone lines. This offshore sensing system is simply accessed by a phone call originating from a computer terminal in the laboratory. Data acquisition is initiated upon request: Information continues to be processed and stored until the computer is reprogrammed by another phone call request. Information obtained may be recalled by a phone call after the desired environmental measurements are finished or while they are in progress. Data sampling parameters may be reset at any time, including in the middle of a measurement cycle. The range of the system is limited only by existing telephone grid systems and by the transmission characteristics of the cordless phone used as a communications link. This use of a cordless telephone, coupled with the on-board computer system, may be applied to other field studies requiring data transfer between an on-site analytical system and the laboratory.

  9. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  10. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  11. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  12. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    Science.gov (United States)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  13. A review and analysis of renewable energy curtailment schemes and Principles of Access: Transitioning towards business as usual

    International Nuclear Information System (INIS)

    Kane, Laura; Ault, Graham

    2014-01-01

    In the last decade, the EU has driven forward the development and connection of renewable power sources across Europe. This has changed the way in which distribution networks operate, moving from a passive system, to a more active system where generation and demand are located closer together with system states being more complex and variable. Increased penetration of renewable generation into distribution networks is presenting a number of challenges to Distribution Network Operators (DNOs) including the provision of network access in capacity constrained networks. The introduction of Active Network Management (ANM) is enabling an increase in renewable generation connections through enhanced network access in otherwise ‘full’ networks. This paper presents a way in which DNOs might move towards Business as Usual (BAU) arrangements for ANM schemes. It is necessary to determine the curtailment arrangements, or Principles of Access (PoA), and from this estimate generation access under ANM and the flow of services and money for different scenarios. In this paper, a comprehensive literature review, detailed case study evaluation on early ANM schemes, quantitative curtailment assessment for different PoA and a qualitative analysis of business models for different ANM PoA is presented in turn with conclusions drawn from these three approaches. - Highlights: • Literature review of Principles of Access. • Detailed case study analysis of Principles of Access in ANM projects. • Quantitative analysis of different Principles of Access. • Proposed business models for ANM as business as usual

  14. The optimal access system for future far-offshore wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  15. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  16. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  17. Health system barriers and enablers to early access to breast cancer screening, detection, and diagnosis: a global analysis applied to the MENA region.

    Science.gov (United States)

    Bowser, D; Marqusee, H; El Koussa, M; Atun, R

    2017-11-01

    To identify barriers and enablers that impact access to early screening, detection, and diagnosis of breast cancer both globally and more specifically in the Middle East and North Africa (MENA) region (with a specific focus on Egypt, Jordan, Oman, Saudi Arabia, United Arab Emirates [UAE], and Kuwait) with a specific focus on the health system. A systematic review of literature. We conducted a systematic reviewing using the PRISMA methodology. We searched PubMed, Global Index Medicus, and EMBASE for studies on 'breast cancer', 'breast neoplasm,' or 'screening, early detection, and early diagnosis' as well as key words related to the following barriers: religion, culture, health literacy, lack of knowledge/awareness/understanding, attitudes, fatalism/fear, shame/embarrassment, and physician gender from January 1, 2000 until September 1, 2016. Two independent reviewers screened both titles and abstracts. The application of inclusion and exclusion criteria yielded a final list of articles. A conceptual framework was used to guide the thematic analysis and examine health system barriers and enablers to breast cancer screening at the broader macro health system level, at the health provider level, and the individual level. The analysis was conducted globally and in the MENA region. A total of 11,936 references were identified through the initial search strategy, of which 55 were included in the final thematic analysis. The results found the following barriers and enablers to access to breast cancer screening at the health system level, the health provider level, and the individual level: health system structures such as health insurance and care coordination systems, costs, time concerns, provider characteristics including gender of the provider, quality of care issues, medical concerns, and fear. In addition, the following seven barriers and enablers were identified at the health system or provider level as significantly impacting screening for breast cancer: (1) access

  18. Validating the accuracy of GIS-based accessibility analysis in determining public primary health care demand in metropolitan areas: conference presentation

    CSIR Research Space (South Africa)

    Mokgalaka, H

    2014-07-01

    Full Text Available selected for the analysis are mainly those that offered public primary health care services and acted as first point of contact with the health service delivery system. Attached to the facility data are attribute data indicating the capacity...-Based Accessibility Analysis in Determining Public Primary Health Care Demand in Metropolitan Areas Hunadi Mokgalaka July 2014 Contents • Service access planning • GIS-based accessibility analysis • Key challenges to application • Methodology...

  19. Access safety systems - New concepts from the LHC experience

    International Nuclear Information System (INIS)

    Ladzinski, T.; Delamare, C.; Luca, S. di; Hakulinen, T.; Hammouti, L.; Havart, F.; Juget, J.F.; Ninin, P.; Nunes, R.; Riesco, T.; Sanchez-Corral Mena, E.; Valentini, F.

    2012-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hard wired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and the access control includes a state of the art bio-metry check. Building on the LHC experience, new projects targeting the refurbishment of the existing access safety infrastructure in the injector chain have started. This paper summarises the new concepts introduced in the LHC access control and safety systems, discusses the return of experience and outlines the main guiding principles for the renewal stage of the personnel protection systems in the LHC injector chain in a homogeneous manner. (authors)

  20. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  1. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  2. Remotely Sensed Land Imagery and Access Systems: USGS Updates

    Science.gov (United States)

    Lamb, R.; Pieschke, R.; Lemig, K.

    2017-12-01

    The U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center has implemented a number of updates to its suite of remotely sensed products and distribution systems. These changes will greatly expand the availability, accessibility, and usability of the image products from USGS. As of late 2017, several new datasets are available for public download at no charge from USGS/EROS Center. These products include Multispectral Instrument (MSI) Level-1C data from the Sentinel-2B satellite, which was launched in March 2017. Along with Sentinel-2A, the Sentinel-2B images are now being distributed through USGS systems as part of a collaborative effort with the European Space Agency (ESA). The Sentinel-2 imagery is highly complementary to multispectral data collected by the USGS Landsat 7 and 8 satellites. With these two missions operating together, the potential local revisit rate can be reduced to 2-4 days. Another product addition is Resourcesat-2 data acquired over the United States by the Indian Space Research Organisation (ISRO). The Resourcesat-2 products from USGS consist of Advanced Wide Field Sensor (AWiFS) and Linear Imaging Self-Scanning Sensor Three (LISS-3) images acquired August 2016 to present. In an effort to maximize future Landsat data interoperability, including time series analysis of the 45+ year archive, the reprocessing of Collection 1 for all historical Landsat Level 1 products is nearly complete. The USGS is now working on operational release of higher-level science products to support analysis of the Landsat archive at the pixel level. Major upgrades were also completed in 2017 for several USGS data discovery and access systems, including the LandsatLook Viewer (https://landsatlook.usgs.gov/) and GloVis Tool (https://glovis.usgs.gov/). Other options are now being developed to further enhance data access and overall user experience. These future options will be discussed and community feedback will be encouraged.

  3. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  4. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  5. Higher complication risk of totally implantable venous access port systems in patients with advanced cancer - a single institution retrospective analysis.

    Science.gov (United States)

    Chang, Yi-Fang; Lo, An-Chi; Tsai, Chung-Hsin; Lee, Pei-Yi; Sun, Shen; Chang, Te-Hsin; Chen, Chien-Chuan; Chang, Yuan-Shin; Chen, Jen-Ruei

    2013-02-01

    Totally implantable port systems are generally recommended for prolonged central venous access in diverse settings, but their risk of complications remains unclear for patients with advanced cancer. The aim of this study was to assess the risk of port system failure in patients with advanced cancer. We conducted a retrospective cohort study in a comprehensive cancer centre. A detailed chart review was conducted among 566 patients with 573 ports inserted during January-June, 2009 (average 345.3 catheter-days). Cox regression analysis was applied to evaluate factors during insertion and early maintenance that could lead to premature removal of the port systems due to infection or occlusion. Port system-related infection was significantly associated with receiving palliative care immediately after implantation (hazard ratio, HR = 7.3, 95% confidence interval, 95% CI = 1.2-46.0), after adjusting for probable confounders. Primary cancer site also impacted the occurrence of device-related infection. Receiving oncologic/palliative care (HR = 3.0, P = 0.064), advanced cancer stage (HR = 6.5, P = 0.077) and body surface area above 1.71 m(2) (HR = 3.4, P = 0.029) increased the risk of port system occlusion. Our study indicates that totally implantable port systems yield a higher risk of complications in terminally ill patients. Further investigation should be carefully conducted to compare outcomes of various central venous access devices in patients with advanced cancer and to develop preventive strategies against catheter failure.

  6. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  7. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  8. H1DS: A new web-based data access system

    Energy Technology Data Exchange (ETDEWEB)

    Pretty, D.G., E-mail: david.pretty@anu.edu.au; Blackwell, B.D.

    2014-05-15

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems.

  9. H1DS: A new web-based data access system

    International Nuclear Information System (INIS)

    Pretty, D.G.; Blackwell, B.D.

    2014-01-01

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  10. Analysis of Coded FHSS Systems with Multiple Access Interference over Generalized Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2009-02-01

    Full Text Available We study the effect of interference on the performance of coded FHSS systems. This is achieved by modeling the physical channel in these systems as a block fading channel. In the derivation of the bit error probability over Nakagami fading channels, we use the exact statistics of the multiple access interference (MAI in FHSS systems. Due to the mathematically intractable expression of the Rician distribution, we use the Gaussian approximation to derive the error probability of coded FHSS over Rician fading channel. The effect of pilot-aided channel estimation is studied for Rician fading channels using the Gaussian approximation. From this, the optimal hopping rate in coded FHSS is approximated. Results show that the performance loss due to interference increases as the hopping rate decreases.

  11. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Science.gov (United States)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  12. How to access data availability, accessibility and format for risk analysis?

    NARCIS (Netherlands)

    Humblet, M.F.; Vandeputte, S.; Mignot, C.; Bellet, C.; Koeijer, de A.A.; Swanenburg, M.; Afonso, A.; Sanaa, M.; Saegerman, C.

    2016-01-01

    Risk assessments are mostly carried out based on available data, which do not reflect all data theoretically required by experts to answer them. This study aimed at developing a methodology to assess data availability, accessibility and format, based on a scoring system and focusing on two diseases:

  13. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  14. Exploring the relationship between food access and foodborne illness by using spatial analysis.

    Science.gov (United States)

    Newbold, Bruce; Watson, Susannah; Mackay, Kevin; Isaacs, Sandy

    2013-09-01

    There is some evidence that neighborhood deprivation increases residents' risk of foodborne illnesses. Because urban areas with the least available access to adequate amounts of nutritious or affordable food options (or "food deserts") also tend to be the most deprived areas within a city, it is hypothesized that food access and foodborne illness risk are linked. However, the complexity of tracking numbers and sources of gastrointestinal (GI) illnesses often leads researchers to speculate about reasons for disproportionate rates of pathogen outbreaks among demographic groups. This study explores the suitability of existing data to examine associations between food deserts and the spatial distribution of GI illnesses in Hamilton, Ontario, Canada. A spatial analysis by using GIS software methodology was used to identify and map food retail outlets and accessibility, as well as GI illness outbreaks and sales of antidiarrhea, antinausea, and rehydration products (used as a proxy for GI cases) within the city, based on available data. Statistical analysis of the maps shows no statistical relationship between location, access to food outlets, and rates of GI illness. The analysis points to shortfalls and gaps in the existing data, which leaves us unable to draw conclusions either supporting or refuting our hypothesis. This article includes recommendations to improve the current system of illness reporting and to continue to refine the definition and process of mapping food access issues. A more comprehensive set of data would enable municipalities to more easily identify groups most at risk, depending on exposures and the type of pathogen, and reduce the occurrence of foodborne disease.

  15. String Analysis for Dynamic Field Access

    DEFF Research Database (Denmark)

    Madsen, Magnus; Andreasen, Esben

    2014-01-01

    domains to reason about dynamic field access in a static analysis tool. A key feature of the domains is that the equal, concatenate and join operations take Ο(1) time. Experimental evaluation on four common JavaScript libraries, including jQuery and Prototype, shows that traditional string domains...

  16. A Socio-Technical Analysis of Patient Accessible Electronic Health Records.

    Science.gov (United States)

    Hägglund, Maria; Scandurra, Isabella

    2017-01-01

    In Sweden, and internationally, there is a movement towards increased transparency in healthcare including giving patients online access to their electronic health records (EHR). The purpose of this paper is to analyze the Swedish patient accessible EHR (PAEHR) service using a socio-technical framework, to increase the understanding of factors that influence the design, implementation, adoption and use of the service. Using the Sitting and Singh socio-technical framework as a basis for analyzing the Swedish PAEHR system and its context indicated that there are many stakeholders engaged in these types of services, with different driving forces and incentives that may influence the adoption and usefulness of PAEHR services. The analysis was useful in highlighting important areas that need to be further explored in evaluations of PAEHR services, and can act as a guide when planning evaluations of any PAEHR service.

  17. Beat Noise Cancellation in 2-D Optical Code-Division Multiple-Access Systems Using Optical Hard-Limiter Array

    Science.gov (United States)

    Dang, Ngoc T.; Pham, Anh T.; Cheng, Zixue

    We analyze the beat noise cancellation in two-dimensional optical code-division multiple-access (2-D OCDMA) systems using an optical hard-limiter (OHL) array. The Gaussian shape of optical pulse is assumed and the impact of pulse propagation is considered. We also take into account the receiver noise and multiple access interference (MAI) in the analysis. The numerical results show that, when OHL array is employed, the system performance is greatly improved compared with the cases without OHL array. Also, parameters needed for practical system design are comprehensively analyzed.

  18. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  19. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  20. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  1. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  2. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  3. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  4. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  5. Open Access Intellectual Property Systems: A Comparison to Commercial Solutions in Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    Jan Cerny

    2016-07-01

    Full Text Available ICT/IS management plays an important role within the framework of innovation management, and one of the key elements of this role is the support of Competitive Intelligence in the context of innovation processes. The strategic information needs of innovation management are also directed towards different kinds of intellectual property (IP information entities and commercialization. The purpose of this paper is to define these entities and IP information systems as an important part of a company’s Competitive Intelligence Unit for competitor analysis and technology trends. The open access IP information systems will be analysed together with commercial solutions.. The aim of this paper is to underline the importance of open access IP systems compared to added value commercial solutions for competitive intelligence purposes for SMEs. The comparison will be carried out using examples of patent searches within a concrete dataset.

  6. U-Access: a web-based system for routing pedestrians of differing abilities

    Science.gov (United States)

    Sobek, Adam D.; Miller, Harvey J.

    2006-09-01

    For most people, traveling through urban and built environments is straightforward. However, for people with physical disabilities, even a short trip can be difficult and perhaps impossible. This paper provides the design and implementation of a web-based system for the routing and prescriptive analysis of pedestrians with different physical abilities within built environments. U-Access, as a routing tool, provides pedestrians with the shortest feasible route with respect to one of three differing ability levels, namely, peripatetic (unaided mobility), aided mobility (mobility with the help of a cane, walker or crutches) and wheelchair users. U-Access is also an analytical tool that can help identify obstacles in built environments that create routing discrepancies among pedestrians with different physical abilities. This paper discusses the system design, including database, algorithm and interface specifications, and technologies for efficiently delivering results through the World Wide Web (WWW). This paper also provides an illustrative example of a routing problem and an analytical evaluation of the existing infrastructure which identifies the obstacles that pose the greatest discrepancies between physical ability levels. U-Access was evaluated by wheelchair users and route experts from the Center for Disability Services at The University of Utah, USA.

  7. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  8. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  9. Decision Analysis of Dynamic Spectrum Access Rules

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  10. Analysis of accessibility of finance by women entrepreneurs in Abia ...

    African Journals Online (AJOL)

    Analysis of accessibility of finance by women entrepreneurs in Abia State, Nigeria: a ... A structured questionnaire was administered to 60 respondents using simple ... to the accessibility of finance while type of business ownership and interest ...

  11. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  12. Access to the city

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2017-01-01

    This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....

  13. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  14. Towards ubiquitous access of computer-assisted surgery systems.

    Science.gov (United States)

    Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin

    2006-01-01

    Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.

  15. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  16. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  17. SWS: accessing SRS sites contents through Web Services.

    Science.gov (United States)

    Romano, Paolo; Marra, Domenico

    2008-03-26

    Web Services and Workflow Management Systems can support creation and deployment of network systems, able to automate data analysis and retrieval processes in biomedical research. Web Services have been implemented at bioinformatics centres and workflow systems have been proposed for biological data analysis. New databanks are often developed by taking into account these technologies, but many existing databases do not allow a programmatic access. Only a fraction of available databanks can thus be queried through programmatic interfaces. SRS is a well know indexing and search engine for biomedical databanks offering public access to many databanks and analysis tools. Unfortunately, these data are not easily and efficiently accessible through Web Services. We have developed 'SRS by WS' (SWS), a tool that makes information available in SRS sites accessible through Web Services. Information on known sites is maintained in a database, srsdb. SWS consists in a suite of WS that can query both srsdb, for information on sites and databases, and SRS sites. SWS returns results in a text-only format and can be accessed through a WSDL compliant client. SWS enables interoperability between workflow systems and SRS implementations, by also managing access to alternative sites, in order to cope with network and maintenance problems, and selecting the most up-to-date among available systems. Development and implementation of Web Services, allowing to make a programmatic access to an exhaustive set of biomedical databases can significantly improve automation of in-silico analysis. SWS supports this activity by making biological databanks that are managed in public SRS sites available through a programmatic interface.

  18. Performance analysis of 2D asynchronous hard-limiting optical code-division multiple access system through atmospheric scattering channel

    Science.gov (United States)

    Zhao, Yaqin; Zhong, Xin; Wu, Di; Zhang, Ye; Ren, Guanghui; Wu, Zhilu

    2013-09-01

    Optical code-division multiple access (OCDMA) systems usually allocate orthogonal or quasi-orthogonal codes to the active users. When transmitting through atmospheric scattering channel, the coding pulses are broadened and the orthogonality of the codes is worsened. In truly asynchronous case, namely both the chips and the bits are asynchronous among each active user, the pulse broadening affects the system performance a lot. In this paper, we evaluate the performance of a 2D asynchronous hard-limiting wireless OCDMA system through atmospheric scattering channel. The probability density function of multiple access interference in truly asynchronous case is given. The bit error rate decreases as the ratio of the chip period to the root mean square delay spread increases and the channel limits the bit rate to different levels when the chip period varies.

  19. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  20. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  1. Disability Evaluation Systems Analysis and Research Annual Report 2015

    Science.gov (United States)

    2016-03-21

    Army and Air Force had higher percentages of reserve component disability evaluations, likely due to the inclusion of National Guard service members...Annual Report 2015 Disability Evaluation Systems Analysis and Research Prepared by Accession Medical Standards Analysis and Research Activity...Preventive Medicine Branch Walter Reed Army Institute of Research Silver Spring, Maryland Disability Evaluation Systems Analysis and Research

  2. Disability Evaluation System Analysis and Research Annual Report 2015

    Science.gov (United States)

    2016-03-11

    Inclusion of laboratory and diagnostic information on the medical condition or injury that precipitated the disability evaluation in each service’s...Annual Report 2015 Disability Evaluation Systems Analysis and Research Prepared by Accession Medical Standards Analysis and Research Activity...Preventive Medicine Branch Walter Reed Army Institute of Research Silver Spring, Maryland Disability Evaluation Systems Analysis and Research

  3. The COROT ground-based archive and access system

    Science.gov (United States)

    Solano, E.; González-Riestra, R.; Catala, C.; Baglin, A.

    2002-01-01

    A prototype of the COROT ground-based archive and access system is presented here. The system has been developed at LAEFF and it is based on the experience gained at Laboratorio de Astrofisica Espacial y Fisica Fundamental (LAEFF) with the INES (IUE Newly Extracted System) Archive.

  4. Stochastic Reachability Analysis of Hybrid Systems

    CERN Document Server

    Bujorianu, Luminita Manuela

    2012-01-01

    Stochastic reachability analysis (SRA) is a method of analyzing the behavior of control systems which mix discrete and continuous dynamics. For probabilistic discrete systems it has been shown to be a practical verification method but for stochastic hybrid systems it can be rather more. As a verification technique SRA can assess the safety and performance of, for example, autonomous systems, robot and aircraft path planning and multi-agent coordination but it can also be used for the adaptive control of such systems. Stochastic Reachability Analysis of Hybrid Systems is a self-contained and accessible introduction to this novel topic in the analysis and development of stochastic hybrid systems. Beginning with the relevant aspects of Markov models and introducing stochastic hybrid systems, the book then moves on to coverage of reachability analysis for stochastic hybrid systems. Following this build up, the core of the text first formally defines the concept of reachability in the stochastic framework and then...

  5. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  6. MAST's Integrated Data Access Management system: IDAM

    International Nuclear Information System (INIS)

    Muir, D.G.; Appel, L.; Conway, N.J.; Kirk, A.; Martin, R.; Meyer, H.; Storrs, J.; Taylor, D.; Thomas-Davies, N.; Waterhouse, J.

    2008-01-01

    A new Integrated Data Access Management system, IDAM, has been created to address specific data management issues of the MAST spherical Tokamak. For example, this system enables access to numerous file formats, both legacy and modern (IDA, Ufile, netCDF, HDF5, MDSPlus, PPF, JPF). It adds data quality values at the signal level, and automatically corrects for problems in data: in timings, calibrations, and labelling. It also builds new signals from signal components. The IDAM data server uses a hybrid XML-relational database to record how data are accessed, whether locally or remotely, and how alias and generic signal names are mapped to true names. Also, XML documents are used to encode the details of data corrections, as well as definitions of composite signals and error models. The simple, user friendly, API and accessor function library, written in C on Linux, is available for applications in C, C++, IDL and Fortran-90/95/2003 with good performance: a MAST plasma current trace (28 kbytes of data), requested using a generic name and with data corrections applied, is delivered over a 100 Mbit/s network in ∼13 ms

  7. Genetic relationship and diversity among coconut (Cocos nucifera L.) accessions revealed through SCoT analysis.

    Science.gov (United States)

    Rajesh, M K; Sabana, A A; Rachana, K E; Rahman, Shafeeq; Jerard, B A; Karun, Anitha

    2015-12-01

    Coconut (Cocos nucifera L.) is one of the important palms grown both as a homestead and plantation crop in countries and most island territories of tropical regions. Different DNA-based marker systems have been utilized to assess the extent of genetic diversity in coconut. Advances in genomics research have resulted in the development of novel gene-targeted markers. In the present study, we have used a simple and novel marker system, start codon targeted polymorphism (SCoT), for its evaluation as a potential marker system in coconut. SCoT markers were utilized for assessment of genetic diversity in 23 coconut accessions (10 talls and 13 dwarfs), representing different geographical regions. Out of 25 SCoT primers screened, 15 primers were selected for this study based on their consistent amplification patterns. A total of 102 scorable bands were produced by the 15 primers, 88 % of which were polymorphic. The scored data were used to construct a similarity matrix. The similarity coefficient values ranged between 0.37 and 0.91. These coefficients were utilized to construct a dendrogram using the unweighted pair group of arithmetic means (UPGMA). The extent of genetic diversity observed based on SCoT analysis of coconut accessions was comparable to earlier findings using other marker systems. Tall and dwarf coconut accessions were clearly demarcated, and in general, coconut accessions from the same geographical region clustered together. The results indicate the potential of SCoT markers to be utilized as molecular markers to detect DNA polymorphism in coconut accessions.

  8. Above the nominal limit performance evaluation of multiwavelength optical code-division multiple-access systems

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M. H.

    2009-03-01

    We provide an analysis for the performance of a multiwavelength optical code-division multiple-access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one-coincidence sequences with nonrepeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of the MW-OCDMA system can be critically affected when working above the nominal limit, an event that can happen when the network operates at a high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed medium access control (MAC) protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T, while the R3T is better at very high transmission rates. In general, it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  9. Analysis of Solar Census Remote Solar Access Value Calculation Methodology

    Energy Technology Data Exchange (ETDEWEB)

    Nangle, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Dean, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Van Geet, O. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-03-01

    The costs of photovoltaic (PV) system hardware (PV panels, inverters, racking, etc.) have fallen dramatically over the past few years. Nonhardware (soft) costs, however, have failed to keep pace with the decrease in hardware costs, and soft costs have become a major driver of U.S. PV system prices. Upfront or 'sunken' customer acquisition costs make up a portion of an installation's soft costs and can be addressed through software solutions that aim to streamline sales and system design aspects of customer acquisition. One of the key soft costs associated with sales and system design is collecting information on solar access for a particular site. Solar access, reported in solar access values (SAVs), is a measurement of the available clear sky over a site and is used to characterize the impacts of local shading objects. Historically, onsite shading studies have been required to characterize the SAV of the proposed array and determine the potential energy production of a photovoltaic system.

  10. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  11. GIS-BASED ACCESSIBILITY ANALYSIS OF URBAN EMERGENCY SHELTERS: THE CASE OF ADANA CITY

    Directory of Open Access Journals (Sweden)

    M. Unal

    2016-10-01

    Full Text Available Accessibility analysis of urban emergency shelters can help support urban disaster prevention planning. Pre-disaster emergency evacuation zoning has become a significant topic on disaster prevention and mitigation research. In this study, we assessed the level of serviceability of urban emergency shelters within maximum capacity, usability, sufficiency and a certain walking time limit by employing spatial analysis techniques of GIS-Network Analyst. The methodology included the following aspects: the distribution analysis of emergency evacuation demands, the calculation of shelter space accessibility and the optimization of evacuation destinations. This methodology was applied to Adana, a city in Turkey, which is located within the Alpine-Himalayan orogenic system, the second major earthquake belt after the Pacific-Belt. It was found that the proposed methodology could be useful in aiding to understand the spatial distribution of urban emergency shelters more accurately and establish effective future urban disaster prevention planning. Additionally, this research provided a feasible way for supporting emergency management in terms of shelter construction, pre-disaster evacuation drills and rescue operations.

  12. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  13. Open access for ALICE analysis based on virtualization technology

    CERN Document Server

    Buncic, P; Schutz, Y

    2015-01-01

    Open access is one of the important leverages for long-term data preservation for a HEP experiment. To guarantee the usability of data analysis tools beyond the experiment lifetime it is crucial that third party users from the scientific community have access to the data and associated software. The ALICE Collaboration has developed a layer of lightweight components built on top of virtualization technology to hide the complexity and details of the experiment-specific software. Users can perform basic analysis tasks within CernVM, a lightweight generic virtual machine, paired with an ALICE specific contextualization. Once the virtual machine is launched, a graphical user interface is automatically started without any additional configuration. This interface allows downloading the base ALICE analysis software and running a set of ALICE analysis modules. Currently the available tools include fully documented tutorials for ALICE analysis, such as the measurement of strange particle production or the nuclear modi...

  14. Predictors of appendiceal perforation in an equal access system.

    Science.gov (United States)

    Walker, Avery; Hatch, Quinton; Drake, Thurston; Nelson, Daniel W; Fitzpatrick, Emilie; Bingham, Jason; Black, George; Maykel, Justin A; Steele, Scott R

    2014-07-01

    Discrepancies in socioeconomic factors have been associated with higher rates of perforated appendicitis. As an equal-access health care system theoretically removes these barriers, we aimed to determine if remaining differences in demographics, education, and pay result in disparate outcomes in the rate of perforated appendicitis. All patients undergoing appendectomy for acute appendicitis (November 2004-October 2009) at a tertiary care equal access institution were categorized by demographics and perioperative data. Rank of the sponsor was used as a surrogate for economic status. A multivariate logistic regression model was performed to determine patient and clinical characteristics associated with perforated appendicitis. A total of 680 patients (mean age 30±16 y; 37% female) were included. The majority were Caucasian (56.4% [n=384]; African Americans 5.6% [n=38]; Asians 1.9% [n=13]; and other 48.9% [n=245]) and enlisted (87.2%). Overall, 6.4% presented with perforation, with rates of 6.6%, 5.8%, and 6.7% (P=0.96) for officers, enlisted soldiers, and contractors, respectively. There was no difference in perforation when stratified by junior or senior status for either officers or enlisted (9.3% junior versus 4.40% senior officers, P=0.273; 6.60% junior versus 5.50% senior enlisted, P=0.369). On multivariate analysis, parameters such as leukocytosis and temperature, as well as race and rank were not associated with perforation (P=0.7). Only age had a correlation, with individuals aged 66-75 y having higher perforation rates (odds ratio, 1.04; 95% confidence interval, 1.02-1.05; P<0.001). In an equal-access health care system, older age, not socioeconomic factors, correlated with increased appendiceal perforation rates. Published by Elsevier Inc.

  15. Mitigation of Beat Noise in Time Wavelength Optical Code-Division Multiple-Access Systems

    Science.gov (United States)

    Bazan, Taher M.; Harle, David; Andonovic, Ivan

    2006-11-01

    This paper presents an analysis of two methods for enhancing the performance of two-dimensional time wavelength Optical code-division multiple-access systems by mitigating the effects of beat noise. The first methodology makes use of an optical hard limiter (OHL) in the receiver prior to the optical correlator; a general formula for the error probability as a function of crosstalk level for systems adopting OHLs is given, and the implications of the OHL's nonideal transfer characteristics are then examined. The second approach adopts pulse position modulation, and system performance is estimated and compared to that associated with on off keying.

  16. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  17. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  18. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  19. Alumni access policies in public university libraries | Burclaff ...

    African Journals Online (AJOL)

    This paper explores the current library access policies for alumni at a public university system using document analysis, observations and interviews. We found that alumni are specifically addressed in only two library access policies, and borrowing privileges through cards, on-site access and restricted access to electronic ...

  20. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  1. Role based access control design using Triadic concept analysis

    Institute of Scientific and Technical Information of China (English)

    Ch Aswani Kumar; S Chandra Mouliswaran; LI Jin-hai; C Chandrasekar

    2016-01-01

    Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

  2. Service time analysis of secondary packet transmission with opportunistic channel access

    KAUST Repository

    Usman, Muneer; Yang, Hongchuan; Alouini, Mohamed-Slim

    2014-01-01

    Cognitive radio transceiver can opportunistically access the underutilized channels of primary systems for new wireless services. The secondary transmission may be interrupted by the primary user's transmission. To facilitate the delay analysis of such secondary packet transmission, we study the resulting extended delivery time for a fixed-size secondary packet that includes both transmission time and waiting time. In particular we derive the exact distribution functions of extended delivery time of secondary transmission for both continuous sensing and periodic sensing cases. Selected numerical results are presented for illustrating the mathematical formulation.

  3. Service time analysis of secondary packet transmission with opportunistic channel access

    KAUST Repository

    Usman, Muneer

    2014-09-01

    Cognitive radio transceiver can opportunistically access the underutilized channels of primary systems for new wireless services. The secondary transmission may be interrupted by the primary user\\'s transmission. To facilitate the delay analysis of such secondary packet transmission, we study the resulting extended delivery time for a fixed-size secondary packet that includes both transmission time and waiting time. In particular we derive the exact distribution functions of extended delivery time of secondary transmission for both continuous sensing and periodic sensing cases. Selected numerical results are presented for illustrating the mathematical formulation.

  4. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  5. Wireless multimedia communication systems design, analysis, and implementation

    CERN Document Server

    Rao, KR; Bakmaz, Bojan M

    2014-01-01

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids.Offering an accessible treatment

  6. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    Science.gov (United States)

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  7. Interoperable Access to Near Real Time Ocean Observations with the Observing System Monitoring Center

    Science.gov (United States)

    O'Brien, K.; Hankin, S.; Mendelssohn, R.; Simons, R.; Smith, B.; Kern, K. J.

    2013-12-01

    The Observing System Monitoring Center (OSMC), a project funded by the National Oceanic and Atmospheric Administration's Climate Observations Division (COD), exists to join the discrete 'networks' of In Situ ocean observing platforms -- ships, surface floats, profiling floats, tide gauges, etc. - into a single, integrated system. The OSMC is addressing this goal through capabilities in three areas focusing on the needs of specific user groups: 1) it provides real time monitoring of the integrated observing system assets to assist management in optimizing the cost-effectiveness of the system for the assessment of climate variables; 2) it makes the stream of real time data coming from the observing system available to scientific end users into an easy-to-use form; and 3) in the future, it will unify the delayed-mode data from platform-focused data assembly centers into a standards- based distributed system that is readily accessible to interested users from the science and education communities. In this presentation, we will be focusing on the efforts of the OSMC to provide interoperable access to the near real time data stream that is available via the Global Telecommunications System (GTS). This is a very rich data source, and includes data from nearly all of the oceanographic platforms that are actively observing. We will discuss how the data is being served out using a number of widely used 'web services' (including OPeNDAP and SOS) and downloadable file formats (KML, csv, xls, netCDF), so that it can be accessed in web browsers and popular desktop analysis tools. We will also be discussing our use of the Environmental Research Division's Data Access Program (ERDDAP), available from NOAA/NMFS, which has allowed us to achieve our goals of serving the near real time data. From an interoperability perspective, it's important to note that access to the this stream of data is not just for humans, but also for machine-to-machine requests. We'll also delve into how we

  8. Development of Patient Status-Based Dynamic Access System for Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Chang Won Jeong

    2015-06-01

    Full Text Available Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard. This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.

  9. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  10. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  11. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  12. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  13. Genetic diversity and relationship analysis of Gossypium arboreum accessions.

    Science.gov (United States)

    Liu, F; Zhou, Z L; Wang, C Y; Wang, Y H; Cai, X Y; Wang, X X; Zhang, Z S; Wang, K B

    2015-11-19

    Simple sequence repeat techniques were used to identify the genetic diversity of 101 Gossypium arboreum accessions collected from India, Vietnam, and the southwest of China (Guizhou, Guangxi, and Yunnan provinces). Twenty-six pairs of SSR primers produced a total of 103 polymorphic loci with an average of 3.96 polymorphic loci per primer. The average of the effective number of alleles, Nei's gene diversity, and Shannon's information index were 0.59, 0.2835, and 0.4361, respectively. The diversity varied among different geographic regions. The result of principal component analysis was consistent with that of unweighted pair group method with arithmetic mean clustering analysis. The 101 G. arboreum accessions were clustered into 2 groups.

  14. 28 CFR 25.6 - Accessing records in the system.

    Science.gov (United States)

    2010-07-01

    ... National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs may... through the NCIC communication network. Upon receiving a request for a background check from an FFL, a POC...

  15. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  16. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  17. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  18. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  19. Space rescue system definition (system performance analysis and trades)

    Science.gov (United States)

    Housten, Sam; Elsner, Tim; Redler, Ken; Svendsen, Hal; Wenzel, Sheri

    This paper addresses key technical issues involved in the system definition of the Assured Crew Return Vehicle (ACRV). The perspective on these issues is that of a prospective ACRV contractor, performing system analysis and trade studies. The objective of these analyses and trade studies is to develop the recovery vehicle system concept and top level requirements. The starting point for this work is the definition of the set of design missions for the ACRV. This set of missions encompasses three classes of contingency/emergency (crew illness/injury, space station catastrophe/failure, transportation element catastrophe/failure). The need is to provide a system to return Space Station crew to Earth quickly (less than 24 hours) in response to randomly occurring contingency events over an extended period of time (30 years of planned Space Station life). The main topics addressed and characterized in this paper include the following: Key Recovery (Rescue) Site Access Considerations; Rescue Site Locations and Distribution; Vehicle Cross Range vs Site Access; On-orbit Loiter Capability and Vehicle Design; and Water vs. Land Recovery.

  20. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto; Hoefler, Torsten

    2015-01-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  1. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto

    2015-05-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  2. Exploring the drivers of health and healthcare access in Zambian prisons: a health systems approach.

    Science.gov (United States)

    Topp, Stephanie M; Moonga, Clement N; Luo, Nkandu; Kaingu, Michael; Chileshe, Chisela; Magwende, George; Heymann, S Jody; Henostroza, German

    2016-11-01

    Prison populations in sub-Saharan Africa (SSA) experience a high burden of disease and poor access to health care. Although it is generally understood that environmental conditions are dire and contribute to disease spread, evidence of how environmental conditions interact with facility-level social and institutional factors is lacking. This study aimed to unpack the nature of interactions and their influence on health and healthcare access in the Zambian prison setting. We conducted in-depth interviews of a clustered random sample of 79 male prisoners across four prisons, as well as 32 prison officers, policy makers and health care workers. Largely inductive thematic analysis was guided by the concepts of dynamic interaction and emergent behaviour, drawn from the theory of complex adaptive systems. A majority of inmates, as well as facility-based officers reported anxiety linked to overcrowding, sanitation, infectious disease transmission, nutrition and coercion. Due in part to differential wealth of inmates and their support networks on entering prison, and in part to the accumulation of authority and material wealth within prison, we found enormous inequity in the standard of living among prisoners at each site. In the context of such inequities, failure of the Zambian prison system to provide basic necessities (including adequate and appropriate forms of nutrition, or access to quality health care) contributed to high rates of inmate-led and officer-led coercion with direct implications for health and access to healthcare. This systems-oriented analysis provides a more comprehensive picture of the way resource shortages and human interactions within Zambian prisons interact and affect inmate and officer health. While not a panacea, our findings highlight some strategic entry-points for important upstream and downstream reforms including urgent improvement in the availability of human resources for health; strengthening of facility-based health services systems

  3. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  4. Dataflow models for shared memory access latency analysis

    NARCIS (Netherlands)

    Staschulat, Jan; Bekooij, Marco Jan Gerrit

    2009-01-01

    Performance analysis of applications in multi-core platforms is challenging because of temporal interference while accessing shared resources. Especially, memory arbiters introduce a non-constant delay which signicantly in uences the execution time of a task. In this paper, we selected a

  5. Performance analysis of multiple interference suppression over asynchronous/synchronous optical code-division multiple-access system based on complementary/prime/shifted coding scheme

    Science.gov (United States)

    Nieh, Ta-Chun; Yang, Chao-Chin; Huang, Jen-Fa

    2011-08-01

    A complete complementary/prime/shifted prime (CPS) code family for the optical code-division multiple-access (OCDMA) system is proposed. Based on the ability of complete complementary (CC) code, the multiple-access interference (MAI) can be suppressed and eliminated via spectral amplitude coding (SAC) OCDMA system under asynchronous/synchronous transmission. By utilizing the shifted prime (SP) code in the SAC scheme, the hardware implementation of encoder/decoder can be simplified with a reduced number of optical components, such as arrayed waveguide grating (AWG) and fiber Bragg grating (FBG). This system has a superior performance as compared to previous bipolar-bipolar coding OCDMA systems.

  6. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    Science.gov (United States)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  7. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  8. Spatial Access to Emergency Services in Low- and Middle-Income Countries: A GIS-Based Analysis.

    Directory of Open Access Journals (Sweden)

    Gavin Tansley

    Full Text Available Injury is a leading cause of the global disease burden, accounting for 10 percent of all deaths worldwide. Despite 90 percent of these deaths occurring in low and middle-income countries (LMICs, the majority of trauma research and infrastructure development has taken place in high-income settings. Furthermore, although accessible services are of central importance to a mature trauma system, there remains a paucity of literature describing the spatial accessibility of emergency services in LMICs. Using data from the Service Provision Assessment component of the Demographic and Health Surveys of Namibia and Haiti we defined the capabilities of healthcare facilities in each country in terms of their preparedness to provide emergency services. A Geographic Information System-based network analysis method was used to define 5- 10- and 50-kilometer catchment areas for all facilities capable of providing 24-hour care, higher-level resuscitative services or tertiary care. The proportion of a country's population with access to each level of service was obtained by amalgamating the catchment areas with a population layer. A significant proportion of the population of both countries had poor spatial access to lower level services with 25% of the population of Haiti and 51% of the population of Namibia living further than 50 kilometers from a facility capable of providing 24-hour care. Spatial access to tertiary care was considerably lower with 51% of Haitians and 72% of Namibians having no access to these higher-level services within 50 kilometers. These results demonstrate a significant disparity in potential spatial access to emergency services in two LMICs compared to analogous estimates from high-income settings, and suggest that strengthening the capabilities of existing facilities may improve the equity of emergency services in these countries. Routine collection of georeferenced patient and facility data in LMICs will be important to understanding

  9. System Hardening Architecture for Safer Access to Critical Business ...

    African Journals Online (AJOL)

    System Hardening Architecture for Safer Access to Critical Business Data. ... and the threat is growing faster than the potential victims can deal with. ... in this architecture are applied to the host, application, operating system, user, and the ...

  10. Open access to transmission

    International Nuclear Information System (INIS)

    Keith, D.M.

    1996-01-01

    For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig

  11. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2017. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  12. Emotional Accessibility Is More Important Than Sexual Accessibility in Evaluating Romantic Relationships – Especially for Women: A Conjoint Analysis

    Directory of Open Access Journals (Sweden)

    T. J. Wade

    2018-05-01

    Full Text Available Prior research examining mate expulsion indicates that women are more likely to expel a mate due to deficits in emotional access while men are more likely to expel a mate due to deficits in sexual access. Prior research highlights the importance of accounting for measurement limitations (e.g., the use of incremental vs. forced-choice measures when assessing attitudes toward sexual and emotional infidelity, Sagarin et al., 2012, Wade and Brown, 2012. The present research uses conjoint analysis, a novel methodology for controlling several limitations of using continuous self-report measures in mate expulsion research. Participants (N = 181, 128 women recruited from Bucknell University and several psychology recruitment listservs in the United States rated nine profiles that varied in three potential levels of emotional and sexual accessibility. Men were more likely to want to break up with a partner due to sexual accessibility deficits, whereas women were more likely to want to break up due to emotional accessibility deficits. However, regardless of sex, emotional inaccessibility was more likely to produce mate expulsion. These findings are consistent with prior theory and highlight the need to disentangle emotional accessibility into its constituent in-pair benefits. This research also illustrates the utility of conjoint analysis as a statistical tool for studying how humans resolve trade-offs among competing outcomes during romantic decision-making.

  13. Synergies in the Asian energy system: Climate change, energy security, energy access and air pollution

    International Nuclear Information System (INIS)

    Vliet, Oscar van; Krey, Volker; McCollum, David; Pachauri, Shonali; Nagai, Yu; Rao, Shilpa; Riahi, Keywan

    2012-01-01

    We use the MESSAGE model to examine multiple dimensions of sustainable development for three Asian regions in a set of scenarios developed for the Asian Modelling Exercise. Using climate change mitigation as a starting point for the analysis, we focus on the interaction of climate and energy with technology choice, energy security, energy access, and air pollution, which often have higher policy priority than climate change. Stringent climate policies drive the future energy supply in Asia from being dominated by coal and oil to a more diversified system based mostly on natural gas, coal with CCS, nuclear and renewable energy. The increase in diversity helps to improve the energy security of individual countries and regions. Combining air pollution control policies and universal energy access policies with climate policy can further help to reduce both outdoor and indoor air pollution related health impacts. Investments into the energy system must double by 2030 to achieve stringent climate goals, but are largely offset by lower costs for O and M and air pollution abatement. Strong focus on end-use efficiency also helps lowering overall total costs and allows for limiting or excluding supply side technologies from the mitigation portfolio. Costs of additional energy access policies and measures are a small fraction of total energy system costs. - Highlights: ► Half of added investments in energy offset by lower costs for O and M and air pollution. ► Costs for achieving universal energy access much smaller than energy system costs. ► Combined emissions and access policies further reduce air pollution impacts on health. ► Strong focus on end-use efficiency allows for more flexibility on energy sources. ► Stringent climate policy can improve energy security of Asian regions.

  14. General Controls Over the Electronic Document Access System

    National Research Council Canada - National Science Library

    2000-01-01

    ...) system as part of the DoD Paper-Free Contracting Initiative. EDA contributes to the initiative by digitizing paper documents and offering web-based read-only access to official contracting, finance and accounting documents...

  15. Analysis of the accessibility in websites of Ecuadorian universities of excellence

    Directory of Open Access Journals (Sweden)

    Tania Acosta

    2017-02-01

    Full Text Available Since the publication of the Ecuadorian Technical Standard NTE INEN ISO / IEC 40500 in 2014 and the Ecuadorian Technical Regulation RTE INEN 288 "The web contents accessibility" in 2016, web accessibility in Ecuador has taken great importance. In the educational field, the websites of Higher Education Institutions (HEI have become a communication channel, where universities publish the information and services they offer. In addition, HEI must satisfy the rights of all citizens to have access to education, which includes persons with disabilities. In order to ensure access to the websites of HEI to all people it is important that HEI incorporate web accessibility as an essential requirement in their websites. The objective of this research is to perform the accessibility analysis of the websites of the Ecuadorian universities of excellence belonging to categories A, B and C; identify websites accessibility errors and to present some recommendations for a better fulfillment of the WCAG 2.0 accessibility guidelines by website designers and developers.

  16. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  17. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  18. Fast Access Data Acquisition System (FADAS)

    International Nuclear Information System (INIS)

    Katsman, Vladimir

    1998-01-01

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing

  19. 40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.

    Science.gov (United States)

    2010-07-01

    ... consequence analysis data elements. 1400.5 Section 1400.5 Protection of Environment ENVIRONMENTAL PROTECTION... UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off...

  20. American Meteorological Society (AMS) - The Modern Era Retrospective-Analysis for Research and Applications (MERRA) Data and Accessibility

    Science.gov (United States)

    daSilva, Arlindo

    2009-01-01

    The AM Short Course on The Modern Era Retrospective-analysis for Research and Applications (MERRA) data and accessibility will be held on January 11, 2009 preceding the 89th Annual Meeting in Phoenix, Arizona. Preliminary programs, registration, hotel, and general information will be posted on the AMS Web site in mid-September 2008. Retrospective-analyses (or reanalyses) have been established as an important tool in weather and climate research over the last decade. As computer power increases, the data assimilation and modeling systems improve and become more advanced, the input data quality increases and so reanalyses become more reliable. In 2008, NASA Global Modeling and Assimilation Office began producing a new reanalysis called the Modem Era Retrospective-analysis for Research and Applications (MERRA). The initial data from the reanalysis has been made available to the community and should be complete through 30 years (1979-present) by Fall of 2009. MERRA has taken advantage of the advancement of computing resources to provide users more data than previously available. The native spatial resolution is nominally 1/2 degrees and the surface two dimensional data are one hourly frequency. In addition to the meteorological analysis data, complete mass, energy and momentum budget data and also stratospheric data are provided. The eventual data holdings will exceed 150Tb. In order to facilitate user accessibility to the data, it will be stored in online hard drives (not tape storage) and available through several portals. Subsetting tools will also be available to allow users to tailor their data requests. The goals of this short course are to provide hands on users of reanalyses instruction on MERRA systems and also interactive experience with the online data and access tools. The course is intended for students and research scientists who will be actively interested in accessing and applying MERRA data in their weather, climate or applications work. The course has

  1. Access Safety Systems – New Concepts from the LHC Experience

    CERN Document Server

    Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E

    2011-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...

  2. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    NARCIS (Netherlands)

    Koonen, A.M.J.; Popov, M.; Wessing, H.

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy

  3. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  4. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  5. The Principle of Non-Refoulement and Access to Asylum System: Two Sides of the Same Coin

    Directory of Open Access Journals (Sweden)

    Goranka Lalić Novak

    2015-12-01

    Full Text Available The European Union and other countries on the Balkan route for migrants have recorded a large increase in the number of asylum seekers. In parallel with the increased number of refugees trying to enter the territory of the EU, measures for migration management have tightened, and the right to asylum at the level of the Member States has been interpreted more and more restrictive. Search for protection from persecution has become a reason for closing borders and disabling access to territory and asylum system. However, access to asylum system is the first step in the realization of the right to asylum as guaranteed by international, European and national law. In addition to allowing access to territory and asylum system, which implies an obligation of states to accept refugees in order to confirm the need for international protection in a fair and efficient procedure, the states are obliged to respect the principle of non-refoulement. The aim of this paper is to clarify the connection between providing access to asylum system and respect for the principle of non-refoulement. Analysis in the paper was done by legal-dogmatic method of research and interpretation of legal acts and other authorities, as well as of UNHCR relevant recommendations and documents. The assumption is that without the provision of access to territory and asylum system the principle of non-refoulement cannot be respected. Apart from the international refugee law and doctrinal interpretations, it derives from the practice of the European Court of Human Rights regarding the prohibition of torture or other inhuman treatment or punishment guaranteed by the Convention for the Protection of Human Rights and Fundamental Freedoms. The conclusion is that the states must take into account international and European standards regarding the protection of the principle of non-refoulement when considering the introduction of new measures to manage migration movements.

  6. Increasing Access to Tuberculosis Services in Ethiopia: Findings From a Patient-Pathway Analysis.

    Science.gov (United States)

    Fekadu, Lelisa; Hanson, Christy; Osberg, Mike; Makayova, Julia; Mingkwan, Pia; Chin, Daniel

    2017-11-06

    In Ethiopia, extensive scale-up of the availability of health extension workers (HEWs) at the community level has been credited with increased identification and referral of patients with presumptive tuberculosis, which has contributed to increased tuberculosis case notification and better treatment outcomes. However, nearly 30% of Ethiopia's estimated 191000 patients with tuberculosis remained unnotified in 2015. A better understanding of patient care-seeking practices may inform future government action to reach all patients with tuberculosis. A patient-pathway analysis was completed to assess the alignment between patient care initiation and the availability of diagnostic and treatment services at the national level. More than one third of patients initiated care with HEWs, who refer patients to health centers for diagnosis. An additional one third of patients initiated care at health centers. Of those health centers, >80% had microscopy services, but few had access to Xpert. Despite an extensive microscopy and radiography network at middle levels of the health system, a quarter of all notified patients with tuberculosis had no bacteriological confirmation of disease. While 30% of patients reported receiving some form of care from the private sector, private-sector facilities, especially pharmacies, were not widely accessed for tuberculosis diagnosis. The availability of HEWs can increase access to tuberculosis diagnostic and treatment support services, particularly for rural populations. Continued strengthening of referral systems from HEWs and health posts are needed to enable consistent and timely access to Xpert as an initial diagnostic test and to drug resistance screening. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  7. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  8. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    Directory of Open Access Journals (Sweden)

    Elena Verdú

    2017-12-01

    Full Text Available Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to SignWriting, a way of writing Sign Language. This system extends the functionality of a general web platform that can provide accessible web content for different needs. This platform has a core component that automatically converts any web page to a web page compliant with level AA of WAI guidelines. Around this core component, different adapters complete the conversion according to the needs of specific users. One adapter is the Deaf People Accessibility Adapter, which provides accessible web content for the Deaf, based on SignWritting. Functionality of this adapter has been extended with the video subtitle translator system. A first prototype of this system has been tested through different methods including usability and accessibility tests and results show that this tool can enhance the accessibility of video content available on the Web for Deaf people.

  9. Space elevator systems level analysis

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. It involves new, untried technologies in most of its subsystems. Thus the successful construction of the SE requires a significant amount of development, This in turn implies a high level of risk for the SE. This paper will present a systems level analysis of the SE by subdividing its components into their subsystems to determine their level of technological maturity. such a high-risk endeavor is to follow a disciplined approach to the challenges. A systems level analysis informs this process and is the guide to where resources should be applied in the development processes. It is an efficient path that, if followed, minimizes the overall risk of the system's development. systems level analysis is that the overall system is divided naturally into its subsystems, and those subsystems are further subdivided as appropriate for the analysis. By dealing with the complex system in layers, the parameter space of decisions is kept manageable. Moreover, A rational way to manage One key aspect of a resources are not expended capriciously; rather, resources are put toward the biggest challenges and most promising solutions. This overall graded approach is a proven road to success. The analysis includes topics such as nanotube technology, deployment scenario, power beaming technology, ground-based hardware and operations, ribbon maintenance and repair and climber technology.

  10. Prospective evaluation of an internet-linked handheld computer critical care knowledge access system.

    Science.gov (United States)

    Lapinsky, Stephen E; Wax, Randy; Showalter, Randy; Martinez-Motta, J Carlos; Hallett, David; Mehta, Sangeeta; Burry, Lisa; Stewart, Thomas E

    2004-12-01

    Critical care physicians may benefit from immediate access to medical reference material. We evaluated the feasibility and potential benefits of a handheld computer based knowledge access system linking a central academic intensive care unit (ICU) to multiple community-based ICUs. Four community hospital ICUs with 17 physicians participated in this prospective interventional study. Following training in the use of an internet-linked, updateable handheld computer knowledge access system, the physicians used the handheld devices in their clinical environment for a 12-month intervention period. Feasibility of the system was evaluated by tracking use of the handheld computer and by conducting surveys and focus group discussions. Before and after the intervention period, participants underwent simulated patient care scenarios designed to evaluate the information sources they accessed, as well as the speed and quality of their decision making. Participants generated admission orders during each scenario, which were scored by blinded evaluators. Ten physicians (59%) used the system regularly, predominantly for nonmedical applications (median 32.8/month, interquartile range [IQR] 28.3-126.8), with medical software accessed less often (median 9/month, IQR 3.7-13.7). Eight out of 13 physicians (62%) who completed the final scenarios chose to use the handheld computer for information access. The median time to access information on the handheld handheld computer was 19 s (IQR 15-40 s). This group exhibited a significant improvement in admission order score as compared with those who used other resources (P = 0.018). Benefits and barriers to use of this technology were identified. An updateable handheld computer system is feasible as a means of point-of-care access to medical reference material and may improve clinical decision making. However, during the study, acceptance of the system was variable. Improved training and new technology may overcome some of the barriers we

  11. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems

    DEFF Research Database (Denmark)

    Handlos, Line Neerup; Olwig, Karen Fog; Bygbjerg, Ib Christian

    2016-01-01

    unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia......Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely......, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than...

  12. An Information System to Access Status Information of the LHCb Online

    International Nuclear Information System (INIS)

    Frank, M; Gaspar, C

    2012-01-01

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  13. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  14. A System for Web-based Access to the HSOS Database

    Science.gov (United States)

    Lin, G.

    Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.

  15. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  16. 40 CFR 1400.9 - Access to off-site consequence analysis information by State and local government officials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Access to off-site consequence... CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis Information by Government Officials. § 1400.9 Access to off-site consequence analysis...

  17. The ASDEX integrated data analysis system AIDA

    International Nuclear Information System (INIS)

    Grassie, K.; Gruber, O.; Kardaun, O.; Kaufmann, M.; Lackner, K.; Martin, P.; Mast, K.F.; McCarthy, P.J.; Mertens, V.; Pohl, D.; Rang, U.; Wunderlich, R.

    1989-11-01

    Since about two years, the ASDEX integrated data analysis system (AIDA), which combines the database (DABA) and the statistical analysis system (SAS), is successfully in operation. Besides a considerable, but meaningful, reduction of the 'raw' shot data, it offers the advantage of carefully selected and precisely defined datasets, which are easily accessible for informative tabular data overviews (DABA), and multi-shot analysis (SAS). Even rather complicated, statistical analyses can be performed efficiently within this system. In this report, we want to summarise AIDA's main features, give some details on its set-up and on the physical models which have been used for the derivation of the processed data. We also give short introduction how to use DABA and SAS. (orig.)

  18. Open Access Journal Policies: A Systematic Analysis of Radiology Journals.

    Science.gov (United States)

    Narayan, Anand; Lobner, Katie; Fritz, Jan

    2018-02-01

    The open access movement has pushed for greater access to scientific knowledge by expanding access to scientific journal articles. There is limited information about the extent to which open access policies have been adopted by radiology journals. We performed a systematic analysis to ascertain the proportion of radiology journals with open access options. A search was performed with the assistance of a clinical informationist. Full and mixed English-language diagnostic and interventional radiology Web of Science journals (impact factors > 1.0) were included. Nuclear medicine, radiation oncology, physics, and solicitation-only journals were excluded. Primary outcome was open access option (yes or no) with additional outcomes including presence or absence of embargo, complete or partial copyright transfer, publication fees, and self-archiving policies. Secondary outcomes included journal citations, journal impact factors, immediacy, Eigenfactor, and article influence scores. Independent double readings were performed with differences resolved by consensus, supplemented by contacting editorial staff at each journal. In all, 125 journals were identified; review yielded 49 journals (39%, mean impact factor of 2.61). Thirty-six of the journals had open access options (73.4%), and four journals were exclusively open access (8.2%). Twelve-month embargoes were most commonly cited (90.6%) with 28.6% of journals stating that they did not require a complete transfer of copyright. Prices for open access options ranged from $750 to $4,000 (median $3,000). No statistically significant differences were found in journal impact measures comparing journals with open access options to journals without open access options. Diagnostic and interventional radiology journals have widely adopted open access options with a few radiology journals being exclusively open access. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  19. Performance analysis of spectral-phase-encoded optical code-division multiple-access system regarding the incorrectly decoded signal as a nonstationary random process

    Science.gov (United States)

    Yan, Meng; Yao, Minyu; Zhang, Hongming

    2005-11-01

    The performance of a spectral-phase-encoded (SPE) optical code-division multiple-access (OCDMA) system is analyzed. Regarding the incorrectly decoded signal (IDS) as a nonstationary random process, we derive a novel probability distribution for it. The probability distribution of the IDS is considered a chi-squared distribution with degrees of freedom r=1, which is more reasonable and accurate than in previous work. The bit error rate (BER) of an SPE OCDMA system under multiple-access interference is evaluated. Numerical results show that the system can sustain very low BER even when there are multiple simultaneous users, and as the code length becomes longer or the initial pulse becomes shorter, the system performs better.

  20. Development of improved methods for remote access of DIII-D data and data analysis

    International Nuclear Information System (INIS)

    Greene, K.L.; McHarg, B.B. Jr.

    1997-11-01

    The DIII-D tokamak is a national fusion research facility. There is an increasing need to access data from remote sites in order to facilitate data analysis by collaborative researchers at remote locations, both nationally and internationally. In the past, this has usually been done by remotely logging into computers at the DIII-D site. With the advent of faster networking and powerful computers at remote sites, it is becoming possible to access and analyze data from anywhere in the world as if the remote user were actually at the DIII-D site. The general mechanism for accessing DIII-D data has always been via the PTDATA subroutine. Substantial enhancements are being made to that routine to make it more useful in a non-local environment. In particular, a caching mechanism is being built into PTDATA to make network data access more efficient. Studies are also being made of using Distributed File System (DFS) disk storage in a Distributed Computing Environment (DCE). A data server has been created that will migrate, on request, shot data from the DIII-D environment into the DFS environment

  1. Access, excess, and ethics--towards a sustainable distribution model for antibiotics.

    Science.gov (United States)

    Heyman, Gabriel; Cars, Otto; Bejarano, Maria-Teresa; Peterson, Stefan

    2014-05-01

    The increasing antibiotic resistance is a global threat to health care as we know it. Yet there is no model of distribution ready for a new antibiotic that balances access against excessive or inappropriate use in rural settings in low- and middle-income countries (LMICs) where the burden of communicable diseases is high and access to quality health care is low. Departing from a hypothetical scenario of rising antibiotic resistance among pneumococci, 11 stakeholders in the health systems of various LMICs were interviewed one-on-one to give their view on how a new effective antibiotic should be distributed to balance access against the risk of inappropriate use. Transcripts were subjected to qualitative 'framework' analysis. The analysis resulted in four main themes: Barriers to rational access to antibiotics; balancing access and excess; learning from other communicable diseases; and a system-wide intervention. The tension between access to antibiotics and rational use stems from shortcomings found in the health systems of LMICs. Constructing a sustainable yet accessible model of antibiotic distribution for LMICs is a task of health system-wide proportions, which is why we strongly suggest using systems thinking in future research on this issue.

  2. Global Web Accessibility Analysis of National Government Portals and Ministry Web Sites

    DEFF Research Database (Denmark)

    Goodwin, Morten; Susar, Deniz; Nietzio, Annika

    2011-01-01

    Equal access to public information and services for all is an essential part of the United Nations (UN) Declaration of Human Rights. Today, the Web plays an important role in providing information and services to citizens. Unfortunately, many government Web sites are poorly designed and have...... accessibility barriers that prevent people with disabilities from using them. This article combines current Web accessibility benchmarking methodologies with a sound strategy for comparing Web accessibility among countries and continents. Furthermore, the article presents the first global analysis of the Web...... accessibility of 192 United Nation Member States made publically available. The article also identifies common properties of Member States that have accessible and inaccessible Web sites and shows that implementing antidisability discrimination laws is highly beneficial for the accessibility of Web sites, while...

  3. Access to justice in the Convention on Rights system

    NARCIS (Netherlands)

    Gerards, J.H.; Glas, L.R.

    2017-01-01

    The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference

  4. Secure wide area network access to CMS analysis data using the Lustre filesystem

    Science.gov (United States)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  5. Secure wide area network access to CMS analysis data using the Lustre filesystem

    International Nuclear Information System (INIS)

    Bourilkov, D; Avery, P; Cheng, M; Fu, Y; Kim, B; Palencia, J; Budden, R; Benninger, K; Rodriquez, J L; Dilascio, J; Dykstra, D; Seenu, N

    2012-01-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  6. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  7. Water Information Management & Analysis System (WIMAS) v 4.0

    Data.gov (United States)

    Kansas Data Access and Support Center — The Water Information Management and Analysis System (WIMAS) is an ArcView based GIS application that allows users to query Kansas water right data maintained by the...

  8. Sophistication of burnup analysis system for fast reactor (2)

    International Nuclear Information System (INIS)

    Yokoyama, Kenji; Hirai, Yasushi; Tatsumi, Masahiro

    2010-10-01

    Improvement on prediction accuracy for neutronics characteristics of fast reactor cores is one of the most important study domains in terms of both achievement of high economical plant efficiency based on reasonably advanced designs and increased reliability and safety margins. In former study, considerable improvement on prediction accuracy in neutronics design has been achieved in the development of the unified cross-section set as a fruit of a series of critical experiments such as JUPITER in application of the reactor constant adjustments. For design of fast reactor cores improvement of not only static characteristics but also burnup characteristics is very important. For such purpose, it is necessary to improve the prediction accuracy on burnup characteristics using actual burnup data of 'JOYO' and 'MONJU', experimental and prototype fast reactors. Recently, study on effective burnup method for minor actinides becomes important theme. However, there is a problem that analysis work tends to become inefficient for lack of functionality suitable for analysis of composition change due to burnup since the conventional analysis system is targeted to critical assembly systems. Therefore development of burnup analysis system for fast reactors with modularity and flexibility is being done that would contribute to actual core design work and improvement of prediction accuracy. In the previous study, we have developed a prototype system which has functions of performing core and burnup calculations using given constant files (PDS files) and information based on simple and easy user input data. It has also functions of fuel shuffling which is indispensable for power reactor analysis systems. In the present study, by extending the prototype system, features for handling of control rods and energy collapse of group constants have been designed and implemented. Computational results from the present analysis system are stored into restart files which can be accessible by

  9. Assessment of Deafblind Access to Manual Language Systems (ADAMLS)

    Science.gov (United States)

    Blaha, Robbie; Carlson, Brad

    2007-01-01

    This document presents the Assessment of Deafblind Access to Manual Language Systems (ADAMLS), a resource for educational teams who are responsible for developing appropriate adaptations and strategies for children who are deafblind who are candidates for learning manual language systems. The assessment tool should be used for all children with a…

  10. System Analysis and Risk Assessment (SARA) system

    International Nuclear Information System (INIS)

    Krantz, E.A.; Russell, K.D.; Stewart, H.D.; Van Siclen, V.S.

    1986-01-01

    Utilization of Probabilistic Risk Assessment (PRA) related information in the day-to-day operation of plant systems has, in the past, been impracticable due to the size of the computers needed to run PRA codes. This paper discusses a microcomputer-based database system which can greatly enhance the capability of operators or regulators to incorporate PRA methodologies into their routine decision making. This system is called the System Analysis and Risk Assessment (SARA) system. SARA was developed by EG and G Idaho, Inc. at the Idaho National Engineering Laboratory to facilitate the study of frequency and consequence analyses of accident sequences from a large number of light water reactors (LWRs) in this country. This information is being amassed by several studies sponsored by the United States Nuclear Regulatory Commission (USNRC). To meet the need of portability and accessibility, and to perform the variety of calculations necessary, it was felt that a microcomputer-based system would be most suitable

  11. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  12. 40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.

    Science.gov (United States)

    2010-07-01

    ...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... PROGRAMS UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to...

  13. Disability Evaluation System Analysis and Research Annual Report 2017

    Science.gov (United States)

    2017-11-20

    females, other race, enlisted and active duty service members for all services and time periods. • Rates increase as age increases in the Army. For the...Annual Report 2017 Disability Evaluation Systems Analysis and Research Prepared by Accession Medical Standards Analysis and Research Activity ...50 History of hospitalization among active duty service

  14. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  15. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  16. Flow Injection Analysis and Liquid Chromatography for Multifunctional Chemical Analysis (MCA) Systems

    Science.gov (United States)

    Mayo, Ana V.; Loegel, Thomas N.; Bretz, Stacey Lowery; Danielson, Neil D.

    2013-01-01

    The large class sizes of first-year chemistry labs makes it challenging to provide students with hands-on access to instrumentation because the number of students typically far exceeds the number of research-grade instruments available to collect data. Multifunctional chemical analysis (MCA) systems provide a viable alternative for large-scale…

  17. Analysis and Optimization of Distributed Real-Time Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    2006-01-01

    and scheduling policies. In this context, the task of designing such systems is becoming increasingly difficult. The success of new adequate design methods depends on the availability of efficient analysis as well as optimization techniques. In this paper, we present both analysis and optimization approaches...... characteristic to this class of systems: mapping of functionality, the optimization of the access to the communication channel, and the assignment of scheduling policies to processes. Optimization heuristics aiming at producing a schedulable system, with a given amount of resources, are presented....

  18. A Meta-analysis of randomized clinical trials assessing hemodialysis access thrombosis based on access flow monitoring: Where do we stand?

    Science.gov (United States)

    Muchayi, Timothy; Salman, Loay; Tamariz, Leonardo J; Asif, Arif; Rizvi, Abid; Lenz, Oliver; Vazquez-Padron, Roberto I.; Tabbara, Marwan; Contreras, Gabriel

    2015-01-01

    The National Kidney Foundation Kidney Disease Outcomes Quality Initiative recommends the routine use of hemodialysis arteriovenous (AV) access surveillance to detect hemodynamically significant stenoses and appropriately correct them to reduce the incidence of thrombosis and to improve accesses patency rates. Access blood flow monitoring is considered as one of the preferred surveillance method for both AV fistulas (AVF) and AV grafts (AVG); however, published studies have reported conflicting results of its utility that led healthcare professionals to doubt the benefits of this surveillance method. We performed a meta-analysis of the published randomized controlled trials (RCTs) of AV access surveillance using access blood flow monitoring. Our hypothesis was that access blood flow monitoring lowers the risk of AV access thrombosis and that the outcome differs between AVF and AVG. The estimated overall pooled risk ratio (RR) of thrombosis was 0.87 (95% confidence interval [CI], 0.67 to 1.13) favoring access blood flow monitoring. The pooled RR of thrombosis were 0.64 (95% CI, 0.41 to 1.01) and 1.06 (95% CI, 0.77 to 1.46) in the subgroups of only AVF and only AVG, respectively. Our results added to the uncertainty of access blood flow monitoring as a surveillance method of hemodialysis accesses. PMID:25644548

  19. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  20. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  1. Systemic barriers accessing HIV treatment among people who inject drugs in Russia: a qualitative study.

    Science.gov (United States)

    Sarang, Anya; Rhodes, Tim; Sheon, Nicolas

    2013-10-01

    Achieving 'universal access' to antiretroviral HIV treatment (ART) in lower income and transitional settings is a global target. Yet, access to ART is shaped by local social condition and is by no means universal. Qualitative studies are ideally suited to describing how access to ART is socially situated. We explored systemic barriers to accessing ART among people who inject drugs (PWID) in a Russian city (Ekaterinburg) with a large burden of HIV treatment demand. We undertook 42 in-depth qualitative interviews with people living with HIV with current or recent experience of injecting drug use. Accounts were analysed thematically, and supplemented here with an illustrative case study. Three core themes were identified: 'labyrinthine bureaucracy' governing access to ART; a 'system Catch 22' created by an expectation that access to ART was conditional upon treated drug use in a setting of limited drug treatment opportunity; and 'system verticalization', where a lack of integration across HIV, tuberculosis (TB) and drug treatment compromised access to ART. Taken together, we find that systemic factors play a key role in shaping access to ART with the potential adverse effects of reproducing treatment initiation delay and disengagement from treatment. We argue that meso-level systemic factors affecting access to ART for PWID interact with wider macro-level structural forces, including those related to drug treatment policy and the social marginalization of PWID. We note the urgent need for systemic and structural changes to improve access to ART for PWID in this setting, including to simplify bureaucratic procedures, foster integrated HIV, TB and drug treatment services, and advocate for drug treatment policy reform.

  2. Study of Solid State Drives performance in PROOF distributed analysis system

    Science.gov (United States)

    Panitkin, S. Y.; Ernst, M.; Petkus, R.; Rind, O.; Wenaus, T.

    2010-04-01

    Solid State Drives (SSD) is a promising storage technology for High Energy Physics parallel analysis farms. Its combination of low random access time and relatively high read speed is very well suited for situations where multiple jobs concurrently access data located on the same drive. It also has lower energy consumption and higher vibration tolerance than Hard Disk Drive (HDD) which makes it an attractive choice in many applications raging from personal laptops to large analysis farms. The Parallel ROOT Facility - PROOF is a distributed analysis system which allows to exploit inherent event level parallelism of high energy physics data. PROOF is especially efficient together with distributed local storage systems like Xrootd, when data are distributed over computing nodes. In such an architecture the local disk subsystem I/O performance becomes a critical factor, especially when computing nodes use multi-core CPUs. We will discuss our experience with SSDs in PROOF environment. We will compare performance of HDD with SSD in I/O intensive analysis scenarios. In particular we will discuss PROOF system performance scaling with a number of simultaneously running analysis jobs.

  3. 40 CFR 1400.8 - Access to off-site consequence analysis information by Federal government officials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Access to off-site consequence... MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis...

  4. Pyroprocess Deployment Analysis and Remote Accessibility Experiment using Digital Mockup and Simulation

    International Nuclear Information System (INIS)

    Kim, K. H.; Park, H. S.; Kim, S. H.; Choi, C. H.; Lee, H. J.; Park, B. S.; Yoon, G. S.; Kim, K. H.; Kim, H. D.

    2009-11-01

    Nuclear fuel cycle facility that treats with spent fuel must be designed and manufactured a Pyroprcess facility and process with considering a speciality as every process have to be processed remotely. To prevent an unexpected accident under a circumstance that must operate with a remote manipulator after done the Pyroprocess facility, an procedure related Pyroprocess operation and maintenance need to establish it in the early design stage. To develop the simulator that is mixed by 3D modelling and simulation, a system architecture was designed. A full-scale digital mockup with a real pyroprocess facility was designed and manufactured. An inverse kinematics algorithm of remote manipulator was created in order to simulate an accident and repair that could happen in pyroprocess operation and maintenance under a virtual digital mockup environment. Deployment analysis of process devices through a workspace analysis was carried out and Accessibility analysis by using haptic device was examined

  5. Web-based discovery, access and analysis tools for the provision of different data sources like remote sensing products and climate data

    Science.gov (United States)

    Eberle, J.; Hese, S.; Schmullius, C.

    2012-12-01

    To provide different of Earth Observation products in the area of Siberia, the Siberian Earth System Science Cluster (SIB-ESS-C) was established as a spatial data infrastructure at the University of Jena (Germany), Department for Earth Observation. The infrastructure implements standards published by the Open Geospatial Consortium (OGC) and the International Organization for Standardization (ISO) for data discovery, data access and data analysis. The objective of SIB-ESS-C is to faciliate environmental research and Earth system science in Siberia. Several products from the Moderate Resolution Imaging Spectroradiometer sensor were integrated by serving ISO-compliant Metadata and providing OGC-compliant Web Map Service for data visualization and Web Coverage Services / Web Feature Service for data access. Furthermore climate data from the World Meteorological Organization were downloaded, converted, provided as OGC Sensor Observation Service. Each climate data station is described with ISO-compliant Metadata. All these datasets from multiple sources are provided within the SIB-ESS-C infrastructure (figure 1). Furthermore an automatic workflow integrates updates of these datasets daily. The brokering approach within the SIB-ESS-C system is to collect data from different sources, convert the data into common data formats, if necessary, and provide them with standardized Web services. Additional tools are made available within the SIB-ESS-C Geoportal for an easy access to download and analysis functions (figure 2). The data can be visualized, accessed and analysed with this Geoportal. Providing OGC-compliant services the data can also be accessed with other OGC-compliant clients.; Figure 1. Technical Concept of SIB-ESS-C providing different data sources ; Figure 2. Screenshot of the web-based SIB-ESS-C system.

  6. How universal is coverage and access to diagnosis and treatment for Chagas disease in Colombia? A health systems analysis.

    Science.gov (United States)

    Cucunubá, Zulma M; Manne-Goehler, Jennifer M; Díaz, Diana; Nouvellet, Pierre; Bernal, Oscar; Marchiol, Andrea; Basáñez, María-Gloria; Conteh, Lesong

    2017-02-01

    Limited access to Chagas disease diagnosis and treatment is a major obstacle to reaching the 2020 World Health Organization milestones of delivering care to all infected and ill patients. Colombia has been identified as a health system in transition, reporting one of the highest levels of health insurance coverage in Latin America. We explore if and how this high level of coverage extends to those with Chagas disease, a traditionally marginalised population. Using a mixed methods approach, we calculate coverage for screening, diagnosis and treatment of Chagas. We then identify supply-side constraints both quantitatively and qualitatively. A review of official registries of tests and treatments for Chagas disease delivered between 2008 and 2014 is compared to estimates of infected people. Using the Flagship Framework, we explore barriers limiting access to care. Screening coverage is estimated at 1.2% of the population at risk. Aetiological treatment with either benznidazol or nifurtimox covered 0.3-0.4% of the infected population. Barriers to accessing screening, diagnosis and treatment are identified for each of the Flagship Framework's five dimensions of interest: financing, payment, regulation, organization and persuasion. The main challenges identified were: a lack of clarity in terms of financial responsibilities in a segmented health system, claims of limited resources for undertaking activities particularly in primary care, non-inclusion of confirmatory test(s) in the basic package of diagnosis and care, poor logistics in the distribution and supply chain of medicines, and lack of awareness of medical personnel. Very low screening coverage emerges as a key obstacle hindering access to care for Chagas disease. Findings suggest serious shortcomings in this health system for Chagas disease, despite the success of universal health insurance scale-up in Colombia. Whether these shortcomings exist in relation to other neglected tropical diseases needs investigating

  7. submitter Studies of CMS data access patterns with machine learning techniques

    CERN Document Server

    De Luca, Silvia

    This thesis presents a study of the Grid data access patterns in distributed analysis in the CMS experiment at the LHC accelerator. This study ranges from the deep analysis of the historical patterns of access to the most relevant data types in CMS, to the exploitation of a supervised Machine Learning classification system to set-up a machinery able to eventually predict future data access patterns - i.e. the so-called dataset “popularity” of the CMS datasets on the Grid - with focus on specific data types. All the CMS workflows run on the Worldwide LHC Computing Grid (WCG) computing centers (Tiers), and in particular the distributed analysis systems sustains hundreds of users and applications submitted every day. These applications (or “jobs”) access different data types hosted on disk storage systems at a large set of WLCG Tiers. The detailed study of how this data is accessed, in terms of data types, hosting Tiers, and different time periods, allows to gain precious insight on storage occupancy ove...

  8. A web accessible scientific workflow system for vadoze zone performance monitoring: design and implementation examples

    Science.gov (United States)

    Mattson, E.; Versteeg, R.; Ankeny, M.; Stormberg, G.

    2005-12-01

    Long term performance monitoring has been identified by DOE, DOD and EPA as one of the most challenging and costly elements of contaminated site remedial efforts. Such monitoring should provide timely and actionable information relevant to a multitude of stakeholder needs. This information should be obtained in a manner which is auditable, cost effective and transparent. Over the last several years INL staff has designed and implemented a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition from diverse sensors (geophysical, geochemical and hydrological) with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic javascript and html/css) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This system has been implemented and is operational for several sites, including the Ruby Gulch Waste Rock Repository (a capped mine waste rock dump on the Gilt Edge Mine Superfund Site), the INL Vadoze Zone Research Park and an alternative cover landfill. Implementations for other vadoze zone sites are currently in progress. These systems allow for autonomous performance monitoring through automated data analysis and report generation. This performance monitoring has allowed users to obtain insights into system dynamics, regulatory compliance and residence times of water. Our system uses modular components for data selection and graphing and WSDL compliant webservices for external functions such as statistical analyses and model invocations. Thus, implementing this system for novel sites and extending functionality (e.g. adding novel models) is relatively straightforward. As system access requires a standard webbrowser

  9. Modeling and Performance Analysis of Manufacturing Systems in ...

    African Journals Online (AJOL)

    Modeling and Performance Analysis of Manufacturing Systems in Footwear Industry. ... researcher to experiment with different variables and controls the manufacturing process ... In this study Arena simulation software is employed to model and measure ... for Authors · for Policy Makers · about Open Access · Journal Quality.

  10. GaitaBase: Web-based repository system for gait analysis.

    Science.gov (United States)

    Tirosh, Oren; Baker, Richard; McGinley, Jenny

    2010-02-01

    The need to share gait analysis data to improve clinical decision support has been recognised since the early 1990s. GaitaBase has been established to provide a web-accessible repository system of gait analysis data to improve the sharing of data across local and international clinical and research community. It is used by several clinical and research groups across the world providing cross-group access permissions to retrieve and analyse the data. The system is useful for bench-marking and quality assurance, clinical consultation, and collaborative research. It has the capacity to increase the population sample size and improve the quality of 'normative' gait data. In addition the accumulated stored data may facilitate clinicians in comparing their own gait data with others, and give a valuable insight into how effective specific interventions have been for others. 2009 Elsevier Ltd. All rights reserved.

  11. SSR and morphological trait based population structure analysis of 130 diverse flax (Linum usitatissimum L.) accessions.

    Science.gov (United States)

    Choudhary, Shashi Bhushan; Sharma, Hariom Kumar; Kumar, Arroju Anil; Maruthi, Rangappa Thimmaiah; Mitra, Jiban; Chowdhury, Isholeena; Singh, Binay Kumar; Karmakar, Pran Gobinda

    2017-02-01

    A total of 130 flax accessions of diverse morphotypes and worldwide origin were assessed for genetic diversity and population structure using 11 morphological traits and microsatellite markers (15 gSSRs and 7 EST-SSRs). Analysis performed after classifying these accessions on the basis of plant height, branching pattern, seed size, Indian/foreign origin into six categories called sub-populations viz. fibre type exotic, fibre type indigenous, intermediate type exotic, intermediate type indigenous, linseed type exotic and linseed type indigenous. The study assessed different diversity indices, AMOVA, population structure and included a principal coordinate analysis based on different marker systems. The highest diversity was exhibited by gSSR markers (SI=0.46; He=0.31; P=85.11). AMOVA based on all markers explained significant difference among fibre type, intermediate type and linseed type populations of flax. In terms of variation explained by different markers, EST-SSR markers (12%) better differentiated flax populations compared to morphological (9%) and gSSR (6%) markers at P=0.01. The maximum Nei's unbiased genetic distance (D=0.11) was observed between fibre type and linseed type exotic sub-populations based on EST-SSR markers. The combined structure analysis by using all markers grouped Indian fibre type accessions (63.4%) in a separate cluster along with the Indian intermediate type (48.7%), whereas Indian accessions (82.16%) of linseed type constituted an independent cluster. These findings were supported by the results of the principal coordinate analysis. Morphological markers employed in the study found complementary with microsatellite based markers in deciphering genetic diversity and population structure of the flax germplasm. Copyright © 2016 Académie des sciences. Published by Elsevier Masson SAS. All rights reserved.

  12. Common data model access; a unified layer to access data from data analysis point of view

    International Nuclear Information System (INIS)

    Poirier, S.; Buteau, A.; Ounsy, M.; Rodriguez, C.; Hauser, N.; Lam, T.; Xiong, N.

    2012-01-01

    For almost 20 years, the scientific community of neutron and synchrotron institutes have been dreaming of a common data format for exchanging experimental results and applications for reducing and analyzing the data. Using HDF5 as a data container has become the standard in many facilities. The big issue is the standardization of the data organization (schema) within the HDF5 container. By introducing a new level of indirection for data access, the Common-Data-Model-Access (CDMA) framework proposes a solution and allows separation of responsibilities between data reduction developers and the institute. Data reduction developers are responsible for data reduction code; the institute provides a plug-in to access the data. The CDMA is a core API that accesses data through a data format plug-in mechanism and scientific application definitions (sets of keywords) coming from a consensus between scientists and institutes. Using a innovative 'mapping' system between application definitions and physical data organizations, the CDMA allows data reduction application development independent of the data file container AND schema. Each institute develops a data access plug-in for its own data file formats along with the mapping between application definitions and its data files. Thus data reduction applications can be developed from a strictly scientific point of view and are immediately able to process data acquired from several institutes. (authors)

  13. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  14. ADAM: analysis of discrete models of biological systems using computer algebra.

    Science.gov (United States)

    Hinkelmann, Franziska; Brandon, Madison; Guang, Bonny; McNeill, Rustin; Blekherman, Grigoriy; Veliz-Cuba, Alan; Laubenbacher, Reinhard

    2011-07-20

    Many biological systems are modeled qualitatively with discrete models, such as probabilistic Boolean networks, logical models, Petri nets, and agent-based models, to gain a better understanding of them. The computational complexity to analyze the complete dynamics of these models grows exponentially in the number of variables, which impedes working with complex models. There exist software tools to analyze discrete models, but they either lack the algorithmic functionality to analyze complex models deterministically or they are inaccessible to many users as they require understanding the underlying algorithm and implementation, do not have a graphical user interface, or are hard to install. Efficient analysis methods that are accessible to modelers and easy to use are needed. We propose a method for efficiently identifying attractors and introduce the web-based tool Analysis of Dynamic Algebraic Models (ADAM), which provides this and other analysis methods for discrete models. ADAM converts several discrete model types automatically into polynomial dynamical systems and analyzes their dynamics using tools from computer algebra. Specifically, we propose a method to identify attractors of a discrete model that is equivalent to solving a system of polynomial equations, a long-studied problem in computer algebra. Based on extensive experimentation with both discrete models arising in systems biology and randomly generated networks, we found that the algebraic algorithms presented in this manuscript are fast for systems with the structure maintained by most biological systems, namely sparseness and robustness. For a large set of published complex discrete models, ADAM identified the attractors in less than one second. Discrete modeling techniques are a useful tool for analyzing complex biological systems and there is a need in the biological community for accessible efficient analysis tools. ADAM provides analysis methods based on mathematical algorithms as a web

  15. The upgrade of the J-TEXT experimental data access and management system

    International Nuclear Information System (INIS)

    Yang, C.; Zhang, M.; Zheng, W.; Liu, R.; Zhuang, G.

    2014-01-01

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  16. Providing Access to Library Automation Systems for Students with Disabilities.

    Science.gov (United States)

    California Community Colleges, Sacramento. High-Tech Center for the Disabled.

    This document provides information on the integration of assistive computer technologies and library automation systems at California Community Colleges in order to ensure access for students with disabilities. Topics covered include planning, upgrading, purchasing, implementing and using these technologies with library systems. As information…

  17. An analysis of the accessibility of video lottery terminals: the case of Montréal

    Directory of Open Access Journals (Sweden)

    Herjean Patrick

    2008-01-01

    Full Text Available Abstract Background Researchers and public health officials in Canada, the United States and Australia have for some time noted broader geographic accessibility to gambling establishments, above all in socioeconomically underprivileged communities. This increase in availability could lead to more and more gambling problems. This article focuses, in an ecological perspective, in particular on a spatial analysis of the geographic accessibility of sites possessing a VLT permit in the Montréal area, i.e. Montréal Island, the South Shore and Laval, from the standpoint of the development of an indicator of the vulnerability (socioeconomic components and demographic components to gambling of populations at the level of certain neighbourhood units (dissemination areas. With the recent development of geographic information systems (GIS, it is now possible to ascertain accessibility to services much more accurately, for example by taking into account the configuration of the road network. Results The findings of our analysis reveal widespread geographic accessibility to sites possessing a VLT permit in the downtown area and in pericentral districts. In some neighbourhood units, a site possessing a VLT permit may be within a three-minute walk. In the region studied overall, average walking time to a VLT site is nine minutes. Access to this type of service on foot is usually limited in the outskirts. However, a number of groups of sites possessing VLT permits are found along certain axial highways. According to local spatial self-correlation analyses, the findings suggest a significant link between walking accessibility to sites possessing VLT permits and the vulnerability of the communities. In a number of neighbourhood units with ready access to VLT's the populations display high vulnerability. Conclusion These findings reveal that accessibility to sites possessing a VLT permit is often linked to the vulnerability (socioeconomic and demographic

  18. What systems participants know about access and service entry and why managers should listen.

    Science.gov (United States)

    Duncombe, Rohena

    2017-08-01

    Objective The present study looked at the views of people directly involved in the entry process for community health counselling using the frame of the health access literature. The concurrence of system participants' views with the access literature highlights access issues, particularly for people who are vulnerable or disadvantaged. The paper privileges the voices of the system participants, inviting local health services to consider using participatory design to improve access at the entry point. Methods People involved in the entry process for community health counselling explored the question, 'What, for you, are the features of a good intake system?' They also commented on themes identified during pilot interviews. These were thematically analysed for each participant group by the researcher to develop a voice for each stakeholder group. Results People accessing the service could be vulnerable and the entry process failed to take that into account. People directly involved in the counselling service entry system, system participants, consisted of: professionals referring in, people seeking services and reception staff taking first enquiries. They shared substantially the same concerns as each other. The responses from these system participants are consistent with the international literature on access and entry into health services. Conclusion Participatory service design could improve primary healthcare service entry at the local level. Canvassing the experiences of system participants is important for delivering services to those who have the least access and, in that way, could contribute to health equity. What is known about the topic? People with the highest health needs receive the fewest services. Health inequality is increasing. What does this paper add? System participants can provide advice consistent with the academic research literature that is useful for improving service entry at the local level. What are the implications for practitioners

  19. Design and Implementation of a Library and Information Science Open Access Journal Union Catalogue System

    Directory of Open Access Journals (Sweden)

    Sinn-Cheng Lin

    2017-03-01

    Full Text Available Open access is a mode of academic communication that has been on the rise in recent years, but open access academic resources are widely dispersed across the internet, making it occasionally inconvenient in terms of its use. This research is focused on library and information science, using the OAIS reference model as the system framework, two open access platform, DOAJ and E-LIS as the data sources, and through system implementation develop a “library and information science open access journal union catalogue” system. Using the OAI-PMH protocol as the data interoperability standard, and LAMP as the development environment, four major functionalities: injest, archiving, management and access of information were designed, developed, and integrated into system build. Actual testing and verification showed this system is able to successfully collect data from DOAJ and E-LIS open journal resources related to library and information science. The system is now active and functional, and can be used by researchers in the library and science information field.

  20. The integration of open access journals in the scholarly communication system: Three science fields

    DEFF Research Database (Denmark)

    Faber Frandsen, Tove

    2009-01-01

    across disciplines. This study is an analysis of the citing behaviour in journals within three science fields: biology, mathematics, and pharmacy and pharmacology. It is a statistical analysis of OAJs as well as non-OAJs including both the citing and cited side of the journal to journal citations......The greatest number of open access journals (OAJs) is found in the sciences and their influence is growing. However, there are only a few studies on the acceptance and thereby integration of these OAJs in the scholarly communication system. Even fewer studies provide insight into the differences....... The multivariate linear regression reveals many similarities in citing behaviour across fields and media. But it also points to great differences in the integration of OAJs. The integration of OAJs in the scholarly communication system varies considerably across fields. The implications for bibliometric research...

  1. Data management and analysis for the Earth System Grid

    Energy Technology Data Exchange (ETDEWEB)

    Williams, D N; Drach, R; Henson, V E [Lawrence Livermore National Laboratory, Livermore, CA 94550 (United States); Ananthakrishnan, R; Foster, I T; Siebenlist, F [Argonne National Laboratory, Argonne, IL 60439 (United States); Bernholdt, D E; Chen, M; Schwidder, J [Oak Ridge National Laboratory, Oak Ridge, TN 37831 (United States); Bharathi, S; Chervenak, A L; Schuler, R [University of Southern California, Information Sciences Institute, Marina del Ray, CA 90292 (United States); Brown, D; Cinquini, L; Fox, P; Middleton, D E [National Center for Atmospheric Research, Boulder, CO 80307 (United States); Hankin, S; Schweitzer, R [National Oceanic and Atmospheric Administration (PMEL), Seattle, WA 98115 (United States); Jones, P [Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Shoshani, A [Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States)], E-mail: williams13@llnl.gov, E-mail: don@ucar.edu, E-mail: itf@mcs.anl.gov, E-mail: bernholdtde@ornl.gov (and others)

    2008-07-15

    The international climate community is expected to generate hundreds of petabytes of simulation data within the next five to seven years. This data must be accessed and analyzed by thousands of analysts worldwide in order to provide accurate and timely estimates of the likely impact of climate change on physical, biological, and human systems. Climate change is thus not only a scientific challenge of the first order but also a major technological challenge. In order to address this technological challenge, the Earth System Grid Center for Enabling Technologies (ESG-CET) has been established within the U.S. Department of Energy's Scientific Discovery through Advanced Computing (SciDAC)-2 program, with support from the offices of Advanced Scientific Computing Research and Biological and Environmental Research. ESG-CET's mission is to provide climate researchers worldwide with access to the data, information, models, analysis tools, and computational capabilities required to make sense of enormous climate simulation datasets. Its specific goals are to (1) make data more useful to climate researchers by developing Grid technology that enhances data usability; (2) meet specific distributed database, data access, and data movement needs of national and international climate projects; (3) provide a universal and secure web-based data access portal for broad multi-model data collections; and (4) provide a wide-range of Grid-enabled climate data analysis tools and diagnostic methods to international climate centers and U.S. government agencies. Building on the successes of the previous Earth System Grid (ESG) project, which has enabled thousands of researchers to access tens of terabytes of data from a small number of ESG sites, ESG-CET is working to integrate a far larger number of distributed data providers, high-bandwidth wide-area networks, and remote computers in a highly collaborative problem-solving environment.

  2. Data management and analysis for the Earth System Grid

    Science.gov (United States)

    Williams, D. N.; Ananthakrishnan, R.; Bernholdt, D. E.; Bharathi, S.; Brown, D.; Chen, M.; Chervenak, A. L.; Cinquini, L.; Drach, R.; Foster, I. T.; Fox, P.; Hankin, S.; Henson, V. E.; Jones, P.; Middleton, D. E.; Schwidder, J.; Schweitzer, R.; Schuler, R.; Shoshani, A.; Siebenlist, F.; Sim, A.; Strand, W. G.; Wilhelmi, N.; Su, M.

    2008-07-01

    The international climate community is expected to generate hundreds of petabytes of simulation data within the next five to seven years. This data must be accessed and analyzed by thousands of analysts worldwide in order to provide accurate and timely estimates of the likely impact of climate change on physical, biological, and human systems. Climate change is thus not only a scientific challenge of the first order but also a major technological challenge. In order to address this technological challenge, the Earth System Grid Center for Enabling Technologies (ESG-CET) has been established within the U.S. Department of Energy's Scientific Discovery through Advanced Computing (SciDAC)-2 program, with support from the offices of Advanced Scientific Computing Research and Biological and Environmental Research. ESG-CET's mission is to provide climate researchers worldwide with access to the data, information, models, analysis tools, and computational capabilities required to make sense of enormous climate simulation datasets. Its specific goals are to (1) make data more useful to climate researchers by developing Grid technology that enhances data usability; (2) meet specific distributed database, data access, and data movement needs of national and international climate projects; (3) provide a universal and secure web-based data access portal for broad multi-model data collections; and (4) provide a wide-range of Grid-enabled climate data analysis tools and diagnostic methods to international climate centers and U.S. government agencies. Building on the successes of the previous Earth System Grid (ESG) project, which has enabled thousands of researchers to access tens of terabytes of data from a small number of ESG sites, ESG-CET is working to integrate a far larger number of distributed data providers, high-bandwidth wide-area networks, and remote computers in a highly collaborative problem-solving environment.

  3. A semi-automated vascular access system for preclinical models

    International Nuclear Information System (INIS)

    Berry-Pusey, B N; David, J; Taschereau, R; Silverman, R W; Williams, D; Ladno, W; Stout, D; Chatziioannou, A; Chang, Y C; Prince, S W; Chu, K; Tsao, T C

    2013-01-01

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. (paper)

  4. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  5. Distributed magnetic field positioning system using code division multiple access

    Science.gov (United States)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  6. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  7. Remote access and automation of SPring-8 MX beamlines

    Energy Technology Data Exchange (ETDEWEB)

    Ueno, Go, E-mail: ueno@spring8.or.jp; Hikima, Takaaki; Yamashita, Keitaro; Hirata, Kunio; Yamamoto, Masaki [RIKEN SPring-8 Center, 1-1-1 Koto, Sayo-cho, Sayo-gun, Hyogo 679-5148 JAPAN (Japan); Hasegawa, Kazuya; Murakami, Hironori; Furukawa, Yukito; Mizuno, Nobuhiro; Kumasaka, Takashi [SPring-8/JASRI, 1-1-1 Koto, Sayo-cho, Sayo-gun, Hyogo 679-5198 JAPAN (Japan)

    2016-07-27

    At SPring-8 MX beamlines, a remote access system has been developed and started user operation in 2010. The system has been developed based on an automated data collection and data management architecture utilized for the confirmed scheme of SPring-8 mail-in data collection. Currently, further improvement to the remote access and automation which covers data processing and analysis are being developed.

  8. Towards Payment Systems for all: accessible POS

    Directory of Open Access Journals (Sweden)

    Begoña Pino

    2014-10-01

    Full Text Available The project presented here is a first step towards building a more accessible world through Payment Systems and a successful implementation of a User Centred Design. By means of a beep-system, a Point of Sale (POS payment device informs the user of those transaction steps that require his/her attention at the moment of payment, such as when: the card has been successfully read, the Personal Identification Number (PIN must be entered, the transaction has been successfully processed and the transaction has not been completed due to an error. The proposed solution increases the personal autonomy and security of blind people when paying at a merchant.

  9. From System Expansion to System Contraction: Access to Higher Education in Poland

    Science.gov (United States)

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  10. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  11. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  12. Improving access to medicines via the Health Impact Fund in India: a stakeholder analysis.

    Science.gov (United States)

    McMullan, Patrick; Ajay, Vamadevan S; Srinivas, Ravi; Bhalla, Sandeep; Prabhakaran, Dorairaj; Banerjee, Amitava

    2018-01-01

    In India, 50-65% of the population face difficulties in accessing medicines. The Health Impact Fund (HIF) is a novel proposal whereby pharmaceutical companies would be paid based on the measured global health impact of their drugs. We conducted a key stakeholder analysis to explore access to medicines in India, acceptability of the HIF and potential barriers and facilitators at policy level. To conduct a stakeholder analysis of the HIF in India: to determine key stakeholder views regarding access to medicines in India; to evaluate acceptability of the HIF; and to assess potential barriers and facilitators to the HIF as a policy. In New Delhi, we conducted semi-structured interviews. There was purposive recruitment of participants with snowball sampling. Transcribed data were analysed using stakeholder analysis frameworks and directed content analysis. Participation rate was 29% (14/49). 14 semi-structured interviews were conducted among stakeholders in New Delhi. All participants highlighted access to medicines as a problem in India. There were mixed views about the HIF in terms of relevance and scaleability. Stakeholders felt it should focus on diseases with limited or no market and potentially incorporate direct investment in research. First, access to medicines is perceived to be a major problem in India by all stakeholders, but affordability is just one factor. Second, stakeholders despite considerable support for the idea of the HIF, there are major concerns about scaleability, generalisability and impact on access to medicines. Third, the HIF and other novel drug-related health policies can afford to be more radical, e.g. working outside the existing intellectual property rights regime, targeting generic as well as branded drugs, or extending to research and development. Further innovations in access to medicines must involve country-specific key stakeholders in order to increase the likelihood of their success.

  13. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    OpenAIRE

    Elena Verdú; Cristina Pelayo G-Bustelo; Ángeles Martínez Sánchez; Rubén Gonzalez-Crespo

    2017-01-01

    Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to Sign Writing, a way of writing Sign Language. This system extends the functionality of a general we...

  14. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  15. Vascular access choice in incident hemodialysis patients: a decision analysis.

    Science.gov (United States)

    Drew, David A; Lok, Charmaine E; Cohen, Joshua T; Wagner, Martin; Tangri, Navdeep; Weiner, Daniel E

    2015-01-01

    Hemodialysis vascular access recommendations promote arteriovenous (AV) fistulas first; however, it may not be the best approach for all hemodialysis patients, because likelihood of successful fistula placement, procedure-related and subsequent costs, and patient survival modify the optimal access choice. We performed a decision analysis evaluating AV fistula, AV graft, and central venous catheter (CVC) strategies for patients initiating hemodialysis with a CVC, a scenario occurring in over 70% of United States dialysis patients. A decision tree model was constructed to reflect progression from hemodialysis initiation. Patients were classified into one of three vascular access choices: maintain CVC, attempt fistula, or attempt graft. We explicitly modeled probabilities of primary and secondary patency for each access type, with success modified by age, sex, and diabetes. Access-specific mortality was incorporated using preexisting cohort data, including terms for age, sex, and diabetes. Costs were ascertained from the 2010 USRDS report and Medicare for procedure costs. An AV fistula attempt strategy was found to be superior to AV grafts and CVCs in regard to mortality and cost for the majority of patient characteristic combinations, especially younger men without diabetes. Women with diabetes and elderly men with diabetes had similar outcomes, regardless of access type. Overall, the advantages of an AV fistula attempt strategy lessened considerably among older patients, particularly women with diabetes, reflecting the effect of lower AV fistula success rates and lower life expectancy. These results suggest that vascular access-related outcomes may be optimized by considering individual patient characteristics. Copyright © 2015 by the American Society of Nephrology.

  16. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2007-01-01

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  17. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  18. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  19. Open Access Publishing Trend Analysis: Statistics beyond the Perception

    Science.gov (United States)

    Poltronieri, Elisabetta; Bravo, Elena; Curti, Moreno; Maurizio Ferri,; Mancini, Cristina

    2016-01-01

    Introduction: The purpose of this analysis was twofold: to track the number of open access journals acquiring impact factor, and to investigate the distribution of subject categories pertaining to these journals. As a case study, journals in which the researchers of the National Institute of Health (Istituto Superiore di Sanità) in Italy have…

  20. Comparison of medication safety systems in critical access hospitals: Combined analysis of two studies.

    Science.gov (United States)

    Cochran, Gary L; Barrett, Ryan S; Horn, Susan D

    2016-08-01

    The role of pharmacist transcription, onsite pharmacist dispensing, use of automated dispensing cabinets (ADCs), nurse-nurse double checks, or barcode-assisted medication administration (BCMA) in reducing medication error rates in critical access hospitals (CAHs) was evaluated. Investigators used the practice-based evidence methodology to identify predictors of medication errors in 12 Nebraska CAHs. Detailed information about each medication administered was recorded through direct observation. Errors were identified by comparing the observed medication administered with the physician's order. Chi-square analysis and Fisher's exact test were used to measure differences between groups of medication-dispensing procedures. Nurses observed 6497 medications being administered to 1374 patients. The overall error rate was 1.2%. The transcription error rates for orders transcribed by an onsite pharmacist were slightly lower than for orders transcribed by a telepharmacy service (0.10% and 0.33%, respectively). Fewer dispensing errors occurred when medications were dispensed by an onsite pharmacist versus any other method of medication acquisition (0.10% versus 0.44%, p = 0.0085). The rates of dispensing errors for medications that were retrieved from a single-cell ADC (0.19%), a multicell ADC (0.45%), or a drug closet or general supply (0.77%) did not differ significantly. BCMA was associated with a higher proportion of dispensing and administration errors intercepted before reaching the patient (66.7%) compared with either manual double checks (10%) or no BCMA or double check (30.4%) of the medication before administration (p = 0.0167). Onsite pharmacist dispensing and BCMA were associated with fewer medication errors and are important components of a medication safety strategy in CAHs. Copyright © 2016 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  1. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  2. Automated Speech and Audio Analysis for Semantic Access to Multimedia

    NARCIS (Netherlands)

    Jong, F.M.G. de; Ordelman, R.; Huijbregts, M.

    2006-01-01

    The deployment and integration of audio processing tools can enhance the semantic annotation of multimedia content, and as a consequence, improve the effectiveness of conceptual access tools. This paper overviews the various ways in which automatic speech and audio analysis can contribute to

  3. Automated speech and audio analysis for semantic access to multimedia

    NARCIS (Netherlands)

    de Jong, Franciska M.G.; Ordelman, Roeland J.F.; Huijbregts, M.A.H.; Avrithis, Y.; Kompatsiaris, Y.; Staab, S.; O' Connor, N.E.

    2006-01-01

    The deployment and integration of audio processing tools can enhance the semantic annotation of multimedia content, and as a consequence, improve the effectiveness of conceptual access tools. This paper overviews the various ways in which automatic speech and audio analysis can contribute to

  4. Analysis of Urban Households' Preference for Informal Access to ...

    African Journals Online (AJOL)

    2016-10-02

    Oct 2, 2016 ... Keywords: Urban Households, Informal Access, Residential Land, Insecure Tenure Factors. Introduction. Informal ..... its complex system. In Minna, this central control has led to certain ill-practices by land officials who accords some form of preferential treatment to some applicants. This act on one hand is ...

  5. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  6. A news media analysis of economic sanction effects on access to medicine in Iran.

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term "medicine" to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing "shortage of medicines," "medicines related issues" and "no shortage." We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran.

  7. A news media analysis of economic sanction effects on access to medicine in Iran

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    Objective: In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. Methods: We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term “medicine” to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing “shortage of medicines,” “medicines related issues” and “no shortage.” We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. Findings: A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Conclusion: Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran. PMID:26645026

  8. A Comprehensive System for Monitoring Urban Accessibility in Smart Cities.

    Science.gov (United States)

    Mora, Higinio; Gilart-Iglesias, Virgilio; Pérez-Del Hoyo, Raquel; Andújar-Montoya, María Dolores

    2017-08-09

    The present work discusses the possibilities offered by the evolution of Information and Communication Technologies with the aim of designing a system to dynamically obtain knowledge of accessibility issues in urban environments. This system is facilitated by technology to analyse the urban user experience and movement accessibility, which enabling accurate identification of urban barriers and monitoring its effectiveness over time. Therefore, the main purpose of the system is to meet the real needs and requirements of people with movement disabilities. The information obtained can be provided as a support service for decision-making to be used by city government, institutions, researchers, professionals and other individuals of society in general to improve the liveability and quality of the lives of citizens. The proposed system is a means of social awareness that makes the most vulnerable groups of citizens visible by involving them as active participants. To perform and implement the system, the latest communication and positioning technologies for smart sensing have been used, as well as the cloud computing paradigm. Finally, to validate the proposal, a case study has been presented using the university environment as a pre-deployment step in urban environments.

  9. Open-Access, Low-Magnetic-Field MRI System for Lung Research

    Science.gov (United States)

    Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William

    2009-01-01

    An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.

  10. Does the public deserve free access to climate system science?

    Science.gov (United States)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  11. Development of cost-benefit analysis system

    International Nuclear Information System (INIS)

    Shiba, Tsuyoshi; Mishima, Tetsuya; Yuyama, Tomonori; Suzuki, Atsushi

    2001-01-01

    In order to promote the FDR development, it is necessary to see various benefits brought by introduction of FBR from multiple perspectives and have a good grasp of such benefits quantitatively and an adequate R and D investment scale which corresponds with them. In this study, the structured prototype in the previous study was improved to be able to perform cost-benefit analysis. An example of improvement made in the system is addition of subroutine used for comparison between new energy and benefits brought by introduction of FBR with special emphasis on addition of logic for analyzing externality about the new energy. Other improvement examples are modification of the Conventional Year Expense Ratio method of power generation cost to Average Durable Year Cost method, addition of database function and turning input data into database, and reviewing idea on cost by the type of waste material and price of uranium. The cost-benefit analysis system was also restructured utilizing Microsoft ACCESS so that it should have a data base function. As the result of the improvement mentioned above, we expect that the improved cost-benefit analysis system will have higher generality than the system before; therefore, great deal of benefits brought by application of the system in the future is expected. (author)

  12. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  13. SWS: accessing SRS sites contents through Web Services

    OpenAIRE

    Romano, Paolo; Marra, Domenico

    2008-01-01

    Background Web Services and Workflow Management Systems can support creation and deployment of network systems, able to automate data analysis and retrieval processes in biomedical research. Web Services have been implemented at bioinformatics centres and workflow systems have been proposed for biological data analysis. New databanks are often developed by taking into account these technologies, but many existing databases do not allow a programmatic access. Only a fraction of available datab...

  14. A Rewritable, Random-Access DNA-Based Storage System.

    Science.gov (United States)

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  15. Remote Access to Instrumental Analysis for Distance Education in Science

    Directory of Open Access Journals (Sweden)

    Dietmar Kennepohl

    2005-11-01

    Full Text Available Remote access to experiments offers distance educators another tool to integrate a strong laboratory component within a science course. Since virtually all modern chemical instrumental analysis in industry now use devices operated by a computer interface, remote control of instrumentation is not only relatively facile, it enhances students’ opportunity to learn the subject matter and be exposed to “real world” contents. Northern Alberta Institute of Technology (NAIT and Athabasca University are developing teaching laboratories based on the control of analytical instruments in real-time via an Internet connection. Students perform real-time analysis using equipment, methods, and skills that are common to modern analytical laboratories (or sophisticated teaching laboratories. Students obtain real results using real substances to arrive at real conclusions, just as they would if they were in a physical laboratory with the equipment; this approach allows students to access to conduct instrumental science experiments, thus providing them with an advantageous route to upgrade their laboratory skills while learning at a distance.

  16. Using the deterministic factor systems in the analysis of return on ...

    African Journals Online (AJOL)

    Using the deterministic factor systems in the analysis of return on equity. ... or equal the profitability of bank deposits, the business of the organization is not efficient. ... Application of quantitative and qualitative indicators in the analysis allows to ... By Country · List All Titles · Free To Read Titles This Journal is Open Access.

  17. Seed quality of common bean accessions under organic and conventional farming systems

    Directory of Open Access Journals (Sweden)

    Diego Medeiros Gindri

    2017-06-01

    Full Text Available Agrobiodiversity is essential for a sustainable food production, and the knowledge of the potential characteristics of landrace seeds may prompt farmers to adopt the habit of seed conservation for this species. This study aimed at categorizing landrace and commercial common bean (Phaseolus vulgaris L. accessions, according to the physiological quality (viability and vigor of seeds produced in the field, during two growing seasons, under organic and conventional farming systems. Germination percentage, field emergence, electrical conductivity, accelerated aging, cold test and seedling length were assessed. The landrace bean accessions exhibit diversity in the physiological seed quality, in terms of their viability and vigor. No differences were observed between the farming systems, in relation to the physiological quality of the seeds produced. The categorization of landrace common bean accessions allows to identify those with superior physiological seed quality.

  18. Patient access to medicines in two countries with similar health systems and differing medicines policies: Implications from a comprehensive literature review.

    Science.gov (United States)

    Babar, Zaheer-Ud-Din; Gammie, Todd; Seyfoddin, Ali; Hasan, Syed Shahzad; Curley, Louise E

    2018-04-13

    Countries with similar health systems but different medicines policies might result in substantial medicines usage differences and resultant outcomes. The literature is sparse in this area. To review pharmaceutical policy research in New Zealand and Australia and discuss differences between the two countries and the impact these differences may have on subsequent medicine access. A review of the literature (2008-2016) was performed to identify relevant, peer-reviewed articles. Systematic searches were conducted across the six databases MEDLINE, PubMed, Science Direct, Springer Links, Scopus and Google Scholar. A further search of journals of high relevance was also conducted. Using content analysis, a narrative synthesis of pharmaceutical policy research influencing access to medicines in Australia and New Zealand was conducted. The results were critically assessed in the context of policy material available via grey literature from the respective countries. Key elements regarding pharmaceutical policy were identified from the 35 research papers identified for this review. Through a content analysis, three broad categories of pharmaceutical policy were found, which potentially could influence patient access to medicines in each country; the national health system, pricing and reimbursement. Within these three categories, 9 subcategories were identified: national health policy, pharmacy system, marketing authorization and regulation, prescription to non-prescription medicine switch, orphan drug policies, generic medicine substitution, national pharmaceutical schedule and health technology assessment, patient co-payment and managed entry agreements. This review systematically evaluated the current literature and identified key areas of difference in policy between Australia and NZ. Australia appears to cover and reimburse a greater number of medicines, while New Zealand achieves much lower prices for medicines than their Australian counterparts and has been more

  19. Development of in-air micro-PIXE analysis and data sharing systems in JAERI Takasaki

    International Nuclear Information System (INIS)

    Sakai, Takuro; Kamiya, Tomihiro; Oikawa, Masakazu

    2000-01-01

    An external scanning ion microbeam system has been developed for in-air micro-PIXE analysis at JAERI Takasaki. The analysis system is widely used for various researches in recent years. The system consists of the external scanning ion microbeam system, a multi-parameter data acquisition system, a file transfer protocol (FTP) server and analysis software. The software of the system provides a graphical user interface for interaction between users and an experimental setup. The server is connected to the Internet and allows remote users to access the experimental data. (author)

  20. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  1. An end-to-end secure patient information access card system.

    Science.gov (United States)

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  2. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    Science.gov (United States)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  3. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  4. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  5. 28 CFR 16.72 - Exemption of Office of the Associate Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Attorney General System-limited access. 16.72 Section 16.72 Judicial Administration DEPARTMENT OF JUSTICE....72 Exemption of Office of the Associate Attorney General System—limited access. (a) The following...) General Files System of the Office of the Associate Attorney General (JUSTICE/AAG-001). These exemptions...

  6. TECHNOLOGY FOR ADMINISTERING OF THE ACCESS TO INFORMATION RESOURCES IN MANAGEMENT SYSTEM ON THE AVIATION ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Andrey V. Degtyarev

    2015-01-01

    Full Text Available The task of administering software-information complex occurs duringthe development of application systems for managing business-processes and is connected with the organization of access forusers to information resources in conditions of multi-user information systems for management. For solution of this problem proposed theapproach, which is based on a hierarchical system of access rightsto information resources on the levels: tool, object and procedural.Keywords: software-information complex, information resources,administering, permissions, separation of powers, access model.

  7. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  8. A Unified Framework of the Performance Evaluation of Optical Time-Wavelength Code-Division Multiple-Access Systems

    Science.gov (United States)

    Inaty, Elie

    In this paper, we provide an analysis to the performance of optical time-wavelength code-division multiple-access (OTW-CDMA) network when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one coincidence sequences with non-repeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of OTW-CDMA system may be critically affected when working above the nominal limit; an event that may happen when the network operates at high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed MAC protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T; while the R3T is better at very high transmission rates. However, in general it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  9. An automated data management/analysis system for space shuttle orbiter tiles. [stress analysis

    Science.gov (United States)

    Giles, G. L.; Ballas, M.

    1982-01-01

    An engineering data management system was combined with a nonlinear stress analysis program to provide a capability for analyzing a large number of tiles on the space shuttle orbiter. Tile geometry data and all data necessary of define the tile loads environment accessed automatically as needed for the analysis of a particular tile or a set of tiles. User documentation provided includes: (1) description of computer programs and data files contained in the system; (2) definitions of all engineering data stored in the data base; (3) characteristics of the tile anaytical model; (4) instructions for preparation of user input; and (5) a sample problem to illustrate use of the system. Description of data, computer programs, and analytical models of the tile are sufficiently detailed to guide extension of the system to include additional zones of tiles and/or additional types of analyses

  10. Theoretical analysis and simulation of a code division multiple access system (cdma for secure signal transmission in wideband channels

    Directory of Open Access Journals (Sweden)

    Stevan M. Berber

    2014-06-01

    Code Division Multiple Access (CDMA technique which allows communications of multiple users in the same communication system. This is achieved in such a way that each user is assigned a unique code sequence, which is used at the receiver side to discover the information dedicated to that user. These systems belong to the group of communication systems for direct sequence spread spectrum systems. Traditionally, CDMA systems use binary orthogonal spreading codes. In this paper, a mathematical model and simulation of a CDMA system based on the application of non-binary, precisely speaking, chaotic spreading sequences. In their nature, these sequences belong to random sequences with infinite periodicity, and due to that they are appropriate for applications in the systems that provide enhanced security against interception and secrecy in signal transmission. Numerous papers are dedicated to the development of CDMA systems in flat fading channels. This paper presents the results of these systems analysis for the case when frequency selective fading is present in the channel. In addition, the paper investigates a possibility of using interleaving techniques to mitigate fading in a wideband channel with the frequency selective fading. Basic structure of a CDMA communication system and its operation In this paper, a CDMA system block schematic is ppresented and the function of all blocks is explained. Notation  to be used in the paper is introduced. Chaotic sequences are defined and explained in accordance with the method of their generation. A wideband channel with frequency selective fading is defined by its impulse response function. Theoretical analysis of a CDMA system with flat fading in a narrowband channel A narrowband channel and flat fading are defined. A mathematical analysis of the system is conducted by presenting the signal expressions at vital points in the transmitter and receiver. The expression of the signal at the output of the sequence correlator is

  11. Migration Performance for Legacy Data Access

    Directory of Open Access Journals (Sweden)

    Kam Woods

    2008-12-01

    Full Text Available We present performance data relating to the use of migration in a system we are creating to provide web access to heterogeneous document collections in legacy formats. Our goal is to enable sustained access to collections such as these when faced with increasing obsolescence of the necessary supporting applications and operating systems. Our system allows searching and browsing of the original files within their original contexts utilizing binary images of the original media. The system uses static and dynamic file migration to enhance collection browsing, and emulation to support both the use of legacy programs to access data and long-term preservation of the migration software. While we provide an overview of the architectural issues in building such a system, the focus of this paper is an in-depth analysis of file migration using data gathered from testing our software on 1,885 CD-ROMs and DVDs. These media are among the thousands of collections of social and scientific data distributed by the United States Government Printing Office (GPO on legacy media (CD-ROM, DVD, floppy disk under the Federal Depository Library Program (FDLP over the past 20 years.

  12. Access to Justice in the European Convention on Human Rights System

    NARCIS (Netherlands)

    Glas, L.R.; Gerards, J.H.

    2017-01-01

    The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference

  13. A multi-agent conversational system with heterogeneous data sources access

    KAUST Repository

    Eisman, Eduardo M.; Navarro, Marí a; Castro, Juan Luis

    2016-01-01

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  14. A multi-agent conversational system with heterogeneous data sources access

    KAUST Repository

    Eisman, Eduardo M.

    2016-01-28

    In many of the problems that can be found nowadays, information is scattered across different heterogeneous data sources. Most of the natural language interfaces just focus on a very specific part of the problem (e.g. an interface to a relational database, or an interface to an ontology). However, from the point of view of users, it does not matter where the information is stored, they just want to get the knowledge in an integrated, transparent, efficient, effective, and pleasant way. To solve this problem, this article proposes a generic multi-agent conversational architecture that follows the divide and conquer philosophy and considers two different types of agents. Expert agents are specialized in accessing different knowledge sources, and decision agents coordinate them to provide a coherent final answer to the user. This architecture has been used to design and implement SmartSeller, a specific system which includes a Virtual Assistant to answer general questions and a Bookseller to query a book database. A deep analysis regarding other relevant systems has demonstrated that our proposal provides several improvements at some key features presented along the paper.

  15. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  16. 28 CFR 16.98 - Exemption of the Drug Enforcement Administration (DEA)-limited access.

    Science.gov (United States)

    2010-07-01

    ... Administration (DEA)-limited access. 16.98 Section 16.98 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION... Exemption of the Drug Enforcement Administration (DEA)—limited access. (a) The following systems of records.../Diversion Analysis and Detection System (ARCOS/DADS) (Justice/DEA-003) (2) Controlled Substances Act...

  17. Information system architecture to support transparent access to distributed, heterogeneous data sources

    International Nuclear Information System (INIS)

    Brown, J.C.

    1994-08-01

    Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today's situation analyst's have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today's technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses

  18. 28 CFR 16.83 - Exemption of the Executive Office for Immigration Review System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Immigration Review System-limited access. 16.83 Section 16.83 Judicial Administration DEPARTMENT OF JUSTICE....83 Exemption of the Executive Office for Immigration Review System—limited access. (a) The following system of records is exempt from 5 U.S.C. 552a(d): (1) The Executive Office for Immigration Review's...

  19. SPS measures and possible market access implications for agricultural trade in the Doha Round: An analysis of systemic issues

    OpenAIRE

    Murali Kallummal

    2012-01-01

    Even as the Doha Round seeks to address tariff liberalization issues in a comprehensive manner, the imbalance in the outcome of market access for developing country exporters will be particularly glaring in the case of fresh agricultural and processed food products. There is growing evidence that protectionism from the usage of non-tariff barriers such as SPS measures has increased tremendously in the recent past. This paper discusses an analysis of the SPS notifications made by WTO Member co...

  20. Safety accessibility and sustainability: The importance of micro-scale outcomes to an equitable design of transport systems

    Directory of Open Access Journals (Sweden)

    N. Tyler

    2017-07-01

    Full Text Available This paper discusses the potential conflicts that can arise when trying to design a transport system to be sustainable, safe and accessible. The paper considers first the overarching vision that drives such an aim and how that determines choices for design and implementation of such schemes. Using the example of a shared space project, Exhibition Road in London, to illustrate how these issues come to arise and how research could help to resolve them, the paper then considers how science is able to support better design and implementation. This raises questions for scientific methods that could support better consideration of such issues, learning from the small-samples analysis of transport safety research to be amplified to include the detailed research that drives accessible design.

  1. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    Science.gov (United States)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  2. Supplement analysis for Greenville Gate access to Kirschbaum Field at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    1997-01-01

    The National Ignition Facility (NIF) Program proposes to provide additional access to the Kirschbaum Field construction laydown area. This additional access would alleviate traffic congestion at the East Gate entrance to Lawrence Livermore National Laboratory (LLNL) from Greenville Road during periods of heavy construction for the NIF. The new access would be located along the northeastern boundary of LLNL, about 305 m (1,000 ft) north of the East Gate entrance. The access road would extend from Greenville Road to the Kirschbaum Field construction laydown area and would traverse an existing storm water drainage channel. Two culverts, side by side, and a compacted road base would be installed across the channel. The security fence that runs parallel to Greenville Road would be modified to accommodate this new entrance and a vehicle gate would be installed at the entrance of Kirschbaum Field. The exiting shoulder along Greenville Road would be converted into a new turn lane for trucks entering the new gate. This analysis evaluates the impacts of constructing the Kirschbaum Field bridge and access gate at a different location than was analyzed in the NIF Project specific Analysis in the Final Programmatic environmental Impact Statement for Stockpile Stewardship and Management (SS and M PEIS) published in September 1996 (DOE/EIS-0236) and the Record of Decision published on December 19, 1996. Issues of concern addressed in this supplement analysis include potential impacts to wetlands downstream of the access bridge, potential impacts to the California red-legged frog (Rana aurora draytonii) listed as threatened on the federal listing pursuant to the Endangered Species Act of 1974, and potential impacts on the 100-yr floodplain along the Arroyo Las Positas

  3. A design of a wavelength-hopping time-spreading incoherent optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.

    2005-01-01

    We present the architecture and code design for a highly scalable, 2.5 Gb/s per user optical code division multiple access (OCDMA) system. The system is scalable to 100 potential and more than 10 simultaneous users, each with a bit error rate (BER) of less than 10 -9 . The system architecture uses a fast wavelength-hopping, time-spreading codes. Unlike frequency and phase sensitive coherent OCDMA systems, this architecture utilizes standard on off keyed optical pulses allocated in the time and wavelength dimensions. This incoherent OCDMA approach is compatible with existing WDM optical networks and utilizes off the shelf components. We discuss the novel optical subsystem design for encoders and decoders that enable the realization of a highly scalable incoherent OCDMA system with rapid reconfigurability. A detailed analysis of the scalability of the two dimensional code is presented and select network deployment architectures for OCDMA are discussed (Authors)

  4. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  5. Digital Autonomous Terminal Access Communication (DATAC) system

    Science.gov (United States)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  6. Performance analysis of commercial multiple-input-multiple-output access point in distributed antenna system.

    Science.gov (United States)

    Fan, Yuting; Aighobahi, Anthony E; Gomes, Nathan J; Xu, Kun; Li, Jianqiang

    2015-03-23

    In this paper, we experimentally investigate the throughput of IEEE 802.11n 2x2 multiple-input-multiple-output (MIMO) signals in a radio-over-fiber-based distributed antenna system (DAS) with different fiber lengths and power imbalance. Both a MIMO-supported access point (AP) and a spatial-diversity-supported AP were separately employed in the experiments. Throughput measurements were carried out with wireless users at different locations in a typical office environment. For the different fiber length effect, the results indicate that MIMO signals can maintain high throughput when the fiber length difference between the two remote antenna units (RAUs) is under 100 m and falls quickly when the length difference is greater. For the spatial diversity signals, high throughput can be maintained even when the difference is 150 m. On the other hand, the separation of the MIMO antennas allows additional freedom in placing the antennas in strategic locations for overall improved system performance, although it may also lead to received power imbalance problems. The results show that the throughput performance drops in specific positions when the received power imbalance is above around 13 dB. Hence, there is a trade-off between the extent of the wireless coverage for moderate bit-rates and the area over which peak bit-rates can be achieved.

  7. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  8. Data Processing and Analysis Systems for JT-60U

    International Nuclear Information System (INIS)

    Matsuda, T.; Totsuka, T.; Tsugita, T.; Oshima, T.; Sakata, S.; Sato, M.; Iwasaki, K.

    2002-01-01

    The JT-60U data processing system is a large computer complex gradually modernized by utilizing progressive computer and network technology. A main computer using state-of-the-art CMOS technology can handle ∼550 MB of data per discharge. A gigabit ethernet switch with FDDI ports has been introduced to cope with the increase of handling data. Workstation systems with VMEbus serial highway drivers for CAMAC have been developed and used to replace many minicomputer systems. VMEbus-based fast data acquisition systems have also been developed to enlarge and replace a minicomputer system for mass data.The JT-60U data analysis system is composed of a JT-60U database server and a JT-60U analysis server, which are distributed UNIX servers. The experimental database is stored in the 1TB RAID disk of the JT-60U database server and is composed of ZENKEI and diagnostic databases. Various data analysis tools are available on the JT-60U analysis server. For the remote collaboration, technical features of the data analysis system have been applied to the computer system to access JT-60U data via the Internet. Remote participation in JT-60U experiments has been successfully conducted since 1996

  9. Bandwidth Analysis of Functional Interconnects Used as Test Access Mechanism

    NARCIS (Netherlands)

    Van den Berg, A.; Ren, P.; Marinissen, E.J.; Gaydadjiev, G.; Goossens, K.

    2010-01-01

    Test data travels through a System on Chip (SOC) from the chip pins to the Core-Under-Test (CUT) and vice versa via a Test Access Mechanism (TAM). Conventionally, a TAM is implemented using dedicated communication infrastructure. However, also existing functional interconnect, such as a bus or

  10. Bandwidth analysis of functional interconnects used as test access mechanism

    NARCIS (Netherlands)

    Berg, van den Ardy; Ren, P.; Marinissen, Erik Jan; Gaydadjiev, G.N.; Goossens, K.G.W.

    2010-01-01

    Test data travels through a System on Chip (SOC) from the chip pins to the Core-Under-Test (CUT) and vice versa via a Test Access Mechanism (TAM). Conventionally, a TAM is implemented using dedicated communication infrastructure. However, also existing functional interconnect, such as a bus or

  11. Patents and access to drugs in developing countries: an ethical analysis.

    Science.gov (United States)

    Sterckx, Sigrid

    2004-05-01

    More than a third of the world's population has no access to essential drugs. More than half of this group of people live in the poorest regions of Africa and Asia. Several factors determine the accessibility of drugs in developing countries. Hardly any medicines for tropical diseases are being developed, but even existing drugs are often not available to the patients who need them. One of the important determinants of access to drugs is the working of the patent system. This paper first maps out some facts about the global patent regime that has emerged as a consequence of the conclusion of the WTO-TRIPs Agreement in 1994. Attempts to construct a moral justification of the patent system have been based on three grounds: natural rights, distributive justice, and utilitarian arguments. This paper examines to what extent and on which grounds drug patents can be justified. The final section looks at the so-called 'Doha Declaration on the TRIPs Agreement and Public Health', which was adopted by the WTO Ministerial Conference two years ago, recognising the primacy of public health over the interests of patent proprietors.

  12. System Analysis and Risk Assessment System (SARA), Version 4.0

    International Nuclear Information System (INIS)

    Russell, K.D.; Sattison, M.B.; Skinner, N.L.; Stewart, H.D.; Wood, S.T.

    1992-02-01

    This NUREG is the reference manual for the System Analysis and Risk Assessment (SARA) System Version 4.0, a microcomputer-based system used to analyze the safety issues of a family [i.e., a power plant, a manufacturing facility, any facility on which a probabilistic risk assessment (PRA) might be performed]. The SARA data base contains PRA data for the dominant accident sequences of a family and descriptive information about the family including event trees, fault trees, and system model diagrams. The number of facility data bases that can be accessed is limited only by the amount of disk storage available. To simulate changes to family systems, SARA users change the failure rates of initiating and basic events and/or modify the structure of the cut sets that make up the event trees, fault trees, and systems. The user then evaluates the effects of these changes through the recalculation of the resultant accident sequence probabilities and importance measures. The results are displayed in tables and graphs

  13. Primary care access for mental illness in Australia: Patterns of access to general practice from 2006 to 2016.

    Science.gov (United States)

    Farrer, Louise M; Walker, Jennie; Harrison, Christopher; Banfield, Michelle

    2018-01-01

    General practice has an important role within the Australian healthcare system to provide access to care and effective management of chronic health conditions. However, people with serious mental illness experience challenges associated with service access. The current paper seeks to examine drivers of access to general practice for people with common and serious mental disorders, compared with people who access care for type II diabetes, a common physical health problem managed in general practice. The Bettering the Evaluation and Care of Health (BEACH) programme provides the most comprehensive and objective measurement of general practitioner activity in Australia. Using BEACH data, this study compared general practice encounters for depression, anxiety, bipolar disorder, schizophrenia, and type II diabetes during a 10-year period between 2006 and 2016. Analysis revealed more frequent encounters for depression compared to anxiety, and a higher representation of women in encounters for bipolar disorder compared to men. The relationship between number of encounters and patient age was strongly associated with the life course and mortality characteristics associated with each disorder. The findings highlight specific challenges associated with access to primary care for people with serious mental illness, and suggest areas of focus to improve the ability of these patients to access and navigate the health system.

  14. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  15. Particle data management-turning data into accessible information

    International Nuclear Information System (INIS)

    Bonniface, J; Coppins, G J

    2007-01-01

    The UKAEA has assigned significant resources to the monitoring and retrieval of particles from the vicinity of its site at Dounreay in the north of Scotland. The monitoring, retrieval and analytical processes each generate information that is required for interpretative and record purposes. As significant resources are made available for studying and retrieving particles, the information collected must be managed in a logical, stable and accessible manner to protect the investment in information. If suitable data management procedures are not in place there is a high risk of data loss and duplication, and stakeholders may be unable to discover what information is already available or be unable to access the existing information. UKAEA Dounreay operates a geographic information system (GIS) that interfaces with a data management system known as IMAGES. These systems are used to securely store and access a wide range of environmental data including those relating to particles. A case study is presented illustrating the processes and systems involved with the collection, storage, analysis and distribution of particle data. The advantages gained through use of the GIS system are considered in relation to alternative types of record management system such as paper, and electronic non-spatial systems. It is considered that the GIS system offers very significant benefits in terms of standardisation of data capture, security of storage and increased accessibility of data compared with other systems

  16. Impact of optical hard limiter on the performance of an optical overlapped-code division multiple access system

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Tablieh, Nicole

    2011-08-01

    Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.

  17. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  18. Broadband and scalable mobile satellite communication system for future access networks

    Science.gov (United States)

    Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi

    2005-07-01

    Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.

  19. Peripheral Insertion of a Central Venous Access Device Under Fluoroscopic Guidance Using a Peripherally Accessed System (PAS) Port in the Forearm

    International Nuclear Information System (INIS)

    Hata, Yasuhiro; Morita, Sojiro; Morita, Yoshitaka; Awatani, Toshihide; Takasaki, Motohiro; Horimi, Tadashi; Ozawa, Zen

    1998-01-01

    Purpose: We describe the technique, efficacy, and complications of fluoroscopy-guided implantation of a central venous access device using a peripherally accessed system (PAS) port via the forearm. Methods: Beginning in July 1994, 105 central venous access devices were implanted in 104 patients for the long-term infusion of antibiotics or antineoplasmic agents, blood products, or parenteral nutrition. The devices was inserted under fluoroscopic guidance with real-time venography from a peripheral route. Results: All ports were successfully implanted. There were no procedure-related complications. No thrombosis or local infection was observed; however, in six patients catheter-related phlebitis occurred. Conclusion: Fluoroscopy-guided implantation of a central venous access device using a PAS port via the forearm is safe and efficacious, and injection of contrast medium through a peripheral IV catheter before introduction of the catheter helps to avoid catheter-related phlebitis

  20. Gender and generation: an intra-household analysis on access to ...

    African Journals Online (AJOL)

    Gender and generation: an intra-household analysis on access to resources in Southern Mali. Hugo De Groote, N'golo Coulibaly. Abstract. (African Crop Science Journal, 1998 6(1): 79-96). http://dx.doi.org/10.4314/acsj.v6i1.27827 · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians ...

  1. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Energy Technology Data Exchange (ETDEWEB)

    Ohmacht, Martin

    2017-08-15

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  2. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Science.gov (United States)

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  3. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  4. SDI-based business processes: A territorial analysis web information system in Spain

    Science.gov (United States)

    Béjar, Rubén; Latre, Miguel Á.; Lopez-Pellicer, Francisco J.; Nogueras-Iso, Javier; Zarazaga-Soria, F. J.; Muro-Medrano, Pedro R.

    2012-09-01

    Spatial Data Infrastructures (SDIs) provide access to geospatial data and operations through interoperable Web services. These data and operations can be chained to set up specialized geospatial business processes, and these processes can give support to different applications. End users can benefit from these applications, while experts can integrate the Web services in their own business processes and developments. This paper presents an SDI-based territorial analysis Web information system for Spain, which gives access to land cover, topography and elevation data, as well as to a number of interoperable geospatial operations by means of a Web Processing Service (WPS). Several examples illustrate how different territorial analysis business processes are supported. The system has been established by the Spanish National SDI (Infraestructura de Datos Espaciales de España, IDEE) both as an experimental platform for geoscientists and geoinformation system developers, and as a mechanism to contribute to the Spanish citizens knowledge about their territory.

  5. Capillary column switching restricted-access media-liquid chromatography-electrospray ionization-tandem mass spectrometry system for simultaneous and direct analysis of drugs in biofluids.

    Science.gov (United States)

    Santos-Neto, Alvaro J; Markides, Karin E; Sjöberg, Per J R; Bergquist, Jonas; Lancas, Fernando M

    2007-08-15

    Capillary online restricted-access media-liquid chromatography-electrospray ionization-tandem mass spectrometry (RAM-LC-ESI-MS/MS) for direct analysis of drugs and metabolites spiked in biological fluids was developed. Using a column switching setup it was possible to perform effective sample preparation and analysis of raw biological fluids (plasma and urine) without matrix effects in the electrospray mass spectrometric detection step. The peak focusing efficiency of the extraction column was more effective in backflush compared to foreflush mode. The system was able to concentrate diminished samples of polar drugs and their metabolites reaching quantifiable results as low as 1 ng/mL utilizing a sample volume of only 333 nL of biofluids. New column hardware was developed to circumvent clogging problems experienced with plasma injections. The glass fiber filter frit, which is commonly used, was replaced with a short piece of 20 microm i.d. fused silica capillary. The extraction columns were able to handle up to 60 injections and showed a high loading capacity, making the saturation of the MS detector the limiting factor on the linear dynamic range. The simultaneous separation and detection of 10 drugs and metabolites was obtained in 8 min of analysis, including the online sample preparation and enrichment step.

  6. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  7. Improving Urban Accessibility: A Methodology for Urban Dynamics Analysis in Smart, Sustainable and Inclusive Cities

    OpenAIRE

    Pérez-delHoyo, Raquel; Garcia-Mayor, Clara; Mora, Higinio; Gilart, Virgilio; Andújar-Montoya, María Dolores

    2016-01-01

    Despite the improvisations of current urban accessibility regulations and their application in urban systems, it is a fact that our cities are not accessible. Both, the assessment of the effectiveness of urban accessibility and its maintenance over time are issues that require a more consistent approach. In order to address these aspects, it is necessary to have an accurate awareness of the existing condition of urban accessibility. Therefore, the way this information is transformed into spec...

  8. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  9. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  10. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  11. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  12. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  13. Is the Japanese Distribution System Becoming More Accessible to Foreign Firms?

    OpenAIRE

    Ralf bebenroth; Nir Kshetri; Reinhard Hunerberg

    2009-01-01

    Complexities in the Japanese distribution system are well-publicized. An emerging body of literature has documented recent changes in the Japanese distribution system. In this paper, it is examined whether foreign firms' accessibility to the Japanese distribution system has changed in a favorable direction in recent years. Furthermore, as foreign firms vary widely in terms of institutional barriers and complexity they face in the Japanese market, the authors also investigate the determinants ...

  14. National Geothermal Data System: an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.

    2013-12-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational

  15. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  16. Individual- and area-level disparities in access to the road network, subway system and a public bicycle share program on the Island of Montreal, Canada.

    Science.gov (United States)

    Fuller, Daniel; Gauvin, Lise; Kestens, Yan

    2013-02-01

    Few studies have examined potential disparities in access to transportation infrastructures, an important determinant of population health. To examine individual- and area-level disparities in access to the road network, public transportation system, and a public bicycle share program in Montreal, Canada. Examining associations between sociodemographic variables and access to the road network, public transportation system, and a public bicycle share program, 6,495 adult respondents (mean age, 48.7 years; 59.0 % female) nested in 33 areas were included in a multilevel analysis. Individuals with lower incomes lived significantly closer to public transportation and the bicycle share program. At the area level, the interaction between low-education and low-income neighborhoods showed that these areas were significantly closer to public transportation and the bicycle share program controlling for individual and urbanicity variables. More deprived areas of the Island of Montreal have better access to transportation infrastructure than less-deprived areas.

  17. Massive parallel optical pattern recognition and retrieval via a two-stage high-capacity multichannel holographic random access memory system

    International Nuclear Information System (INIS)

    Cai, Luzhong; Liu, Hua-Kuang

    2000-01-01

    The multistage holographic optical random access memory (HORAM) system reported recently by Liu et al. provides a new degree of freedom for improving storage capacity. We further present a theoretical and practical analysis of the HORAM system with experimental results. Our discussions include the system design and geometrical requirements, its applications for multichannel pattern recognition and associative memory, the 2-D and 3-D information storage capacity, and multichannel image storage and retrieval via VanderLugt correlator (VLC) filters and joint transform holograms. A series of experiments are performed to demonstrate the feasibility of the multichannel pattern recognition and image retrieval with both the VLC and joint transform correlator (JTC) architectures. The experimental results with as many as 2025 channels show good agreement with the theoretical analysis. (c) 2000 Society of Photo-Optical Instrumentation Engineers

  18. Shared random access memory resource for multiprocessor real-time systems

    International Nuclear Information System (INIS)

    Dimmler, D.G.; Hardy, W.H. II

    1977-01-01

    A shared random-access memory resource is described which is used within real-time data acquisition and control systems with multiprocessor and multibus organizations. Hardware and software aspects are discussed in a specific example where interconnections are done via a UNIBUS. The general applicability of the approach is also discussed

  19. Accessible Earth: Enhancing diversity in the Geosciences through accessible course design

    Science.gov (United States)

    Bennett, R. A.; Lamb, D. A.

    2017-12-01

    The tradition of field-based instruction in the geoscience curriculum, which culminates in a capstone geological field camp, presents an insurmountable barrier to many disabled students who might otherwise choose to pursue geoscience careers. There is a widespread perception that success as a practicing geoscientist requires direct access to outcrops and vantage points available only to those able to traverse inaccessible terrain. Yet many modern geoscience activities are based on remotely sensed geophysical data, data analysis, and computation that take place entirely from within the laboratory. To challenge the perception of geoscience as a career option only for the non-disabled, we have created the capstone Accessible Earth Study Abroad Program, an alternative to geologic field camp for all students, with a focus on modern geophysical observation systems, computational thinking, data science, and professional development.In this presentation, we will review common pedagogical approaches in geosciences and current efforts to make the field more inclusive. We will review curricular access and inclusivity relative to a wide range of learners and provide examples of accessible course design based on our experiences in teaching a study abroad course in central Italy, and our plans for ongoing assessment, refinement, and dissemination of the effectiveness of our efforts.

  20. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  1. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  2. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    International Nuclear Information System (INIS)

    Kulcsar, Zsolt; Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-01-01

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  3. Secure automated fabrication (SAF). Phase I interim report: a systems analysis

    International Nuclear Information System (INIS)

    1979-01-01

    An advanced Secure Automated Fabrication (SAF) System is being developed for mixed uranium and plutonium fuel fabrication. SAF System development will ultimately result in systems which maximize personnel radiation protection, restrict and control access to SNM material, improve containment and detection systems for nuclear materials, provide adequate SNM accountability and improve product uniformity and quality. A systems requirement analysis study was initiated to establish the consistent and objective set of requirements within which the choice among alternatives represents the balanced viewpoints of performance, achievability and risk

  4. Access to eye health services among indigenous Australians: an area level analysis

    Directory of Open Access Journals (Sweden)

    Kelaher Margaret

    2012-09-01

    Full Text Available Abstract Background This project is a community-level study of equity of access to eye health services for Indigenous Australians. Methods The project used data on eye health services from multiple sources including Medicare Australia, inpatient and outpatient data and the National Indigenous Eye Health Survey. The analysis focused on the extent to which access to eye health services varied at an area level according to the proportion of the population that was Indigenous (very low = 0-1.0%, low = 1.1-3.0%, low medium = 3.1-6.0%, high medium = 6.1-10.0%, high = 10.1-20.0%, very high = 20 + %. The analysis of health service utilisation also took into account age, remoteness and the Socioeconomic Indices for Areas (SEIFA. Results The rate of eye exams provided in areas with very high Indigenous populations was two-thirds of the rate of eye exams for areas with very low indigenous populations. The cataract surgery rates in areas with high medium to very high Indigenous populations were less than half that reference areas. In over a third of communities with very high Indigenous populations the cataract surgery rate fell below the World Health Organization (WHO guidelines compared to a cataract surgery rate of 3% in areas with very low Indigenous populations. Conclusions There remain serious disparities in access to eye health service in areas with high Indigenous populations. Addressing disparities requires a co-ordinated approach to improving Indigenous people’s access to eye health services. More extensive take-up of existing Medicare provisions is an important step in this process. Along with improving access to health services, community education concerning the importance of eye health and the effectiveness of treatment might reduce reluctance to seek help.

  5. Optical orthogonal code-division multiple-access system - Part 2: Multibits/sequence-period OOCDMA

    Science.gov (United States)

    Kwon, Hyuck M.

    1994-08-01

    In a recently proposed optical orthogonal code division multiple-access (OOCDMA) system, one bit of user's data is transmitted per sequence-period, and a threshold is employed for the final bit decision. In this paper, a system that can transmit multibits per sequence-period is introduced, and avalanche photodiode (APD) noise, thermal noise, and interference, are included. This system, derived by exploiting orthogonal properties of the OOCDMA code sequence and using a maximum search (instead of a threshold) in the final decision, is log(sub 2) F times higher in throughput, where F is sequence-period. For example, four orders of magnitude are better in bit error probability at - 56 dBW received laser power, with F = 1000 chips, 10 'marks' in a sequence, and 10 users of 30 Mb/s data rate for one-bit/sequence-period and 270 Mb/s data rate for multibits/sequence-period system. Furthermore, an exact analysis is performed for the log(sub 2)F bits/sequence-period system with a hard-limiter placed before the receiver, and its performance is compared to the performance without hard-limiter, for the chip-synchronous case. The improvement from using a hard-limiter is significant in the log(sub 2)F bits/sequence-period OCCDMA system.

  6. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    Science.gov (United States)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective

  7. Three essays on access pricing

    Science.gov (United States)

    Sydee, Ahmed Nasim

    access pricing with congestion and in which investments in infrastructure are lumpy. To fix ideas, the model is formulated in the context of airport infrastructure investments, which captures both the element of congestion and the lumpiness involved in infrastructure investments. The optimal investment program suggests how many units of capacity should be installed and at which times. Because time is continuous in the model, the discounted cost -- despite the lumpiness of capacity additions -- can be made to vary continuously by varying the time a capacity addition is made. The main results that emerge from the analysis can be described as follows: First, the global demand for air travel rises with time and experiences an upward jump whenever a capacity addition is made. Second, the access price is constant and stays at the basic level when the system is not congested. When the system is congested, a congestion surcharge is imposed on top of the basic level, and the congestion surcharge rises with the level of congestion until the next capacity addition is made at which time the access price takes a downward jump. Third, the individual demand for air travel is constant before congestion sets in and after the last capacity addition takes place. During a time interval in which congestion rises, the individual demand for travel is below the level that prevails when there is no congestion and declines as congestion worsens. The third essay contains a model of access pricing for natural gas transmission pipelines, both when pipeline operators are regulated and when they behave strategically. The high sunk costs involved in building a pipeline network constitute a serious barrier of entry, and competitive behaviour in the transmission pipeline sector cannot be expected. Most of the economic analyses of access pricing for natural gas transmission pipelines are carried out from the regulatory perspective, and the access price paid by shippers are cost-based. The model formalized

  8. First Experiences Using XACML for Access Control in Distributed Systems

    Science.gov (United States)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  9. Critical Access Hospitals and Retail Activity: An Empirical Analysis in Oklahoma

    Science.gov (United States)

    Brooks, Lara; Whitacre, Brian E.

    2011-01-01

    Purpose: This paper takes an empirical approach to determining the effect that a critical access hospital (CAH) has on local retail activity. Previous research on the relationship between hospitals and economic development has primarily focused on single-case, multiplier-oriented analysis. However, as the efficacy of federal and state-level rural…

  10. Checklist of accessibility in Web informational environments

    Directory of Open Access Journals (Sweden)

    Christiane Gomes dos Santos

    2017-01-01

    Full Text Available This research deals with the process of search, navigation and retrieval of information by the person with blindness in web environment, focusing on knowledge of the areas of information recovery and architecture, to understanding the strategies used by these people to access the information on the web. It aims to propose the construction of an accessibility verification instrument, checklist, to be used to analyze the behavior of people with blindness in search actions, navigation and recovery sites and pages. It a research exploratory and descriptive of qualitative nature, with the research methodology, case study - the research to establish a specific study with the simulation of search, navigation and information retrieval using speech synthesis system, NonVisual Desktop Access, in assistive technologies laboratory, to substantiate the construction of the checklist for accessibility verification. It is considered the reliability of performed research and its importance for the evaluation of accessibility in web environment to improve the access of information for people with limited reading in order to be used on websites and pages accessibility check analysis.

  11. Development of environmental education system using online element analysis

    International Nuclear Information System (INIS)

    Niizeki, T.; Yoshihara, T.; Tsuchiya, K.; Kawasaki, K.; Komiya, K.

    2007-01-01

    We have constructed a network system which enables one to access and analyze environmental data obtained at different and distant laboratories. As a preliminary feasibility test of the system, we studied the elements in the water of the Tesio River using PIXE and ion chromatography. Students used the data online to carry out analysis via internet. We found two factors with different features in calcium from the factor analysis. The comparison of the specific result and relevant geology information has revealed a remarkable presence of Ca 2+ which might come from dissolution of limestone in the upper Tesio River. PIXE data gave crucial information to draw such a conclusion. The present system has been found useful in environmental education in universities, online sharing of PIXE data in particular. (author)

  12. Developing hybrid near-space technologies for affordable access to suborbital space

    Science.gov (United States)

    Badders, Brian David

    High power rockets and high altitude balloons are two near-space technologies that could be combined in order to provide access to the mesosphere and, eventually, suborbital space. This "rockoon" technology has been used by several large budget space programs before being abandoned in favor of even more expensive, albeit more accurate, ground launch systems. With the increased development of nano-satellites and atmospheric sensors, combined with rising interest in global atmospheric data, there is an increase in desire for affordable access to extreme altitudes that does not necessarily require the precision of ground launches. Development of hybrid near-space technologies for access to over 200k ft. on a small budget brings many challenges within engineering, systems integration, cost analysis, market analysis, and business planning. This research includes the design and simulation testing of all the systems needed for a safe and reusable launch system, the cost analysis for initial production, the development of a business plan, and the development of a marketing plan. This project has both engineering and scientific significance in that it can prove the space readiness of new technologies, raise their technology readiness levels (TRLs), expedite the development process, and also provide new data to the scientific community. It also has the ability to stimulate university involvement in the aerospace industry and help to inspire the next generation of workers in the space sector. Previous development of high altitude balloon/high power rocket hybrid systems have been undertaken by government funded military programs or large aerospace corporations with varying degrees of success. However, there has yet to be a successful flight with this type of system which provides access to the upper mesosphere in a university setting. This project will aim to design and analyze a viable system while testing the engineering process under challenging budgetary constraints. The

  13. Turkish-German Access to Higher Education: An Historical and Democratic Theory Analysis, 1960-2010

    Science.gov (United States)

    Gonzalez, Roger Geertz

    2012-01-01

    This article looks at access to higher education in Germany. For a number of reasons, explained in this article, higher education is presently an elite system that privileges ethnic Germans while preventing Turkish-Germans from gaining sufficient access into academe. If Germany is to become a fully functioning multicultural democracy with equal…

  14. National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents

    Science.gov (United States)

    Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.

    2014-12-01

    The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using

  15. Metabolomic differentiation of maca (Lepidium meyenii) accessions cultivated under different conditions using NMR and chemometric analysis.

    Science.gov (United States)

    Zhao, Jianping; Avula, Bharathi; Chan, Michael; Clément, Céline; Kreuzer, Michael; Khan, Ikhlas A

    2012-01-01

    To gain insights on the effects of color type, cultivation history, and growing site on the composition alterations of maca (Lepidium meyenii Walpers) hypocotyls, NMR profiling combined with chemometric analysis was applied to investigate the metabolite variability in different maca accessions. Maca hypocotyls with different colors (yellow, pink, violet, and lead-colored) cultivated at different geographic sites and different areas were examined for differences in metabolite expression. Differentiations of the maca accessions grown under the different cultivation conditions were determined by principle component analyses (PCAs) which were performed on the datasets derived from their ¹H NMR spectra. A total of 16 metabolites were identified by NMR analysis, and the changes in metabolite levels in relation to the color types and growing conditions of maca hypocotyls were evaluated using univariate statistical analysis. In addition, the changes of the correlation pattern among the metabolites identified in the maca accessions planted at the two different sites were examined. The results from both multivariate and univariate analysis indicated that the planting site was the major determining factor with regards to metabolite variations in maca hypocotyls, while the color of maca accession seems to be of minor importance in this respect. © Georg Thieme Verlag KG Stuttgart · New York.

  16. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  17. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  18. Association of State Access Standards With Accessibility to Specialists for Medicaid Managed Care Enrollees.

    Science.gov (United States)

    Ndumele, Chima D; Cohen, Michael S; Cleary, Paul D

    2017-10-01

    Medicaid recipients have consistently reported less timely access to specialists than patients with other types of coverage. By 2018, state Medicaid agencies will be required by the Center for Medicare and Medicaid Services (CMS) to enact time and distance standards for managed care organizations to ensure an adequate supply of specialist physicians for enrollees; however, there have been no published studies of whether these policies have significant effects on access to specialty care. To compare ratings of access to specialists for adult Medicaid and commercial enrollees before and after the implementation of specialty access standards. We used Consumer Assessment of Healthcare Providers and Systems survey data to conduct a quasiexperimental difference-in-differences (DID) analysis of 20 163 nonelderly adult Medicaid managed care (MMC) enrollees and 54 465 commercially insured enrollees in 5 states adopting access standards, and 37 290 MMC enrollees in 5 matched states that previously adopted access standards. Reported access to specialty care in the previous 6 months. Seven thousand six hundred ninety-eight (69%) Medicaid enrollees and 28 423 (75%) commercial enrollees reported that it was always or usually easy to get an appointment with a specialist before the policy implementation (or at baseline) compared with 11 889 (67%) of Medicaid enrollees in states that had previously implemented access standards. Overall, there was no significant improvement in timely access to specialty services for MMC enrollees in the period following implementation of standard(s) (adjusted difference-in-differences, -1.2 percentage points; 95% CI, -2.7 to 0.1), nor was there any impact of access standards on insurance-based disparities in access (0.6 percentage points; 95% CI, -4.3 to 5.4). There was heterogeneity across states, with 1 state that implemented both time and distance standards demonstrating significant improvements in access and reductions in disparities

  19. Data engineering systems: Computerized modeling and data bank capabilities for engineering analysis

    Science.gov (United States)

    Kopp, H.; Trettau, R.; Zolotar, B.

    1984-01-01

    The Data Engineering System (DES) is a computer-based system that organizes technical data and provides automated mechanisms for storage, retrieval, and engineering analysis. The DES combines the benefits of a structured data base system with automated links to large-scale analysis codes. While the DES provides the user with many of the capabilities of a computer-aided design (CAD) system, the systems are actually quite different in several respects. A typical CAD system emphasizes interactive graphics capabilities and organizes data in a manner that optimizes these graphics. On the other hand, the DES is a computer-aided engineering system intended for the engineer who must operationally understand an existing or planned design or who desires to carry out additional technical analysis based on a particular design. The DES emphasizes data retrieval in a form that not only provides the engineer access to search and display the data but also links the data automatically with the computer analysis codes.

  20. “Future Directions”: m-government computer systems accessed via cloud computing – advantages and possible implementations

    OpenAIRE

    Daniela LIŢAN

    2015-01-01

    In recent years, the activities of companies and Public Administration had been automated and adapted to the current information system. Therefore, in this paper, I will present and exemplify the benefits of m-government computer systems development and implementation (which can be accessed from mobile devices and which are specific to the workflow of Public Administrations) starting from the “experience” of e-government systems implementation in the context of their access and usage through ...

  1. Access systems strategy in the accelerator complex and experimental areas

    International Nuclear Information System (INIS)

    Nunes, R.; Ninin, P.; Sanchez-Corral, E.; Ladzinski, T.

    2012-01-01

    This paper reviews the main features of the new PS Personnel Protection System (PSPSS) as well as the main milestones for its deployment during the Long Shutdown of 2013-2014. Access conditions in the PS, SPS and LHC complexes during this period shall be described as well as the upgrades and improvements that are under preparation. (authors)

  2. Defense Hotline Allegations Concerning the Biometric Identification System for Access Omnibus Contract

    National Research Council Canada - National Science Library

    2008-01-01

    .... According to the Strategic Services Sourcing (S3) performance work statement the purpose of the BISA is to provide a biometric base access control system that can operate in a hostile environment...

  3. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    KAUST Repository

    Chen, Yunfei

    2011-06-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical results show that spectrum sensing and primary user traffic cause considerable degradation to the bit error rate performance of adaptive modulation in a cognitive radio system with opportunistic access to the licensed channel. They also show that primary user traffic does not affect the link spectral efficiency performance of adaptive modulation, while the spectrum sensing degrades the link spectral efficiency performance. © 2011 IEEE.

  4. Genetic analysis of 430 Chinese Cynodon dactylon accessions using sequence-related amplified polymorphism markers.

    Science.gov (United States)

    Huang, Chunqiong; Liu, Guodao; Bai, Changjun; Wang, Wenqiang

    2014-10-21

    Although Cynodon dactylon (C. dactylon) is widely distributed in China, information on its genetic diversity within the germplasm pool is limited. The objective of this study was to reveal the genetic variation and relationships of 430 C. dactylon accessions collected from 22 Chinese provinces using sequence-related amplified polymorphism (SRAP) markers. Fifteen primer pairs were used to amplify specific C. dactylon genomic sequences. A total of 481 SRAP fragments were generated, with fragment sizes ranging from 260-1800 base pairs (bp). Genetic similarity coefficients (GSC) among the 430 accessions averaged 0.72 and ranged from 0.53-0.96. Cluster analysis conducted by two methods, namely the unweighted pair-group method with arithmetic averages (UPGMA) and principle coordinate analysis (PCoA), separated the accessions into eight distinct groups. Our findings verify that Chinese C. dactylon germplasms have rich genetic diversity, which is an excellent basis for C. dactylon breeding for new cultivars.

  5. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    International Nuclear Information System (INIS)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-01

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4

  6. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-15

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4.

  7. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  8. Overview of the M.A.I.T. analysis system (machine analysis of the internal threat)

    International Nuclear Information System (INIS)

    NiCastro, J.R.

    1978-01-01

    The problem of the internal threat epitomized by the tactics of collusion and illicit use of access has been structured into a data processing format. The format procedures and analysis are objective; the flexibility of the method allows the security analyst to input his judgment and opinions into the code. By so doing he can interact and determine the effects of interacting with the safeguard system

  9. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Eles, Petru; Doboli, Alex; Pop, Paul

    2000-01-01

    of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have......In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow......, generates an efficient bus access scheme as well as the schedule tables for activation of processes and communications....

  10. Genetic divergence through joint analysis of morphoagronomic and molecular characters in accessions of Jatropha curcas.

    Science.gov (United States)

    Pestana-Caldas, C N; Silva, S A; Machado, E L; de Souza, D R; Cerqueira-Pereira, E C; Silva, M S

    2016-10-05

    The aim of this study was to investigate the genetic divergence between accessions of Jatropha curcas through joint analysis of morphoagronomic and molecular characters. To this end, we investigated 11 morphoagronomic characters and performed molecular genotyping, using 23 inter-simple sequence repeat (ISSR) primers in 46 accessions of J. curcas. We calculated the contribution of each character on divergence using analysis of variance. The grouping among accessions was performed using the Ward-MLM (modified location model) method, using morphoagronomic and molecular data, whereas the cophenetic correlation was obtained based on Gower's algorithm. There were significant differences in all growth-related characteristics: number of primary and secondary branches per plant, plant height, and stem diameter. For characters related to grain production, differences were found for number of fruit clusters per plant and number of inflorescence clusters per plant and average number of seeds per fruit. The greatest phenotypic variation was found in plant height (59.67- 222.33 cm), whereas the smallest variation was found in average number of seeds per fruit (0-2.90), followed by the number of fruit clusters per plant (0-8.67). In total, 94 polymorphic ISSR fragments were obtained. The genotypic grouping identified six groups, indicating that there is genetic divergence among the accessions. The most promising crossings for future hybridization were identified among accessions UFRB60 and UFVJC45, and UFRB61 and UFVJC18. In conclusion, the joint analysis of morphoagronomic characters and ISSR markers is an efficient method to assess the genetic divergence in J. curcas.

  11. Introduction to the Personal Access Satellite System Study

    Science.gov (United States)

    Sue, Miles K.

    1990-01-01

    A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.

  12. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  13. Managing Large Scale Project Analysis Teams through a Web Accessible Database

    Science.gov (United States)

    O'Neil, Daniel A.

    2008-01-01

    Large scale space programs analyze thousands of requirements while mitigating safety, performance, schedule, and cost risks. These efforts involve a variety of roles with interdependent use cases and goals. For example, study managers and facilitators identify ground-rules and assumptions for a collection of studies required for a program or project milestone. Task leaders derive product requirements from the ground rules and assumptions and describe activities to produce needed analytical products. Disciplined specialists produce the specified products and load results into a file management system. Organizational and project managers provide the personnel and funds to conduct the tasks. Each role has responsibilities to establish information linkages and provide status reports to management. Projects conduct design and analysis cycles to refine designs to meet the requirements and implement risk mitigation plans. At the program level, integrated design and analysis cycles studies are conducted to eliminate every 'to-be-determined' and develop plans to mitigate every risk. At the agency level, strategic studies analyze different approaches to exploration architectures and campaigns. This paper describes a web-accessible database developed by NASA to coordinate and manage tasks at three organizational levels. Other topics in this paper cover integration technologies and techniques for process modeling and enterprise architectures.

  14. Welcome to Systems — A New Interdisciplinary Open Access Journal for Systems Science and Engineering

    Directory of Open Access Journals (Sweden)

    Thomas Huynh

    2012-04-01

    Full Text Available Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies. Understanding of natural systems is essential to the survival of the human species, which is intertwined with the survival of other species on earth. Having the knowledge and ability to build human-made systems is critical to the employment of systems that effectively serve the needs of their users. To gain such understanding and to acquire such knowledge and ability, it is necessary that cutting-edge research in systems science, systems engineering, and systems-related fields continue. This open access journal aims to achieve quick and global dissemination of results of such research. [...

  15. Treatment Trends for Stage I Testicular Seminoma in an Equal-Access Medical System.

    Science.gov (United States)

    Wingate, Jonathan T; Etzioni, Ruth; Macdonald, Dusten M; Brand, Timothy C

    2016-10-01

    The practice patterns for adjuvant therapies for stage I seminoma are rapidly evolving, and surveillance is currently preferred. How these recommendations have affected contemporary practice in an equal-access US population is unknown. A total of 436 men diagnosed with clinical stage IA-IB seminoma from 2001 to 2011 were identified in the Automated Central Tumor Registry (ACTUR). The ACTUR is the cancer registry system for the Department of Defense. Logistic regression models analyzed the association between patient characteristics and adjuvant therapy. Overall and recurrence-free survival were determined from Kaplan-Meier analysis. The use of adjuvant radiotherapy in this population decreased significantly from 2001 to 2011. In 2001, 83.9% of patients received radiotherapy compared with only 24.0% in 2011. During that period, a concomitant increase occurred in the use of chemotherapy from 0% to 38.0%. A later year of diagnosis was significantly associated with a greater rate of receiving chemotherapy relative to radiotherapy (P associated with the receipt of surveillance (P = .412 for 2006-2011 vs. 2001-2005; odds ratio, 0.83; 95% CI, 0.54-1.29). Black race or age was not significantly associated with adjuvant therapy. With a median follow-up period of 4.7 years, the 5-year overall and recurrence-free survival rates were 98.0% and 77.0%, respectively. The use of adjuvant radiotherapy has been replaced by chemotherapy for clinical stage I testicular seminoma in an equal-access system. The lack of an increase in active surveillance in our cohort might represent overtreatment of the population. Published by Elsevier Inc.

  16. Risk of infection due to medical interventions via central venous catheters or implantable venous access port systems at the middle port of a three-way cock: luer lock cap vs. luer access split septum system (Q-Syte).

    Science.gov (United States)

    Pohl, Fabian; Hartmann, Werner; Holzmann, Thomas; Gensicke, Sandra; Kölbl, Oliver; Hautmann, Matthias G

    2014-01-25

    Many cancer patients receive a central venous catheter or port system prior to therapy to assure correct drug administration. Even appropriate hygienic intervention maintenance carries the risk of contaminating the middle port (C-port) of a three-way cock (TWC), a risk that increases with the number of medical interventions. Because of the complexity of the cleaning procedure with disconnection and reconnection of the standard luer lock cap (referred as "intervention"), we compared luer lock caps with a "closed access system" consisting of a luer access split septum system with regard to process optimization (work simplification, process time), efficiency (costs) and hygiene (patient safety). For determination of process optimization the workflow of an intervention according to the usual practice and risks was depicted in a process diagram. For determining the actual process costs, we analyzed use of material and time parameters per intervention and used the process parameters for programming the process into a simulation run (n = 1000) to determine the process costs as well as their differences (ACTUAL vs. NOMINAL) within the framework of a discrete event simulation.Additionally cultures were carried out at the TWC C-ports to evaluate possible contamination. With the closed access system, the mean working time of 5.5 minutes could be reduced to 2.97 minutes. The results for average process costs (labour and material costs per use) were 3.92 € for luer lock caps and 2.55 € for the closed access system. The hypothesis test (2-sample t-test, CI 0.95, p-valuerisks (related to material, surroundings, staff handling) could be reduced by 65.38%. In the present research, the closed access system with a divided split septum was superior to conventional luer lock caps. The advantage of the closed access system lies in the simplified handling for staff, which results in a reduced risk of patient infection due to improved clinical hygiene.

  17. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  18. Study and development of a document file system with selective access

    International Nuclear Information System (INIS)

    Mathieu, Jean-Claude

    1974-01-01

    The objective of this research thesis was to design and to develop a set of software aimed at an efficient management of a document file system by using methods of selective access to information. Thus, the three main aspects of file processing (creation, modification, reorganisation) have been addressed. The author first presents the main problems related to the development of a comprehensive automatic documentation system, and their conventional solutions. Some future aspects, notably dealing with the development of peripheral computer technology, are also evoked. He presents the characteristics of INIS bibliographic records provided by the IAEA which have been used to create the files. In the second part, he briefly describes the file system general organisation. This system is based on the use of two main files: an inverse file which contains for each descriptor a list of of numbers of files indexed by this descriptor, and a dictionary of descriptor or input file which gives access to the inverse file. The organisation of these both files is then describes in a detailed way. Other related or associated files are created, and the overall architecture and mechanisms integrated into the file data input software are described, as well as various processing applied to these different files. Performance and possible development are finally discussed

  19. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  20. Establishing a Secure Data Center with Remote Access: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Gonder, J.; Burton, E.; Murakami, E.

    2012-04-01

    Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

  1. An API-based search system for one click access to information

    NARCIS (Netherlands)

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  2. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources.

    Science.gov (United States)

    Tsay, Ming-Yueh; Wu, Tai-Luan; Tseng, Ling-Li

    2017-01-01

    This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic), two aggregate institutional repositories (OAIster and OpenDOAR), and two physics-related open sources (arXiv.org and Astrophysics Data System). The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.

  3. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  4. Understanding access to healthcare among Indigenous peoples: A comparative analysis of biomedical and postcolonial perspectives.

    Science.gov (United States)

    Horrill, Tara; McMillan, Diana E; Schultz, Annette S H; Thompson, Genevieve

    2018-03-25

    As nursing professionals, we believe access to healthcare is fundamental to health and that it is a determinant of health. Therefore, evidence suggesting access to healthcare is problematic for many Indigenous peoples is concerning. While biomedical perspectives underlie our current understanding of access, considering alternate perspectives could expand our awareness of and ability to address this issue. In this paper, we critique how access to healthcare is understood through a biomedical lens, how a postcolonial theoretical lens can extend that understanding, and the subsequent implications this alternative view raises for the nursing profession. Drawing on peer-reviewed published and gray literature concerning healthcare access and Indigenous peoples to inform this critique, we focus on the underlying theoretical lens shaping our current understanding of access. A postcolonial analysis provides a way of understanding healthcare as a social space and social relationship, presenting a unique perspective on access to healthcare. The novelty of this finding is of particular importance for the profession of nursing, as we are well situated to influence these social aspects, improving access to healthcare services broadly, and among Indigenous peoples specifically. © 2018 The Authors Nursing Inquiry published by John Wiley & Sons Ltd.

  5. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Science.gov (United States)

    2010-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  6. Experimental demonstration of 2.5 Gbit/S incoherent two-dimensional optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.; Bres, C.-S.; Xu, L.; Rand, D.; Prucnal, P.R.

    2004-01-01

    We demonstrated error-free operation of 4 simultaneous users in a fast frequency-hopping time-spreading optical code division multiple access system operating at 2.5 Gbit/s a Star architecture. Effective power penalty was ≤0.5dB. Novel optical code division multiple access receiver based on Terahertz Optical Asymmetric Demultiplexer was demonstrated to eliminate multiple access interference (Authors)

  7. Integration of the monitoring and offline analysis systems of the ATLAS hadronic calorimeter

    Energy Technology Data Exchange (ETDEWEB)

    Maidantchik, Carmen; Balabram, Luiz Eduardo; Gomes, Andressa Sivollela; Ferreira, Fernando G.; Marroquim, Fernando [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil)

    2011-07-01

    Full text: During the ATLAS detector operation, collaborators perform innumerous analysis related to the calibration in order to acquire detailed information about the hadronic calorimeter (TileCal) equipment. Through the analysis, it is possible to detect faults that would affect data acquisition, which are of physics interest. Some defects examples are: saturation of reading channels, problems in the acquired signal digitization and high signal-to-noise ratio (SNR). Since the commissioning period, members of the collaboration between CERN and UFRJ developed Web systems to support the hard task of monitoring the TileCal equipment. The Tile Commissioning Web System (TCWS) integrates different applications, each one presenting part of the commissioning process. The Web Interface for Shifters (WIS) displays the most recent calibration runs and assists the monitoring of the modules operation. The TileComm Analysis (TCA) allows access to histograms that represents the status of modules and corresponding channels functioning. The Timeline provides the history of the calibration rounds and the state of all modules in chronological order. The Data Quality Monitoring (DQM) contains the status of the histograms, modules and channels. The E-log stores and displays all reports about calibrations. Web Monitoring and Calibration System (MCWS) allows the visualization of the most recent channel status of each module. DCS (Detector Control System) Web System monitors the operation of modules power supply. After the ATLAS operation has started the number of equipment calibrations increased significantly, which has prompted the development of a system that would display all previous information through a centralized way. The Dashboard allows the collaborator to easily access the latest runs or to search for specific ones. After selecting a run, it is possible to check the status of each barrel module through a schematic figure, to view the 10 latest status of a certain module, and

  8. Integration of the monitoring and offline analysis systems of the ATLAS hadronic calorimeter

    International Nuclear Information System (INIS)

    Maidantchik, Carmen; Balabram, Luiz Eduardo; Gomes, Andressa Sivollela; Ferreira, Fernando G.; Marroquim, Fernando

    2011-01-01

    Full text: During the ATLAS detector operation, collaborators perform innumerous analysis related to the calibration in order to acquire detailed information about the hadronic calorimeter (TileCal) equipment. Through the analysis, it is possible to detect faults that would affect data acquisition, which are of physics interest. Some defects examples are: saturation of reading channels, problems in the acquired signal digitization and high signal-to-noise ratio (SNR). Since the commissioning period, members of the collaboration between CERN and UFRJ developed Web systems to support the hard task of monitoring the TileCal equipment. The Tile Commissioning Web System (TCWS) integrates different applications, each one presenting part of the commissioning process. The Web Interface for Shifters (WIS) displays the most recent calibration runs and assists the monitoring of the modules operation. The TileComm Analysis (TCA) allows access to histograms that represents the status of modules and corresponding channels functioning. The Timeline provides the history of the calibration rounds and the state of all modules in chronological order. The Data Quality Monitoring (DQM) contains the status of the histograms, modules and channels. The E-log stores and displays all reports about calibrations. Web Monitoring and Calibration System (MCWS) allows the visualization of the most recent channel status of each module. DCS (Detector Control System) Web System monitors the operation of modules power supply. After the ATLAS operation has started the number of equipment calibrations increased significantly, which has prompted the development of a system that would display all previous information through a centralized way. The Dashboard allows the collaborator to easily access the latest runs or to search for specific ones. After selecting a run, it is possible to check the status of each barrel module through a schematic figure, to view the 10 latest status of a certain module, and

  9. Beyond access: a case study on the intersection between accessibility, sustainability, and universal design.

    Science.gov (United States)

    Gossett, Andrea; Mirza, Mansha; Barnds, Ann Kathleen; Feidt, Daisy

    2009-11-01

    A growing emphasis has been placed on providing equal opportunities for all people, particularly people with disabilities, to support participation. Barriers to participation are represented in part by physical space restrictions. This article explores the decision-making process during the construction of a new office building housing a disability-rights organization. The building project featured in this study was developed on the principles of universal design, maximal accessibility, and sustainability to support access and participation. A qualitative case study approach was used involving collection of data through in-depth interviews with key decision-makers; non-participant observations at design meetings; and on-site tours. Qualitative thematic analysis along with the development of a classification system was used to understand specific building elements and the relevant decision processes from which they resulted. Recording and analyzing the design process revealed several key issues including grassroots involvement of stakeholders; interaction between universal design and sustainable design; addressing diversity through flexibility and universality; and segregationist accessibility versus universal design. This case study revealed complex interactions between accessibility, universal design, and sustainability. Two visual models were proposed to understand and analyze these complexities.

  10. An integrated data-analysis and database system for AMS 14C

    International Nuclear Information System (INIS)

    Kjeldsen, Henrik; Olsen, Jesper; Heinemeier, Jan

    2010-01-01

    AMSdata is the name of a combined database and data-analysis system for AMS 14 C and stable-isotope work that has been developed at Aarhus University. The system (1) contains routines for data analysis of AMS and MS data, (2) allows a flexible and accurate description of sample extraction and pretreatment, also when samples are split into several fractions, and (3) keeps track of all measured, calculated and attributed data. The structure of the database is flexible and allows an unlimited number of measurement and pretreatment procedures. The AMS 14 C data analysis routine is fairly advanced and flexible, and it can be easily optimized for different kinds of measuring processes. Technically, the system is based on a Microsoft SQL server and includes stored SQL procedures for the data analysis. Microsoft Office Access is used for the (graphical) user interface, and in addition Excel, Word and Origin are exploited for input and output of data, e.g. for plotting data during data analysis.

  11. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  12. Identifying compromised systems through correlation of suspicious traffic from malware behavioral analysis

    Science.gov (United States)

    Camilo, Ana E. F.; Grégio, André; Santos, Rafael D. C.

    2016-05-01

    Malware detection may be accomplished through the analysis of their infection behavior. To do so, dynamic analysis systems run malware samples and extract their operating system activities and network traffic. This traffic may represent malware accessing external systems, either to steal sensitive data from victims or to fetch other malicious artifacts (configuration files, additional modules, commands). In this work, we propose the use of visualization as a tool to identify compromised systems based on correlating malware communications in the form of graphs and finding isomorphisms between them. We produced graphs from over 6 thousand distinct network traffic files captured during malware execution and analyzed the existing relationships among malware samples and IP addresses.

  13. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  14. The Baker system for nuclear access authorization screening: a psychologically developed system for access screening of vendor and owner applicants at nuclear power plants

    International Nuclear Information System (INIS)

    Baker, E.G.; Crouter, F.L.

    1985-01-01

    This paper presents a comprehensive screening program for unescorted access which has proven to be highly effective in determining the intergrity, trustworthiness, socialibility, behaviors and tendencies of an employee applicant--past, present and future. This procedure, designed specifically for the nuclear industry, can be used with owner or vendor applicants, and meets or exceeds all of the NRC's requirements. The Baker system has been used for nuclear selection since 1979

  15. Checklist "Open Access Policies": Analysis of the Open Access Policies of Public Universities in Austria

    Directory of Open Access Journals (Sweden)

    Bruno Bauer

    2016-12-01

    Full Text Available This checklist provides an overview of the Open Access policies implemented at Austrian universities and extramural research institutions. Furthermore, the polices adopted at nine public universities are analyzed and the respective text modules are categorized thematically. The second part of the checklist presents measures for the promotion of Open Access following the implementation of an Open Access policy.

  16. Structural and Qualitative Analysis of the Romanian Banking System

    Directory of Open Access Journals (Sweden)

    Anisoara Niculina APETRI

    2010-12-01

    Full Text Available The banking sector, the predominant component of the Romanian financial system, had a relatively stable structure in the period 2005-2009 and has experienced significant consolidation, particularly in the years 2005-2006, this being sustained mainly by the restructuring and privatization process, but also by Romania's EU accession perspective and the competitive environment in this area. Given the new status of Romania as EU member country, the competition in the banking system has increased significantly, leading to both structural changes, but also to changes in levels of analysis indicators of banking structure and performance. Following this analysis, it appears that, recently, our country's banking system saw a dynamic and unprecedented diversification resulting from the economic development of the society and adaptation to EU requirements, and we can say that in Romania there is, now, a modern and competitive banking system, which provides circulation of the domestic economy and provides banking products and services in accordance with trends in the European banking sector.

  17. Dependability analysis of the data communication system in train control system

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Communication based train control (CBTC) system is based on mobile communication and overcomes fixed blocks in order to increase track utilization and train safety. The data communication system (DCS) between trains and wayside equipment is a crucial factor for the safe and efficient operation of CBTC system. The dependability under various transmission conditions needs to be modeled and evaluated. In this paper,a stochastic reward net (SRN) model for DCS based IEEE 802.11 standard was developed,which captures all relevant failure and failure recovery behavior system aspects in a concise way. We compared the reliability,availability for DCS with and without access point (AP) and antenna redundant configuration. We also quantitatively evaluated and compared the frame loss probability for three DCS configurations with different train velocities and train numbers in one radio cell. Fixed-point iteration was adopted to simplify the analysis. Numerical results showed the significant improvement of the reliability,availability and the frame loss probability index for the full redundant configuration.

  18. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  19. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail ...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  20. Development and implantation of application systems for reduction and analysis of experimental data in Nuclear Physics area

    International Nuclear Information System (INIS)

    Cardoso Junior, J.L.; Schelin, H.R.; Lemos, B.J.K.C.; Tanaka, E.H.; Castro, A.T.C.G.

    1984-01-01

    Several application systems for reduction and analysis of experimental data are described. These codes were development and/or implanted in tee IEAv/CTA CYBER 170/750 system. A brief description of the experimental data acquisition modes and the necessary reduction for analysis is given. Information on the purposes, uses and access of the codes are given [pt

  1. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  2. Crime Mapping and Geographical Information Systems in Crime Analysis

    OpenAIRE

    Dağlar, Murat; Argun, Uğur

    2016-01-01

    As essential apparatus in crime analysis, crime mapping and Geographical Information Systems (GIS) are being progressively more accepted by police agencies. Development in technology and the accessibility of geographic data sources make it feasible for police departments to use GIS and crime mapping. GIS and crime mapping can be utilized as devices to discover reasons contributing to crime, and hence let law enforcement agencies proactively take action against the crime problems before they b...

  3. Schedulability Analysis and Optimization for the Synthesis of Multi-Cluster Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    2003-01-01

    We present an approach to schedulability analysis for the synthesis of multi-cluster distributed embedded systems consisting of time-triggered and event-triggered clusters, interconnected via gateways. We have also proposed a buffer size and worst case queuing delay analysis for the gateways......, responsible for routing inter-cluster traffic. Optimization heuristics for the priority assignment and synthesis of bus access parameters aimed at producing a schedulable system with minimal buffer needs have been proposed. Extensive experiments and a real-life example show the efficiency of our approaches....

  4. Schedulability Analysis and Optimization for the Synthesis of Multi-Cluster Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Paul; Eles, Petru; Peng, Zebo

    2003-01-01

    An approach to schedulability analysis for the synthesis of multi-cluster distributed embedded systems consisting of time-triggered and event-triggered clusters, interconnected via gateways, is presented. A buffer size and worst case queuing delay analysis for the gateways, responsible for routing...... inter-cluster traffic, is also proposed. Optimisation heuristics for the priority assignment and synthesis of bus access parameters aimed at producing a schedulable system with minimal buffer needs have been proposed. Extensive experiments and a real-life example show the efficiency of the approaches....

  5. Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System

    Directory of Open Access Journals (Sweden)

    Waqas A. Imtiaz

    2017-01-01

    Full Text Available This paper presents an efficient tree-based hybrid spectral amplitude coding optical code division multiple access (SAC-OCDMA system that is able to provide high capacity transmission along with fault detection and restoration throughout the passive optical network (PON. Enhanced multidiagonal (EMD code is adapted to elevate system’s performance, which negates multiple access interference and associated phase induced intensity noise through efficient two-matrix structure. Moreover, system connection availability is enhanced through an efficient protection architecture with tree and star-ring topology at the feeder and distribution level, respectively. The proposed hybrid architecture aims to provide seamless transmission of information at minimum cost. Mathematical model based on Gaussian approximation is developed to analyze performance of the proposed setup, followed by simulation analysis for validation. It is observed that the proposed system supports 64 subscribers, operating at the data rates of 2.5 Gbps and above. Moreover, survivability and cost analysis in comparison with existing schemes show that the proposed tree-based hybrid SAC-OCDMA system provides the required redundancy at minimum cost of infrastructure and operation.

  6. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources.

    Directory of Open Access Journals (Sweden)

    Ming-Yueh Tsay

    Full Text Available This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic, two aggregate institutional repositories (OAIster and OpenDOAR, and two physics-related open sources (arXiv.org and Astrophysics Data System. The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.

  7. Massive M2M Access with Reliability Guarantees in LTE Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arriva...

  8. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  9. Towards an Approach of Semantic Access Control for Cloud Computing

    Science.gov (United States)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  10. Demand, capacity, and access of the outpatient clinic: A framework for analysis and improvement.

    Science.gov (United States)

    van Bussel, Erik Martijn; van der Voort, Marc Boudewijn Victor Rouppe; Wessel, Ronald N; van Merode, Godefridus G

    2018-06-01

    While theoretical frameworks for optimization of the outpatient processes are abundant, practical step-by-step analyses to give leads for improvement, to forecast capacity, and to support decision making are sparse. This article demonstrates how to evaluate and optimize the triad of demand, (future) capacity, and access time of the outpatient clinic using a structured six-step method. All individual logistical patient data of an orthopaedic outpatient clinic of one complete year were analysed using a 6-step method to evaluate demand, supply, and access time. Trends in the data were retrospectively analysed and evaluated for potential improvements. A model for decision making was tested. Both the analysis of the method and actual results were considered as main outcomes. More than 25 000 appointments were analysed. The 6-step method showed to be sufficient to result in valuable insights and leads for improvement. While the overall match between demand and capacity was considered adequate, the variability in capacity was much higher than in demand, thereby leading to delays in access time. Holidays and subsequent weeks showed to be of great influence for demand, capacity, and access time. Using the six-step method, several unfavourable characteristics of the outpatient clinic were revealed and a better match between demand, supply, and access time could have been reached with only minor adjustments. Last, a clinic specific prediction and decision model for demand and capacity was made using the 6-step method. The 6-step analysis can successfully be applied to redesign and improve the outpatient health care process. The results of the analysis showed that national holidays and variability in demand and capacity have a big influence on the outpatient clinic. Using the 6-step method, practical improvements in outpatient logistics were easily found and leads for future decision making were contrived. © 2018 The Authors Journal of Evaluation in Clinical Practice

  11. Cancer Deaths due to Lack of Universal Access to Radiotherapy in the Brazilian Public Health System.

    Science.gov (United States)

    Mendez, L C; Moraes, F Y; Fernandes, G Dos S; Weltman, E

    2018-01-01

    Radiotherapy plays a fundamental role in the treatment of cancer. Currently, the Brazilian public health system cannot match the national radiotherapy demand and many patients requiring radiotherapy are never exposed to this treatment. This study estimated the number of preventable deaths in the public health system if access to radiotherapy was universal. Incidence rates for the year 2016 provided by Instituto Nacional de Cancer were used in this analysis. The number of untreated patients requiring radiotherapy was obtained through the difference between the total number of patients requiring radiotherapy and the total amount of delivered radiotherapy treatments in the public health system. The number of deaths for the three most common cancers in each gender due to radiotherapy shortage was calculated. Initially, the total number of patients per cancer type was divided in stages using Brazilian epidemiological data. Subsequently, previously published tree arm diagrams were used to define the rate of patients requiring radiotherapy in each specific clinical setting. Finally, the clinical benefit of radiotherapy in overall survival was extracted from studies with level 1 evidence. Over 596 000 cancer cases were expected in Brazil in 2016. The public health system covers more than 75% of the Brazilian population and an estimated 111 432 patients who required radiotherapy in 2016 did not receive this treatment. Breast, colorectal and cervix cancers are the most frequent malignant tumours in women and prostate, lung and colorectal in men. The number of deaths due to a radiotherapy shortage in the year 2016 for these types of cancer were: (i) breast: 1011 deaths in 10 years; (ii) cervix: 2006 deaths in 2 years; (iii) lung: 1206 deaths in 2 years; (iv) prostate, intermediate risk: 562 deaths in 13 years; high risk: 298 deaths in 10 years; (v) colorectal: 0 deaths, as radiotherapy has no proven benefit in overall survival. Thousands of cancer patients requiring

  12. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to

  13. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  14. Peripheral Venous Access Ports: Outcomes Analysis in 109 Patients

    International Nuclear Information System (INIS)

    Bodner, Leonard J.; Nosher, John L.; Patel, Kaushik M.; Siegel, Randall L.; Biswal, Rajiv; Gribbin, Christopher E.; Tokarz, Robert

    2000-01-01

    Purpose: To perform a retrospective outcomes analysis of central venous catheters with peripheral venous access ports, with comparison to published data.Methods: One hundred and twelve central venous catheters with peripherally placed access ports were placed under sonographic guidance in 109 patients over a 4-year period. Ports were placed for the administration of chemotherapy, hyperalimentation, long-term antibiotic therapy, gamma-globulin therapy, and frequent blood sampling. A vein in the upper arm was accessed in each case and the catheter was passed to the superior vena cava or right atrium. Povidone iodine skin preparation was used in the first 65 port insertions. A combination of Iodophor solution and povidone iodine solution was used in the last 47 port insertions. Forty patients received low-dose (1 mg) warfarin sodium beginning the day after port insertion. Three patients received higher doses of warfarin sodium for preexistent venous thrombosis. Catheter performance and complications were assessed and compared with published data.Results: Access into the basilic or brachial veins was obtained in all cases. Ports remained functional for a total of 28,936 patient days. The port functioned in 50% of patients until completion of therapy, or the patient's expiration. Ports were removed prior to completion of therapy in 18% of patients. Eleven patients (9.9% of ports placed) suffered an infectious complication (0.38 per thousand catheter-days)-in nine, at the port implantation site, in two along the catheter. In all 11 instances the port was removed. Port pocket infection in the early postoperative period occurred in three patients (4.7%) receiving a Betadine prep vs two patients (4.2%) receiving a standard O.R. prep. This difference was not statistically significant (p = 0.9). Venous thrombosis occurred in three patients (6.8%) receiving warfarin sodium and in two patients (3%) not receiving warfarin sodium. This difference was not statistically significant

  15. National Geothermal Data System (USA): an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. Lee; Richard, Stephen; Blackman, Harold; Anderson, Arlene; Patten, Kim

    2014-05-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in April, 2014 will provide open access to millions of data records, sharing -relevant geoscience and longer term to land use data to propel geothermal development and production. NGDS serves information from all of the U.S. Department of Energy's sponsored development and research projects and geologic data from all 50 states, using free and open source software. This interactive online system is opening new exploration opportunities and potentially shortening project development by making data easily discoverable, accessible, and interoperable. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 6 million records online, including 1.72 million well headers (oil and gas, water, geothermal), 670,000 well logs, and 497,000 borehole temperatures and is growing rapidly. There are over 312 interoperable Web services and another 106 WMS (Web Map Services) registered in the system as of January, 2014. Companion projects run by Southern Methodist University and U.S. Geological Survey (USGS) are adding millions of additional data records. The DOE Geothermal Data Repository, currently hosted on OpenEI, is a system node and clearinghouse for data from hundreds of U.S. DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS complies with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with support from the US

  16. Reduction of the near-far effect in mobile communication systems with Code-Division Multiple-Access

    Science.gov (United States)

    Purchla, Magdalena

    2006-02-01

    In this paper the basic methods for reducing Multiple Access Interference (MAI) and combating the near-far effect in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) mobile communication systems are presented. MAI and the near-far effect are inevitable in DS-CDMA systems with quasi-orthogonal spreading sequences. An effective method of reducing MAI can increase the capacity of the system that is why so many researchers are working in this field. In this article three most important techniques of decreasing MAI are presented: power control, multiuser detection and space-time processing. There is a short introduction to each topic and one or more examples found in literature of algorithms suitable for practical applications (although not all algorithms are yet used in existing systems).

  17. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  18. Access the Unified Health System actions and services from the perspective of judicialization.

    Science.gov (United States)

    Ramos, Raquel de Souza; Gomes, Antonio Marcos Tosoli; de Oliveira, Denize Cristina; Marques, Sergio Corrêa; Spindola, Thelma; Nogueira, Virginia Paiva Figueiredo

    2016-01-01

    the judicialization of health is incorporated into the daily work of health institutions in Brazil through the court orders for access. In this study, the objective was to describe the contents of the social representations of access, through judicialization, for the health professionals. qualitative study based on Social Representations Theory, involving 40 professionals, at a teaching hospital and at the center for the regulation of beds and procedures in Rio de Janeiro. Forty semistructured interviews were held, to which the thematic-categorical content analysis technique was applied. the health professionals' attitude towards the reality the judicialization imposes is negative, but they acknowledge this resource as necessary in view of the public health crisis. Judicialization is considered a strategy to exercise citizenship that superimposes individual on collective law, increases social inequalities in access and compromises the efficacy of health policies. considering social representation as a determinant of practices, the representations that emerged can contribute to the change of the professionals' practices. Improvements in user care should be promoted, characterized as one of the main challenges to advance in universal access to health.

  19. Global review of open access risk assessment software packages valid for global or continental scale analysis

    Science.gov (United States)

    Daniell, James; Simpson, Alanna; Gunasekara, Rashmin; Baca, Abigail; Schaefer, Andreas; Ishizawa, Oscar; Murnane, Rick; Tijssen, Annegien; Deparday, Vivien; Forni, Marc; Himmelfarb, Anne; Leder, Jan

    2015-04-01

    Over the past few decades, a plethora of open access software packages for the calculation of earthquake, volcanic, tsunami, storm surge, wind and flood have been produced globally. As part of the World Bank GFDRR Review released at the Understanding Risk 2014 Conference, over 80 such open access risk assessment software packages were examined. Commercial software was not considered in the evaluation. A preliminary analysis was used to determine whether the 80 models were currently supported and if they were open access. This process was used to select a subset of 31 models that include 8 earthquake models, 4 cyclone models, 11 flood models, and 8 storm surge/tsunami models for more detailed analysis. By using multi-criteria analysis (MCDA) and simple descriptions of the software uses, the review allows users to select a few relevant software packages for their own testing and development. The detailed analysis evaluated the models on the basis of over 100 criteria and provides a synopsis of available open access natural hazard risk modelling tools. In addition, volcano software packages have since been added making the compendium of risk software tools in excess of 100. There has been a huge increase in the quality and availability of open access/source software over the past few years. For example, private entities such as Deltares now have an open source policy regarding some flood models (NGHS). In addition, leaders in developing risk models in the public sector, such as Geoscience Australia (EQRM, TCRM, TsuDAT, AnuGA) or CAPRA (ERN-Flood, Hurricane, CRISIS2007 etc.), are launching and/or helping many other initiatives. As we achieve greater interoperability between modelling tools, we will also achieve a future wherein different open source and open access modelling tools will be increasingly connected and adapted towards unified multi-risk model platforms and highly customised solutions. It was seen that many software tools could be improved by enabling user

  20. Finding the loopholes: a cross-sectional qualitative study of systemic barriers to treatment access for women drug court participants.

    Science.gov (United States)

    Morse, Diane S; Silverstein, Jennifer; Thomas, Katherine; Bedel, Precious; Cerulli, Catherine

    2015-12-01

    Therapeutic diversion courts seek to address justice-involved participants' underlying problems leading to their legal system involvement, including substance use disorder, psychiatric illness, and intimate partner violence. The courts have not addressed systemic hurdles, which can contribute to a cycle of substance use disorder and recidivism, which in turn hinder health and wellness. The study purpose is to explore the systemic issues faced by women participants in drug treatment court from multiple perspectives to understand how these issues may relate to health and wellness in their lives. Qualitative thematic framework analysis of five separate focus groups consisting of female drug treatment court participants, community providers, and court staff ( n = 25). Themes were mapped across the socio-ecological framework and contextualized according to social determinants of health. Numerous systemic factors impacted women's access to treatment. Laws and legal policies (governance) excluded those who could potentially have benefitted from therapeutic court and did not allow consideration of parenting issues. Macroeconomic policies limit housing options for those with convictions. Social policies limited transportation, education, and employment options. Public policies limited healthcare and social protection and ability to access available resources. Culture and societal values, including stigma, limited treatment options. By understanding the social determinant of health for women in drug treatment court and stakeholder's perceptions, the legal system can implement public policy to better address the health needs of women drug court participants.

  1. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-05] Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  2. Web accessibility of public universities in Andalusia

    Directory of Open Access Journals (Sweden)

    Luis Alejandro Casasola Balsells

    2017-06-01

    Full Text Available This paper describes an analysis conducted in 2015 to evaluate the accessibility of content on Andalusian public university websites. In order to determinate whether these websites are accessible, an assessment has been carried out to check conformance with the latest Web Content Accessibility Guidelines (WCAG 2.0 established by the World Wide Web Consortium (W3C. For this purpose, we have designed a methodology for analysis that combines the use of three automatic tools (eXaminator, MINHAP web accessibility tool, and TAW with a manual analysis to provide a greater reliability and validity of the results. Although the results are acceptable overall, a detailed analysis shows that more is still needed for achieving full accessibility for the entire university community. In this respect, we suggest several corrections to common accessibility errors for facilitating the design of university web portals.

  3. Free versus subsidised healthcare: options for fee exemptions, access to care for vulnerable groups and effects on the health system in Burkina Faso.

    Science.gov (United States)

    Yaogo, Maurice

    2017-07-12

    The many forms of healthcare fee exemptions implemented in Burkina Faso since the 2000s have varied between total exemption (free) and cost subsidisation. This article examines both options, their contextual variations and the ways in which they affect access to healthcare for vulnerable people as well as the operation of the health system. This research is part of an interdisciplinary regional program on the elimination of user fees for health services in West Africa (Burkina Faso, Mali and Niger). A conceptual framework and a chronological review of policy interventions are used as references to summarise the results of the three qualitative studies presented. Historical reference points are used to describe the emergence of healthcare fee exemption policies in Burkina Faso and the events that influenced their adoption. The joint analysis of opinions on options for fee exemption focuses on the different types of repercussions on access to healthcare and the operation of the health system. In conjunction with the twists and turns of the gradual development of a national health policy and in response to international recommendations, healthcare fee exemptions have evolved since colonisation. The limitations of the changes introduced with cost recovery and the barriers to healthcare access for the poorest people led to the adoption of the current sectorial fee exemptions. The results provide information on the reasons for the changes that have occurred over time. The nuanced perspectives of different categories of people surveyed about fee exemption options show that, beyond the perceived effects on healthcare access and the health system, the issue is one of more equitable governance. In principle, the fee exemption measures are intended to provide improved healthcare access for vulnerable groups. In practice, the negative effects on the operation of the health system advocate for reforms to harmonise the changes to multifaceted fee exemptions and the actual needs

  4. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    Science.gov (United States)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  5. Performance enhancement of successive interference cancellation scheme based on spectral amplitude coding for optical code-division multiple-access systems using Hadamard codes

    Science.gov (United States)

    Eltaif, Tawfig; Shalaby, Hossam M. H.; Shaari, Sahbudin; Hamarsheh, Mohammad M. N.

    2009-04-01

    A successive interference cancellation scheme is applied to optical code-division multiple-access (OCDMA) systems with spectral amplitude coding (SAC). A detailed analysis of this system, with Hadamard codes used as signature sequences, is presented. The system can easily remove the effect of the strongest signal at each stage of the cancellation process. In addition, simulation of the prose system is performed in order to validate the theoretical results. The system shows a small bit error rate at a large number of active users compared to the SAC OCDMA system. Our results reveal that the proposed system is efficient in eliminating the effect of the multiple-user interference and in the enhancement of the overall performance.

  6. Design and Implementation of a Web-based Monitoring System by using EPICS Channel Access Protocol

    International Nuclear Information System (INIS)

    An, Eun Mi; Song, Yong Gi

    2009-01-01

    Proton Engineering Frontier Project (PEFP) has developed a 20MeV proton accelerator, and established a distributed control system based on EPICS for sub-system components such as vacuum unit, beam diagnostics, and power supply system. The control system includes a real-time monitoring and alarm functions. From the aspect of a efficient maintenance of a control system and a additional extension of subsystems, EPICS software framework was adopted. In addition, a control system should be capable of providing an easy access for users and a real-time monitoring on a user screen. Therefore, we have implemented a new web-based monitoring server with several libraries. By adding DB module, the new IOC web monitoring system makes it possible to monitor the system through the web. By integrating EPICS Channel Access (CA) and Database libraries into a Database module, the web-based monitoring system makes it possible to monitor the sub-system status through user's internet browser. In this study, we developed a web based monitoring system by using EPICS IOC (Input Output Controller) with IBM server

  7. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Directory of Open Access Journals (Sweden)

    Line Neerup Handlos

    2016-09-01

    Full Text Available Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  8. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-01-01

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption. PMID:27657096

  9. Return Migrants' Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example.

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-09-19

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants' access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  10. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally......We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...

  11. Seismic Analysis for a Crane System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kang Soo; Lee, Chung Young; Ryu, Jeong Soo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2012-05-15

    The operation bridge used for an open-pool type research reactor is a crane system with a working deck for the handling of in-pool parts such as fuels, reactor components and reactor utilization facilities. The operation bridge allows operators to access the top of the reactor in the reactor pool and the fuel storage racks in the service pool. The operation bridge contains an operating platform mounted on a truck travelling on rails. Upright members are mounted on the truck to support the upper structure and two hoist monorails. The operation bridge consists of two hoists, upper girder frames, legs, cables, saddle frames, upper deck frames, lower deck frames, and the ladder. Static and dynamic analyses are performed to evaluate the structural integrity for the operation bridge for the required design loadings. The response spectrum analysis is employed as a dynamic analysis method

  12. Seismic Analysis for a Crane System

    International Nuclear Information System (INIS)

    Kim, Kang Soo; Lee, Chung Young; Ryu, Jeong Soo

    2012-01-01

    The operation bridge used for an open-pool type research reactor is a crane system with a working deck for the handling of in-pool parts such as fuels, reactor components and reactor utilization facilities. The operation bridge allows operators to access the top of the reactor in the reactor pool and the fuel storage racks in the service pool. The operation bridge contains an operating platform mounted on a truck travelling on rails. Upright members are mounted on the truck to support the upper structure and two hoist monorails. The operation bridge consists of two hoists, upper girder frames, legs, cables, saddle frames, upper deck frames, lower deck frames, and the ladder. Static and dynamic analyses are performed to evaluate the structural integrity for the operation bridge for the required design loadings. The response spectrum analysis is employed as a dynamic analysis method

  13. A spatial analysis of variations in health access: linking geography, socio-economic status and access perceptions

    Science.gov (United States)

    2011-01-01

    Background This paper analyses the relationship between public perceptions of access to general practitioners (GPs) surgeries and hospitals against health status, car ownership and geographic distance. In so doing it explores the different dimensions associated with facility access and accessibility. Methods Data on difficulties experienced in accessing health services, respondent health status and car ownership were collected through an attitudes survey. Road distances to the nearest service were calculated for each respondent using a GIS. Difficulty was related to geographic distance, health status and car ownership using logistic generalized linear models. A Geographically Weighted Regression (GWR) was used to explore the spatial non-stationarity in the results. Results Respondent long term illness, reported bad health and non-car ownership were found to be significant predictors of difficulty in accessing GPs and hospitals. Geographic distance was not a significant predictor of difficulty in accessing hospitals but was for GPs. GWR identified the spatial (local) variation in these global relationships indicating locations where the predictive strength of the independent variables was higher or lower than the global trend. The impacts of bad health and non-car ownership on the difficulties experienced in accessing health services varied spatially across the study area, whilst the impacts of geographic distance did not. Conclusions Difficulty in accessing different health facilities was found to be significantly related to health status and car ownership, whilst the impact of geographic distance depends on the service in question. GWR showed how these relationships were varied across the study area. This study demonstrates that the notion of access is a multi-dimensional concept, whose composition varies with location, according to the facility being considered and the health and socio-economic status of the individual concerned. PMID:21787394

  14. On Transform Domain Communication Systems under Spectrum Sensing Mismatch: A Deterministic Analysis.

    Science.gov (United States)

    Jin, Chuanxue; Hu, Su; Huang, Yixuan; Luo, Qu; Huang, Dan; Li, Yi; Gao, Yuan; Cheng, Shaochi

    2017-07-08

    Towards the era of mobile Internet and the Internet of Things (IoT), numerous sensors and devices are being introduced and interconnected. To support such an amount of data traffic, traditional wireless communication technologies are facing challenges both in terms of the increasing shortage of spectrum resources and massive multiple access. The transform-domain communication system (TDCS) is considered as an alternative multiple access system, where 5G and mobile IoT are mainly focused. However, previous studies about TDCS are under the assumption that the transceiver has the global spectrum information, without the consideration of spectrum sensing mismatch (SSM). In this paper, we present the deterministic analysis of TDCS systems under arbitrary given spectrum sensing scenarios, especially the influence of the SSM pattern to the signal to noise ratio (SNR) performance. Simulation results show that arbitrary SSM pattern can lead to inferior bit error rate (BER) performance.

  15. Immigrants' access to health insurance: no equality without awareness.

    Science.gov (United States)

    Dzúrová, Dagmar; Winkler, Petr; Drbohlav, Dušan

    2014-07-14

    The Czech government has identified commercial health insurance as one of the major problems for migrants' access to health care. Non-EU immigrants are eligible for public health insurance only if they have employee status or permanent residency. The present study examined migrants' access to the public health insurance system in Czechia. A cross-sectional survey of 909 immigrants from Ukraine and Vietnam was conducted in March and May 2013, and binary logistic regression was applied in data analysis. Among immigrants entitled to Czech public health insurance due to permanent residency/asylum, 30% were out of the public health insurance system, and of those entitled by their employment status, 50% were out of the system. Migrants with a poor knowledge of the Czech language are more likely to remain excluded from the system of public health insurance. Instead, they either remain in the commercial health insurance system or they simultaneously pay for both commercial and public health insurance, which is highly disadvantageous. Since there are no reasonable grounds to stay outside the public health insurance, it is concluded that it is lack of awareness that keeps eligible immigrants from entering the system. It is suggested that no equal access to health care exists without sufficient awareness about health care system.

  16. Immigrants’ Access to Health Insurance: No Equality without Awareness

    Directory of Open Access Journals (Sweden)

    Dagmar Dzúrová

    2014-07-01

    Full Text Available The Czech government has identified commercial health insurance as one of the major problems for migrants’ access to health care. Non-EU immigrants are eligible for public health insurance only if they have employee status or permanent residency. The present study examined migrants’ access to the public health insurance system in Czechia. A cross-sectional survey of 909 immigrants from Ukraine and Vietnam was conducted in March and May 2013, and binary logistic regression was applied in data analysis. Among immigrants entitled to Czech public health insurance due to permanent residency/asylum, 30% were out of the public health insurance system, and of those entitled by their employment status, 50% were out of the system. Migrants with a poor knowledge of the Czech language are more likely to remain excluded from the system of public health insurance. Instead, they either remain in the commercial health insurance system or they simultaneously pay for both commercial and public health insurance, which is highly disadvantageous. Since there are no reasonable grounds to stay outside the public health insurance, it is concluded that it is lack of awareness that keeps eligible immigrants from entering the system. It is suggested that no equal access to health care exists without sufficient awareness about health care system.

  17. Correlates of Strengthening Lessons from HIV/AIDS Treatment and Care Services in Ethiopia Perceived Access and Implications for Health System.

    Directory of Open Access Journals (Sweden)

    Bereket Yakob

    Full Text Available Access to healthcare is an important public health concept and has been traditionally measured by using population level parameters, such as availability, distribution and proximity of the health facilities in relation to the population. However, client based factors such as their expectations, experiences and perceptions which impact their evaluations of health care access were not well studied and integrated into health policy frameworks and implementation programs.This study aimed to investigate factors associated with perceived access to HIV/AIDS Treatment and care services in Wolaita Zone, Ethiopia.A cross-sectional survey was conducted on 492 people living with HIV, with 411 using ART and 81 using pre-ART services accessed at six public sector health facilities from November 2014 to March 2015. Data were analyzed using the ologit function of STATA. The variables explored consisted of socio-demographic and health characteristics, type of health facility, type of care, distance, waiting time, healthcare responsiveness, transportation convenience, satisfaction with service, quality of care, financial fairness, out of pocket expenses and HIV disclosure.Of the 492 participants, 294 (59.8% were females and 198 (40.2% were males, with a mean age of 38.8 years. 23.0% and 12.2% believed they had 'good' or 'very good' access respectively, and 64.8% indicated lower ratings. In the multivariate analysis, distance from the health facility, type of care, HIV clinical stage, out of pocket expenses, employment status, type of care, HIV disclosure and perceived transportation score were not associated with the perceived access (PA. With a unit increment in satisfaction, perceived quality of care, health system responsiveness, transportation convenience and perceived financial fairness scores, the odds of providing higher rating of PA increased by 29.0% (p<0.001, 6.0%(p<0.01, 100.0% (p<0.001, 9.0% (p<0.05 and 6.0% (p<0.05 respectively.Perceived quality of

  18. Associations between state minimum wage policy and health care access: a multi-level analysis of the 2004 Behavioral Risk Factor survey.

    Science.gov (United States)

    McCarrier, Kelly P; Martin, Diane P; Ralston, James D; Zimmerman, Frederick J

    2010-05-01

    Minimum wage policies have been advanced as mechanisms to improve the economic conditions of the working poor. Both positive and negative effects of such policies on health care access have been hypothesized, but associations have yet to be thoroughly tested. To examine whether the presence of minimum wage policies in excess of the federal standard of $5.15 per hour was associated with health care access indicators among low-skilled adults of working age, a cross-sectional analysis of 2004 Behavioral Risk Factor Surveillance System data was conducted. Self-reported health insurance status and experience with cost-related barriers to needed medical care were adjusted in multi-level logistic regression models to control for potential confounding at the state, county, and individual levels. State-level wage policy was not found to be associated with insurance status or unmet medical need in the models, providing early evidence that increased minimum wage rates may neither strengthen nor weaken access to care as previously predicted.

  19. Accessibility to the Public Facilities: A Mean to Achieve Civil Rights of the People with Disabilities in Iran

    Directory of Open Access Journals (Sweden)

    Roya Ghasemzadeh

    2008-09-01

    Full Text Available Objectives: Civil rights may cover different aspects of citizens’ lives. All the members of the society should have equal access to the public facilities and public transportation system. Barriers and obstacles in society may limit the accessibility of these facilities to the disabled people. Methods: This article contains a part of the results in a phenomenological study of the Disability Rights. The purpose of this phenomenological study was to describe experiences of disability rights among 11 physically disabled that were living in Tehran, Iran. The study involves secondary analysis of in-depth transcribed interview data, using colazzi’s method. Results: A total of 655 descriptive expressions were categorized in to 25 preliminary structural elements (sub themes. 7 essential structural elements (themes emerged from an analysis of the sub themes. One of these themes was right to access which was emerged from an analysis of 6 sub themes. Discussion: Disabled people who participated in the interviews. These sub themes that were obtained from an analysis of descriptive expressions of the participants, are: right to access to housing, right to access to education and information, right to access to job facilities, right to access to medical care and rehabilitation, right to access to rest, leisure and sport and right to access to places and transportation system. The right to access theme, was then categorized in to the civil rights field. In this article we will describe the right to access as it was experienced by those physically.

  20. The NASA Astrophysics Data System Free Access to the Astronomical Literature On-Line and through Email

    CERN Document Server

    Eichhorn, G; Grant, C S; Kurtz, M J; Murray, S S

    2001-01-01

    The Astrophysics Data System (ADS) provides access to the astronomical literature through the World Wide Web. It is a NASA funded project and access to all the ADS services is free to everybody world-wide.The ADS Abstract Service allows the searching of four databases with abstracts in Astronomy, Instrumentation, Physics/Geophysics, and the LANL Preprints with a total of over 2.2 million references. The system also provides access to reference and citation information, links to on-line data, electronic journal articles, and other on-line information. The ADS Article Service contains the articles for most of the astronomical literature back to volume 1. It contains the scanned pages of all the major journals (Astrophysical Journal, Astronomical Journal, Astronomy & Astrophysics, Monthly Notices of the Royal Astronomical Society, and Solar Physics), as well as most smaller journals back to volume 1. The ADS can be accessed through any web browser without signup or login. Alternatively an email interface is ...

  1. An integrated data-analysis and database system for AMS {sup 14}C

    Energy Technology Data Exchange (ETDEWEB)

    Kjeldsen, Henrik, E-mail: kjeldsen@phys.au.d [AMS 14C Dating Centre, Department of Physics and Astronomy, Aarhus University, Aarhus (Denmark); Olsen, Jesper [Department of Earth Sciences, Aarhus University, Aarhus (Denmark); Heinemeier, Jan [AMS 14C Dating Centre, Department of Physics and Astronomy, Aarhus University, Aarhus (Denmark)

    2010-04-15

    AMSdata is the name of a combined database and data-analysis system for AMS {sup 14}C and stable-isotope work that has been developed at Aarhus University. The system (1) contains routines for data analysis of AMS and MS data, (2) allows a flexible and accurate description of sample extraction and pretreatment, also when samples are split into several fractions, and (3) keeps track of all measured, calculated and attributed data. The structure of the database is flexible and allows an unlimited number of measurement and pretreatment procedures. The AMS {sup 14}C data analysis routine is fairly advanced and flexible, and it can be easily optimized for different kinds of measuring processes. Technically, the system is based on a Microsoft SQL server and includes stored SQL procedures for the data analysis. Microsoft Office Access is used for the (graphical) user interface, and in addition Excel, Word and Origin are exploited for input and output of data, e.g. for plotting data during data analysis.

  2. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  3. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  4. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  5. Design and Implementation of File Access and Control System Based on Dynamic Web

    Institute of Scientific and Technical Information of China (English)

    GAO Fuxiang; YAO Lan; BAO Shengfei; YU Ge

    2006-01-01

    A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained.

  6. 28 CFR 16.71 - Exemption of the Office of the Deputy Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Attorney General System-limited access. 16.71 Section 16.71 Judicial Administration DEPARTMENT OF JUSTICE....71 Exemption of the Office of the Deputy Attorney General System—limited access. (a) The following... of the Office of the Deputy Attorney General (JUSTICE/DAG-013). (d) In addition, the Drug Enforcement...

  7. Object based data access at the D0 experiment

    International Nuclear Information System (INIS)

    Fuess, S.

    1995-11-01

    The D OE Experiment at Fermilab is currently participating in the FNAL Computing Division's ''Computing for Analysis Project'' (CAP) to investigate object based data storage and access. Following a short description of the CAP system architecture, the D OE data model is explored. A brief discussion of the method of operation of the CAP system leads into a concluding section

  8. Implications of access hole size on tank waste retrieval system design and cost

    International Nuclear Information System (INIS)

    Babcock, S.M.; Kwon, D.S.; Burks, B.L.; Stoughton, R.S.; Evans, M.S.

    1994-05-01

    The DOE Environmental Restoration and Waste Management Robotics Technology Development Program has been investigating the application of robotics technology to the retrieval of waste from single-shell storage tanks for several years. The use of a large, ''long-reach'' manipulator to position and orient a variety of tools and other equipment has been recommended. The objective of this study is to determine the appropriate access hole size for the tank waste retrieval system installation. Previous reports on the impact of access hole size on manipulator performance are summarized. In addition, the practical limitation for access hole size based on structural limitations of the waste storage tanks, the state-of-the-art size limitations for the installation of new risers, the radiation safety implications of various access hole sizes, and overall system cost implications are considered. Basic conclusions include: (1) overall cost of remediation will; be dominated by the costs of the balance of plant and time required to perform the task rather than the cost of manipulator hardware or the cost of installing a riser, (2) the most desirable solution from a manipulator controls point of view is to make the manipulator as stiff as possible and have as high as possible a natural frequency, which implies a large access hole diameter, (3) beyond some diameter; simple, uniform cross-section elements become less advantageous from a weight standpoint and alternative structures should be considered, and (4) additional shielding and contamination control measures would be required for larger holes. Parametric studies summarized in this report considered 3,790,000 1 (1,000,000 gal) tanks, while initial applications are likely to be for 2,840,000 1 (750,000 gal) tanks. Therefore, the calculations should be somewhat conservative, recognizing the limitations of the specific conditions considered

  9. Performance Analysis of SAC Optical PPM-CDMA System-Based Interference Rejection Technique

    Science.gov (United States)

    Alsowaidi, N.; Eltaif, Tawfig; Mokhtar, M. R.

    2016-03-01

    In this paper, we aim to theoretically analyse optical code division multiple access (OCDMA) system that based on successive interference cancellation (SIC) using pulse position modulation (PPM), considering the interference between the users, imperfection cancellation occurred during the cancellation process and receiver noises. Spectral amplitude coding (SAC) scheme is used to suppress the overlapping between the users and reduce the receiver noises effect. The theoretical analysis of the multiple access interference (MAI)-limited performance of this approach indicates the influence of the size of M-ary PPM on OCDMA system. The OCDMA system performance improves with increasing M-ary PPM. Therefore, it was found that the SIC/SAC-OCDMA system using PPM technique along with modified prime (MPR) codes used as signature sequence code offers significant improvement over the one without cancellation and it can support up to 103 users at the benchmarking value of bit error rate (BER) = 10-9 with prime number p = 11 while the system without cancellation scheme can support only up to 52 users.

  10. Onco-STS: a web-based laboratory information management system for sample and analysis tracking in oncogenomic experiments.

    Science.gov (United States)

    Gavrielides, Mike; Furney, Simon J; Yates, Tim; Miller, Crispin J; Marais, Richard

    2014-01-01

    Whole genomes, whole exomes and transcriptomes of tumour samples are sequenced routinely to identify the drivers of cancer. The systematic sequencing and analysis of tumour samples, as well other oncogenomic experiments, necessitates the tracking of relevant sample information throughout the investigative process. These meta-data of the sequencing and analysis procedures include information about the samples and projects as well as the sequencing centres, platforms, data locations, results locations, alignments, analysis specifications and further information relevant to the experiments. The current work presents a sample tracking system for oncogenomic studies (Onco-STS) to store these data and make them easily accessible to the researchers who work with the samples. The system is a web application, which includes a database and a front-end web page that allows the remote access, submission and updating of the sample data in the database. The web application development programming framework Grails was used for the development and implementation of the system. The resulting Onco-STS solution is efficient, secure and easy to use and is intended to replace the manual data handling of text records. Onco-STS allows simultaneous remote access to the system making collaboration among researchers more effective. The system stores both information on the samples in oncogenomic studies and details of the analyses conducted on the resulting data. Onco-STS is based on open-source software, is easy to develop and can be modified according to a research group's needs. Hence it is suitable for laboratories that do not require a commercial system.

  11. Electrical impedance tomography system: an open access circuit design

    Directory of Open Access Journals (Sweden)

    Soleimani Manuchehr

    2006-05-01

    Full Text Available Abstract Background This paper reports a simple 2-D system for electrical impedance tomography EIT, which works efficiently and is low cost. The system has been developed in the Sharif University of Technology Tehran-Iran (for the author's MSc Project. Methods The EIT system consists of a PC in which an I/O card is installed with an external current generator, a multiplexer, a power supply and a phantom with an array of electrodes. The measurement system provides 12-bit accuracy and hence, suitable data acquisition software has been prepared accordingly. The synchronous phase detection method has been implemented for voltage measurement. Different methods of image reconstruction have been used with this instrument to generate electrical conductivity images. Results The results of simulation and real measurement of the system are presented. The reconstruction programs were written in MATLAB and the data acquisition software in C++. The system has been tested with both static and dynamic mode in a 2-D domain. Better results have been produced in the dynamic mode of operation, due to the cancellation of errors. Conclusion In the spirit of open access publication the design details of this simple EIT system are made available here.

  12. [Inequalities in access to and utilization of dental care in Brazil: an analysis of the Telephone Survey Surveillance System for Risk and Protective Factors for Chronic Diseases (VIGITEL 2009)].

    Science.gov (United States)

    Peres, Marco A; Iser, Betine Pinto Moehlecke; Boing, Antonio Fernando; Yokota, Renata Tiene de Carvalho; Malta, Deborah Carvalho; Peres, Karen Glazer

    2012-01-01

    This study aimed to evaluate access to and utilization of various types of dental services by individuals 18 years or older in Brazil's State capitals. We gathered data from the Telephone Survey Surveillance System for Risk and Protective Factors for Chronic Diseases (VIGITEL) in 2009 (n = 54,367). More than half of the target population reported the need for dental treatment in the previous year; of these, 15.2% lacked access to dental services when needed. The private sector provided 61.1% of all dental appointments. The share of services provided by the Unified National Health System (SUS) ranged from 6.2% in the Federal District to 35.2% in Boa Vista, in the North. Multivariate Poisson regression models showed higher prevalence of dental treatment needs among women, middle-aged adults, and individuals with more schooling. Lack of access to dental care was more frequent among women, young adults, less educated individuals, and among lightener-skinned blacks. Our findings highlight sharp inequalities in the use of and access to dental services in the Brazilian State capitals.

  13. A Real-time License Plate Detection System for Parking Access

    Directory of Open Access Journals (Sweden)

    Roenadi Koesdijarto

    2010-08-01

    Full Text Available The automatic and real-time license plate detection system can be used as an access control entry of vehicles into the parking area. The problem is how to recognize the vehicles that will go into the parking lot and how to recognize various types of license plates in various light conditions quickly and accurately. In this research, the prototype was developed with a detection system to recognize the vehicles that will enter the parking area, and a license plate recognition system. In the license plate recognition system, the Fourier transform and Hidden Markov model method have proposed to detect location of license plate and as characters segmentation to recognize Indonesia license plates. The research results have shown that the developed prototype system has successfully recognized all Indonesia license plates in several of light condition and camera position. The percentage of plate recognition in the real-time experiment is 84.38%, and the average execution time for all recognition process is 5.834 second.

  14. Canadian CANDU plant data systems for technical surveillance and analysis

    International Nuclear Information System (INIS)

    Deverno, M.; Pothier, H.; Xian, C.; Grosbois, J. De; Bosnich, M.

    1996-01-01

    Plant data systems are emerging as a critical plant support system technology. In particular, plant-wide Historical Data Systems (HDS) are pivotal to the successful implementation of technical surveillance and analysis programs supporting plant operations, maintenance, safety, and licensing activities. In partnership with Canadian CANDU utility and design organizations, AECL has conducted a review of current Canadian CANDU HDS approaches with emphasis on understanding the existing functionality and uses of plant historical data systems, their future needs and benefits. The results is a vision of a plant-wide HDS providing seamless access to both near real-time and historical data, user tool-kits for data visualization and analysis, and data management of the large volume of data acquired during the life of a plant. The successful implementation of the HDS vision will lead to higher capability and capacity factors while minimizing Operations, Maintenance, and Administration (OM and A) costs. (author). 5 refs, 3 figs

  15. Canadian CANDU plant data systems for technical surveillance and analysis

    Energy Technology Data Exchange (ETDEWEB)

    Deverno, M; Pothier, H; Xian, C [Atomic Energy of Canada Ltd., Control Centre Technology Branch, Fredericton, NB (Canada); Grosbois, J De; Bosnich, M [Atomic Energy of Canada Ltd., Control Centre Technology Branch, Chalk River, ON (Canada). Chalk River Labs.

    1997-12-31

    Plant data systems are emerging as a critical plant support system technology. In particular, plant-wide Historical Data Systems (HDS) are pivotal to the successful implementation of technical surveillance and analysis programs supporting plant operations, maintenance, safety, and licensing activities. In partnership with Canadian CANDU utility and design organizations, AECL has conducted a review of current Canadian CANDU HDS approaches with emphasis on understanding the existing functionality and uses of plant historical data systems, their future needs and benefits. The results is a vision of a plant-wide HDS providing seamless access to both near real-time and historical data, user tool-kits for data visualization and analysis, and data management of the large volume of data acquired during the life of a plant. The successful implementation of the HDS vision will lead to higher capability and capacity factors while minimizing Operations, Maintenance, and Administration (OM and A) costs. (author). 5 refs, 3 figs.

  16. Integrated minicomputer alpha analysis system

    International Nuclear Information System (INIS)

    Vasilik, D.G.; Coy, D.E.; Seamons, M.; Henderson, R.W.; Romero, L.L.; Thomson, D.A.

    1978-01-01

    Approximately 1,000 stack and occupation air samples from plutonium and uranium facilities at LASL are analyzed daily. The concentrations of radio-nuclides in air are determined by measuring absolute alpha activities of particulates collected on air sample filter media. The Integrated Minicomputer Pulse system (IMPULSE) is an interface between many detectors of extremely simple design and a Digital Equipment Corporation (DEC) PDP-11/04 minicomputer. The detectors are photomultiplier tubes faced with zinc sulfide (ZnS). The average detector background is approximately 0.07 cpm. The IMPULSE system includes two mainframes, each of which can hold up to 64 detectors. The current hardware configuration includes 64 detectors in one mainframe and 40 detectors in the other. Each mainframe contains a minicomputer with 28K words of Random Access Memory. One minicomputer controls the detectors in both mainframes. A second computer was added for fail-safe redundancy and to support other laboratory computer requirements. The main minicomputer includes a dual floppy disk system and a dual DEC 'RK05' disk system for mass storage. The RK05 facilitates report generation and trend analysis. The IMPULSE hardware provides for passage of data from the detectors to the computer, and for passage of status and control information from the computer to the detector stations

  17. Evaluation on the Occupational Information Access System as Used at Churchill High School. A Project Report.

    Science.gov (United States)

    McKinlay, Bruce; Adams, Daniel

    The Occupational Information Access System (OIAS) improves the accessibility of occupational labor market information for career planning. Its operation at Churchill High School is evaluated from several angels: the likes and dislikes of users; the effect of OIAS on users' knowledge of occupational information and on their career plans; why other…

  18. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  19. Assessing the impact of a medical image access system

    Science.gov (United States)

    McNeill, Kevin M.; Maloney, Kris; Parra, Miguel V.; Ovitt, Theron W.; Dallas, William J.

    1994-05-01

    We have developed and installed a Medical Image Access System in an intensive care unit. Images are acquired and transmitted automatically to this system, thus expanding on the previous results of Shile et. al. It is our goal to determine what effect regular, sustained availability of image data in the clinic has on the Intensive Care Unit and the Department of Radiology. Our system is installed and has been in regular use in the hospital since late August of 1993. Since the time of installation we have been collecting usage information from both the manual and automated systems. From this data we are performing the standard measures established by DeSimone et. al. Our initial results support the original findings that image availability in the clinic leads to earlier patient care decision based on the image data. However, our findings do not seem to indicate that there is a breakdown of communication between the clinician and the radiologist as a result of the use of the clinical display system. In addition to the established measure we are investigating other criteria to measure time saved by both the clinician and radiologist. The results are reported in this paper.

  20. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    International Nuclear Information System (INIS)

    Taylor, C.L.; O'Rourke, J.E.; Allirot, D.; O'Connor, K.

    1980-09-01

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report

  1. Access the Unified Health System actions and services from the perspective of judicialization

    Directory of Open Access Journals (Sweden)

    Raquel de Souza Ramos

    Full Text Available Objective: the judicialization of health is incorporated into the daily work of health institutions in Brazil through the court orders for access. In this study, the objective was to describe the contents of the social representations of access, through judicialization, for the health professionals. Method: qualitative study based on Social Representations Theory, involving 40 professionals, at a teaching hospital and at the center for the regulation of beds and procedures in Rio de Janeiro. Forty semistructured interviews were held, to which the thematic-categorical content analysis technique was applied. Results: the health professionals' attitude towards the reality the judicialization imposes is negative, but they acknowledge this resource as necessary in view of the public health crisis. Judicialization is considered a strategy to exercise citizenship that superimposes individual on collective law, increases social inequalities in access and compromises the efficacy of health policies. Conclusion: considering social representation as a determinant of practices, the representations that emerged can contribute to the change of the professionals' practices. Improvements in user care should be promoted, characterized as one of the main challenges to advance in universal access to health.

  2. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  3. Indexing of ATLAS data management and analysis system metadata

    CERN Document Server

    Grigoryeva, Maria; The ATLAS collaboration

    2017-01-01

    This manuscript is devoted to the development of the system to manage metainformation of modern HENP experiments. The main purpose of the system is to provide scientists with transparent access to the actual and historical metadata related to data analysis, processing and modeling. The system design addresses the following goals : providing a flexible and fast search for metadata on various combinations of keywords, generating aggregated reports, categorized according to selected parameters, such as the studied physical process, scientific topic, physical group, etc. The article presents the architecture of the developed indexing and search system, as well as the results of performance tests. The comparison of the query execution speed within the developed system and in case of querying the original relational databases showed that the developed system provides results faster. Also the new system allows much more complex search requests, than the original storages.

  4. Complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard system

    CSIR Research Space (South Africa)

    Adebesin, F

    2010-10-01

    Full Text Available and used by people with varying abilities. Although accessibility concerns are aimed at making systems usable for people with disabilities, support for direct accessibility, the built-in redundancies in an application that enable as many people as possible...

  5. Access to medication in the Public Health System and equity: populational health surveys in São Paulo, Brazil.

    Science.gov (United States)

    Monteiro, Camila Nascimento; Gianini, Reinaldo José; Barros, Marilisa Berti de Azevedo; Cesar, Chester Luiz Galvão; Goldbaum, Moisés

    2016-03-01

    Since 2003, the access to medication has been increasing in Brazil and particularly in São Paulo. The present study aimed to analyze the access to medication obtained in the public sector and the socioeconomic differences in this access in 2003 and 2008. Also, we explored the difference in access to medication from 2003 to 2008. Data were obtained from two cross-sectional population-based household surveys from São Paulo, Brazil (ISA-Capital 2003 and ISA-Capital 2008). Concentration curve and concentration index were calculated to analyze the associations between socioeconomic factors and access to medication in the public sector. Additionally, the differences between 2003 and 2008 regarding socioeconomic characteristics and access to medication were studied. Access to medication was 89.55% in 2003 and 92.99% in 2008, and the proportion of access to medication did not change in the period. Access in the public sector increased from 26.40% in 2003 to 48.55% in 2008 and there was a decrease in the concentration index between 2003 and 2008 in access to medication in the public sector. The findings indicate an expansion of Brazilian Unified Health System (Sistema Único de Saúde ) users, with the inclusion of people of higher socioeconomic position in the public sector. As the SUS gives more support to people of lower socioeconomic position in terms of medication provision, the SUS tends to equity. Nevertheless, universal coverage for medication and equity in access to medication in the public sector are still challenges for the Brazilian public health system.

  6. CASSys: an integrated software-system for the interactive analysis of ChIP-seq data

    Directory of Open Access Journals (Sweden)

    Alawi Malik

    2011-06-01

    Full Text Available The mapping of DNA-protein interactions is crucial for a full understanding of transcriptional regulation. Chromatin-immunoprecipitation followed bymassively parallel sequencing (ChIP-seq has become the standard technique for analyzing these interactions on a genome-wide scale. We have developed a software system called CASSys (ChIP-seq data Analysis Software System spanning all steps of ChIP-seq data analysis. It supersedes the laborious application of several single command line tools. CASSys provides functionality ranging from quality assessment and -control of short reads, over the mapping of reads against a reference genome (readmapping and the detection of enriched regions (peakdetection to various follow-up analyses. The latter are accessible via a state-of-the-art web interface and can be performed interactively by the user. The follow-up analyses allow for flexible user defined association of putative interaction sites with genes, visualization of their genomic context with an integrated genome browser, the detection of putative binding motifs, the identification of over-represented Gene Ontology-terms, pathway analysis and the visualization of interaction networks. The system is client-server based, accessible via a web browser and does not require any software installation on the client side. To demonstrate CASSys’s functionality we used the system for the complete data analysis of a publicly available Chip-seq study that investigated the role of the transcription factor estrogen receptor-α in breast cancer cells.

  7. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    Iyengar, R.D.; Verma, P.B.; Prasad, V.V.S.S.; George, Jain R.; Das, Tripti; Deshmukh, D.K.

    2001-01-01

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  8. STINGRAY: system for integrated genomic resources and analysis.

    Science.gov (United States)

    Wagner, Glauber; Jardim, Rodrigo; Tschoeke, Diogo A; Loureiro, Daniel R; Ocaña, Kary A C S; Ribeiro, Antonio C B; Emmel, Vanessa E; Probst, Christian M; Pitaluga, André N; Grisard, Edmundo C; Cavalcanti, Maria C; Campos, Maria L M; Mattoso, Marta; Dávila, Alberto M R

    2014-03-07

    The STINGRAY system has been conceived to ease the tasks of integrating, analyzing, annotating and presenting genomic and expression data from Sanger and Next Generation Sequencing (NGS) platforms. STINGRAY includes: (a) a complete and integrated workflow (more than 20 bioinformatics tools) ranging from functional annotation to phylogeny; (b) a MySQL database schema, suitable for data integration and user access control; and (c) a user-friendly graphical web-based interface that makes the system intuitive, facilitating the tasks of data analysis and annotation. STINGRAY showed to be an easy to use and complete system for analyzing sequencing data. While both Sanger and NGS platforms are supported, the system could be faster using Sanger data, since the large NGS datasets could potentially slow down the MySQL database usage. STINGRAY is available at http://stingray.biowebdb.org and the open source code at http://sourceforge.net/projects/stingray-biowebdb/.

  9. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright... nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological... the final rule governing exemption to prohibition on circumvention of copyright protection systems for...

  10. NGNP Data Management and Analysis System Analysis and Web Delivery Capabilities

    Energy Technology Data Exchange (ETDEWEB)

    Cynthia D. Gentillon

    2010-09-01

    Projects for the Very High Temperature Reactor Technology Development Office provide data in support of Nuclear Regulatory Commission licensing of the very high temperature reactor. Fuel and materials to be used in the reactor are tested and characterized to quantify performance in high-temperature and high-fluence environments. In addition, thermal-hydraulic experiments are conducted to validate codes used to assess reactor safety. The Very High Temperature Reactor Technology Development Office has established the NGNP Data Management and Analysis System (NDMAS) at the Idaho National Laboratory to ensure that very high temperature reactor data are (1) qualified for use, (2) stored in a readily accessible electronic form, and (3) analyzed to extract useful results. This document focuses on the third NDMAS objective. It describes capabilities for displaying the data in meaningful ways and for data analysis to identify useful relationships among the measured quantities.

  11. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  12. Open access to high-level data and analysis tools in the CMS experiment at the LHC

    International Nuclear Information System (INIS)

    Calderon, A; Rodriguez-Marrero, A; Colling, D; Huffman, A; Lassila-Perini, K; McCauley, T; Rao, A; Sexton-Kennedy, E

    2015-01-01

    The CMS experiment, in recognition of its commitment to data preservation and open access as well as to education and outreach, has made its first public release of high-level data under the CC0 waiver: up to half of the proton-proton collision data (by volume) at 7 TeV from 2010 in CMS Analysis Object Data format. CMS has prepared, in collaboration with CERN and the other LHC experiments, an open-data web portal based on Invenio. The portal provides access to CMS public data as well as to analysis tools and documentation for the public. The tools include an event display and histogram application that run in the browser. In addition a virtual machine containing a CMS software environment along with XRootD access to the data is available. Within the virtual machine the public can analyse CMS data; example code is provided. We describe the accompanying tools and documentation and discuss the first experiences of data use. (paper)

  13. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  14. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  15. ANALYSIS OF SOCIAL MEDIA’S ACCESS; RELATION TO CHARACTER OF VOCATIONAL STUDENT IN BOGOR

    Directory of Open Access Journals (Sweden)

    Sudi Herlin Rahmawati

    2014-05-01

    Full Text Available Recently, the existence of social media in Indonesia is consequence of acculturation both of culture and technology. This study aimed to analyze the relation of social media on the teenagers’ character development, particularly responsibility, respectful, and courtesy. The observation was conducted in two vocational private high schools in Bogor, West Java Province. The selected schools were chosen as schools with high involvement on juvenile delinquency such as gang fight, drugs, and free-sex based on the data from local government official. Total participants were 100 students consist of 50 male and 50 female students at 1st and 2nd grade. Based on the analysis, there was significant difference between male and female student on accessing the social media (both on intensity and content. Females’ scored higher than male in accessing Facebook, Twitter, YouTube, etc. On average, females’ use of social media was between 2-3 hours per day, whereas for male it was only 1 hour. However, male had greater access to pornography than the females. The study found significant correlation between media social intensity and content access with the character. Highly teenagers’ access to social media; correlate with the low of responsibility, respectful and courtesy character. 

  16. Enhancing Access to Drought Information Using the CUAHSI Hydrologic Information System

    Science.gov (United States)

    Schreuders, K. A.; Tarboton, D. G.; Horsburgh, J. S.; Sen Gupta, A.; Reeder, S.

    2011-12-01

    The National Drought Information System (NIDIS) Upper Colorado River Basin pilot study is investigating and establishing capabilities for better dissemination of drought information for early warning and management. As part of this study we are using and extending functionality from the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS) to provide better access to drought-related data in the Upper Colorado River Basin. The CUAHSI HIS is a federated system for sharing hydrologic data. It is comprised of multiple data servers, referred to as HydroServers, that publish data in a standard XML format called Water Markup Language (WaterML), using web services referred to as WaterOneFlow web services. HydroServers can also publish geospatial data using Open Geospatial Consortium (OGC) web map, feature and coverage services and are capable of hosting web and map applications that combine geospatial datasets with observational data served via web services. HIS also includes a centralized metadata catalog that indexes data from registered HydroServers and a data access client referred to as HydroDesktop. For NIDIS, we have established a HydroServer to publish drought index values as well as the input data used in drought index calculations. Primary input data required for drought index calculation include streamflow, precipitation, reservoir storages, snow water equivalent, and soil moisture. We have developed procedures to redistribute the input data to the time and space scales chosen for drought index calculation, namely half monthly time intervals for HUC 10 subwatersheds. The spatial redistribution approaches used for each input parameter are dependent on the spatial linkages for that parameter, i.e., the redistribution procedure for streamflow is dependent on the upstream/downstream connectivity of the stream network, and the precipitation redistribution procedure is dependent on elevation to account

  17. Characterisation of some Accessions of Indigenous Rice (Oryza glaberrima Steud) in Ghana

    Energy Technology Data Exchange (ETDEWEB)

    Doku, H. A

    2011-07-15

    about 51.5% of the diversity found among populations. Analysis of caryopsis for content of essential mineral elements revealed significant variation among accessions. Awerema and N/4 contained the highest amount of Fe and Zn at 38.66 mg/kg and 30.1 mg/kg respectively. Both marker systems revealed a high degree of variation among the accessions suggesting great genetic diversity among local accessions of African rice, which can be utilized in future breeding programmes. The accessions Awerema and N/4 showed superior traits and are therefore recommended for breeding purposes. (au)

  18. Characterisation of some Accessions of Indigenous Rice (Oryza glaberrima Steud) in Ghana

    International Nuclear Information System (INIS)

    Doku, H. A

    2011-07-01

    about 51.5% of the diversity found among populations. Analysis of caryopsis for content of essential mineral elements revealed significant variation among accessions. Awerema and N/4 contained the highest amount of Fe and Zn at 38.66 mg/kg and 30.1 mg/kg respectively. Both marker systems revealed a high degree of variation among the accessions suggesting great genetic diversity among local accessions of African rice, which can be utilized in future breeding programmes. The accessions Awerema and N/4 showed superior traits and are therefore recommended for breeding purposes. (au)

  19. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  20. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  1. New capabilities in the HENP grand challenge storage access system and its application at RHIC

    International Nuclear Information System (INIS)

    Bernardo, L.; Gibbard, B.; Malon, D.; Nordberg, H.; Olson, D.; Porter, R.; Shoshani, A.; Sim, A.; Vaniachine, A.; Wenaus, T.; Wu, K.; Zimmerman, D.

    2000-01-01

    The High Energy and Nuclear Physics Data Access Grand Challenge project has developed an optimizing storage access software system that was prototyped at RHIC. It is currently undergoing integration with the STAR experiment in preparation for data taking that starts in mid-2000. The behavior and lessons learned in the RHIC Mock Data Challenge exercises are described as well as the observed performance under conditions designed to characterize scalability. Up to 250 simultaneous queries were tested and up to 10 million events across 7 event components were involved in these queries. The system coordinates the staging of ''bundles'' of files from the HPSS tape system, so that all the needed components of each event are in disk cache when accessed by the application software. The caching policy algorithm for the coordinated bundle staging is described in the paper. The initial prototype implementation interfaced to the Objectivity/DB. In this latest version, it evolved to work with arbitrary files and use CORBA interfaces to the tag database and file catalog services. The interface to the tag database and the MySQL-based file catalog services used by STAR are described along with the planned usage scenarios

  2. Housing and Food Insecurity, Care Access, and Health Status Among the Chronically Ill: An Analysis of the Behavioral Risk Factor Surveillance System.

    Science.gov (United States)

    Charkhchi, Paniz; Fazeli Dehkordy, Soudabeh; Carlos, Ruth C

    2018-05-01

    The proportion of the United States population with chronic illness continues to rise. Understanding the determinants of quality of care-particularly social determinants-is critical to the provision of care in this population. To estimate the prevalence of housing and food insecurity among persons with common chronic conditions and to assess the independent effects of chronic illness and sociodemographic characteristics on (1) housing and food insecurity, and (2) health care access hardship and health status. Cross-sectional study. We used data from the 11 states and one territory that completed the social context module of the 2015 Behavioral Risk Factor Surveillance System (BRFSS). We estimated the prevalence of housing and food insecurity among patients with cancer, stroke, cardiovascular disease, and chronic lung disease. Logistic regression models were used to assess the independent effects of housing and food insecurity, chronic conditions, and demographics on health care access and health status. Among the chronically ill, 36.71% (95% CI: 35.54-37.88) experienced housing insecurity and 30.60% (95% CI: 29.49-31.71) experienced food insecurity. Cardiovascular and lung disease increased the likelihood of housing (OR 1.69, 95% CI: 1.07-2.66 and OR 1.71, 95% CI: 1.12-2.60, respectively) and food insecurity (OR 1.75, 95% CI: 1.12-2.73 and OR 1.78, 95% CI: 1.20-2.63, respectively). Housing and food insecurity significantly increased the risk of health care access hardship. Being insured or having an income level above 200% of the federal poverty level significantly reduced the likelihood of access hardship, while female gender significantly increased the likelihood. Chronic illness independently affects housing and food insecurity. In turn, food and housing anxiety leads to reduced access to care, likely due to cost concerns, and correlates with poorer health. A more complete understanding of the pathways by which chronic illness influences social determinants and

  3. Optimising LAN access to grid enabled storage elements

    International Nuclear Information System (INIS)

    Stewart, G A; Dunne, B; Elwell, A; Millar, A P; Cowan, G A

    2008-01-01

    When operational, the Large Hadron Collider experiments at CERN will collect tens of petabytes of physics data per year. The worldwide LHC computing grid (WLCG) will distribute this data to over two hundred Tier-1 and Tier-2 computing centres, enabling particle physicists around the globe to access the data for analysis. Although different middleware solutions exist for effective management of storage systems at collaborating institutes, the patterns of access envisaged for Tier-2s fall into two distinct categories. The first involves bulk transfer of data between different Grid storage elements using protocols such as GridFTP. This data movement will principally involve writing ESD and AOD files into Tier-2 storage. Secondly, once datasets are stored at a Tier-2, physics analysis jobs will read the data from the local SE. Such jobs require a POSIX-like interface to the storage so that individual physics events can be extracted. In this paper we consider the performance of POSIX-like access to files held in Disk Pool Manager (DPM) storage elements, a popular lightweight SRM storage manager from EGEE

  4. Remote access to an interferometric fringes stabilization active system via RENATA

    Science.gov (United States)

    Espitia-Gómez, Javier; Ángel-Toro, Luciano

    2013-11-01

    The Advanced Technology National Network (RENATA, for its acronym in Spanish) is a Colombian, collaborative work tool, linked to other networks worldwide, in which take participation researchers, teachers and students, by sharing laboratory resources located in different universities, institutes and research centers throughout the country. In the Universidad EAFIT (Medellín, Colombia) it has been designed an interferometric fringes stabilization active system, which can be accessed remotely via the RENATA network. A Mach-Zehnder interferometer was implemented, with independent piezoelectric actuators in each arm, with which the lengths of optical path of light that goes over in each of them can be modified. Using these actuators, one can simultaneously perturb the system and compensate the phase differences caused by that perturbation. This allows us to experiment with different disturbs, and analyze the system response to each one of them. This can be made from any location worldwide, and especially from those regions in which optical and optoelectronic components required for the implementation of the interferometer or for the stabilization system are not available. The device can also be used as a platform in order to conduct diverse experiments, involving optical and controlling aspects, constituting with this in a pedagogic tool. For the future, it can be predicted that remote access to available applications would be possible, as well as modifications of the implemented code in labVIEW™, so that researchers and teachers can adapt and improve their functionalities or develop new applications, based on the collaborative work.

  5. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  6. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  7. A new model with an anatomically accurate human renal collecting system for training in fluoroscopy-guided percutaneous nephrolithotomy access.

    Science.gov (United States)

    Turney, Benjamin W

    2014-03-01

    Obtaining renal access is one of the most important and complex steps in learning percutaneous nephrolithotomy (PCNL). Ideally, this skill should be practiced outside the operating room. There is a need for anatomically accurate and cheap models for simulated training. The objective was to develop a cost-effective, anatomically accurate, nonbiologic training model for simulated PCNL access under fluoroscopic guidance. Collecting systems from routine computed tomography urograms were extracted and reformatted using specialized software. These images were printed in a water-soluble plastic on a three-dimensional (3D) printer to create biomodels. These models were embedded in silicone and then the models were dissolved in water to leave a hollow collecting system within a silicone model. These PCNL models were filled with contrast medium and sealed. A layer of dense foam acted as a spacer to replicate the tissues between skin and kidney. 3D printed models of human collecting systems are a useful adjunct in planning PCNL access. The PCNL access training model is relatively low cost and reproduces the anatomy of the renal collecting system faithfully. A range of models reflecting the variety and complexity of human collecting systems can be reproduced. The fluoroscopic triangulation process needed to target the calix of choice can be practiced successfully in this model. This silicone PCNL training model accurately replicates the anatomic architecture and orientation of the human renal collecting system. It provides a safe, clean, and effective model for training in accurate fluoroscopy-guided PCNL access.

  8. Open access to scientific publications - an analysis of the barriers to change

    Directory of Open Access Journals (Sweden)

    Professor Bo-Christer Björk

    2004-01-01

    Full Text Available One of the effects of the Internet is that the dissemination of scientific publications in a few years has migrated to electronic formats. The basic business practices between libraries and publishers for selling and buying the content have, however, not changed much. Scientists have in protest against the high subscription prices of mainstream publishers started Open Access (OA journals and e-print repositories, which distribute scientific information freely. Despite widespread agreement among academics that OA would be the optimal distribution mode for publicly financed research results, OA channels still constitute only a marginal phenomenon in the global scholarly communication system. This paper discusses, in view of the experiences of the last ten years, the many barriers hindering a rapid proliferation of Open Access. The discussion is structured according to the main OA channels; peer-reviewed journals for primary publishing, subject-specific and institutional repositories for secondary parallel publishing. It also discusses the types of barriers, which can be classified as: legal framework, IT-infrastructure, business models, indexing services and standards, academic reward system, marketing and critical mass.

  9. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  10. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  11. Interactive, open source, travel time scenario modelling: tools to facilitate participation in health service access analysis.

    Science.gov (United States)

    Fisher, Rohan; Lassa, Jonatan

    2017-04-18

    Modelling travel time to services has become a common public health tool for planning service provision but the usefulness of these analyses is constrained by the availability of accurate input data and limitations inherent in the assumptions and parameterisation. This is particularly an issue in the developing world where access to basic data is limited and travel is often complex and multi-modal. Improving the accuracy and relevance in this context requires greater accessibility to, and flexibility in, travel time modelling tools to facilitate the incorporation of local knowledge and the rapid exploration of multiple travel scenarios. The aim of this work was to develop simple open source, adaptable, interactive travel time modelling tools to allow greater access to and participation in service access analysis. Described are three interconnected applications designed to reduce some of the barriers to the more wide-spread use of GIS analysis of service access and allow for complex spatial and temporal variations in service availability. These applications are an open source GIS tool-kit and two geo-simulation models. The development of these tools was guided by health service issues from a developing world context but they present a general approach to enabling greater access to and flexibility in health access modelling. The tools demonstrate a method that substantially simplifies the process for conducting travel time assessments and demonstrate a dynamic, interactive approach in an open source GIS format. In addition this paper provides examples from empirical experience where these tools have informed better policy and planning. Travel and health service access is complex and cannot be reduced to a few static modeled outputs. The approaches described in this paper use a unique set of tools to explore this complexity, promote discussion and build understanding with the goal of producing better planning outcomes. The accessible, flexible, interactive and

  12. Airspace Systems Program: Next Generation Air Transportation System, NextGen Systems Analysis, Integration and Evaluation Project. Version 1.0; Project Plan

    Science.gov (United States)

    Quon, Leighton

    2010-01-01

    The key objectives of the NASA ASP are to: Improve mobility, capacity efficiency and access of the airspace system. Improve collaboration, predictability, and flexibility for the airspace users. Enable accurate modeling and simulation of air transportation systems. Accommodate operations of all classes of aircraft. Maintain system safety and environmental protection. In support of these program objectives, the major goal of the NextGen-SAIE Project is to enable the transition of key capacity and efficiency improvements to the NAS. Since many aspects of the NAS are unique to specific airport or airspace environments, demand on various parts of the NAS is not expected to increase equally as system demand grows. SAIE will provide systems level analysis of the NAS characteristics, constraints, and demands such that a suite of capacity-increasing concepts and technologies for system solutions are enabled and facilitated. The technical objectives in support of this goal are the following: Integration, evaluation, and transition of more mature concepts and technologies in an environment that faithfully emulates real-world complexities. Interoperability research and analysis of ASP technologies across ATM functions is performed to facilitate integration and take ASP concepts and technologies to higher Technology Readiness Level (TRL). Analyses are conducted on the program s concepts to identify the system benefits or impacts. System level analysis is conducted to increase understanding of the characteristics and constraints of airspace system and its domains.

  13. Demonstrating High-Accuracy Orbital Access Using Open-Source Tools

    Science.gov (United States)

    Gilbertson, Christian; Welch, Bryan

    2017-01-01

    Orbit propagation is fundamental to almost every space-based analysis. Currently, many system analysts use commercial software to predict the future positions of orbiting satellites. This is one of many capabilities that can replicated, with great accuracy, without using expensive, proprietary software. NASAs SCaN (Space Communication and Navigation) Center for Engineering, Networks, Integration, and Communications (SCENIC) project plans to provide its analysis capabilities using a combination of internal and open-source software, allowing for a much greater measure of customization and flexibility, while reducing recurring software license costs. MATLAB and the open-source Orbit Determination Toolbox created by Goddard Space Flight Center (GSFC) were utilized to develop tools with the capability to propagate orbits, perform line-of-sight (LOS) availability analyses, and visualize the results. The developed programs are modular and can be applied for mission planning and viability analysis in a variety of Solar System applications. The tools can perform 2 and N-body orbit propagation, find inter-satellite and satellite to ground station LOS access (accounting for intermediate oblate spheroid body blocking, geometric restrictions of the antenna field-of-view (FOV), and relativistic corrections), and create animations of planetary movement, satellite orbits, and LOS accesses. The code is the basis for SCENICs broad analysis capabilities including dynamic link analysis, dilution-of-precision navigation analysis, and orbital availability calculations.

  14. Expanding Access with Satellite-Enabled Distance Education

    Directory of Open Access Journals (Sweden)

    Qi Wang

    2006-12-01

    Full Text Available Education and training became increasingly critical for citizens of every nation during the last century, and that paradigm will be no less true, throughout the 21st Century. As the world progresses fully into an information society, access to information and to a knowledge-based work force is a precondition for any country to remain competitive. Education, and increasingly distant education (DE, plays a vital role in turning human resources into knowledge workers. Information and communications technologies (ICT have provided new ways to educate and to disseminate information that is crucial for creating these competitive, knowledge-based work forces. Modern DE, enabled by ICT-based networks and the Internet tools, offers great advantages that are leveling the global playing field, in terms of providing access and opportunities for specialized training and education. Using satellite technology in DE may be imperative to developing countries, where the majority of their populations are scattered in rural and remote areas. Where the traditional brick and mortar classrooms cannot easily reach, satellite-powered DE systems can. Through literature review and rational analysis, this paper examines how satellite-assisted DE systems expand education access.

  15. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Directory of Open Access Journals (Sweden)

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  16. 智能门禁系统设计要点探讨%Discussion on the Design of Intelligent Access Control System

    Institute of Scientific and Technical Information of China (English)

    朱矩龙

    2015-01-01

    Access control system is the basis and security of the use of building security, the use of advanced technology to design intelligent access control system is conducive to improve the safety of the building. Discusses a based on TM card intelligent access control system design, expounds the main problems existing in traditional access control system, comprehensive description of the hardware design and software design of the intelligent access control system, and the system is simulated and tested.%门禁系统是建筑使用安全性的基础和保障,使用先进技术对智能门禁系统进行设计有利于提高建筑的安全性能。探讨了一种基于TM卡技术的智能门禁系统设计,阐述了传统门禁系统存在的主要问题,综合说明了智能门禁系统的硬件设计和软件设计,并对系统进行了仿真测试。

  17. Socioeconomic determinants of accessibility to birth registration in Lao PDR.

    Science.gov (United States)

    Nomura, Marika; Xangsayarath, Phonepadith; Takahashi, Kenzo; Kamiya, Yusuke; Siengsounthone, Latsamy; Ogino, Hina; Kobayashi, Jun

    2018-01-08

    The global coverage rate of birth registration is only around 65% for the population of children under five although birth registration secures protection and access to health services that are fundamental rights for all babies. This study aimed to perform a basic analysis of the accessibility to birth registration to better understand how to improve the birth registration system in the Lao PDR. For the analysis of birth registration and related socioeconomic factors, 9576 mother-child pairs were chosen from the data set of The Lao Social Indicator Survey 2011-12. After bivariate analysis with statistical tests including the chi-square test were conducted, logistic regression was performed to determine the variables that statistically influence accessibility to birth registration. Ethno-geographic factors and place of delivery were observed to be the factors associated with birth registration in this analysis. Many mothers in the Lao PDR deliver in their local communities. Therefore, capacity development of various human resources, such as Skilled Birth Attendant, to support the local administrative procedure of birth registration in their communities could be one option to overcoming the bottlenecks in the birth registration process in the Lao PDR.

  18. On the Performance of One Stage Massive Random Access Protocols in 5G Systems

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Pratas, Nuno; Jacobsen, Thomas

    2016-01-01

    use case. Smart utility meters, automated sensors in farms, and vehicle tracking nodes for logistics monitoring are all examples of emerging mMTC devices. Ensuring efficient mechanisms to access the wireless channel for such a massive number of densely deployed devices is a key challenge posed by m......MTC applications. A framework for the comparative analysis of the one-stage massive access protocol with respect to important performance metrics for mMTC services is proposed in this paper. The proposed framework allows us to determine the scenarios where the relative simple one-stage protocol can sufficiently...

  19. Performance analysis of incoherent multi-wavelength OCDMA systems under the impact of four-wave mixing.

    Science.gov (United States)

    Dang, Ngoc T; Pham, Anh T

    2010-05-10

    In this paper, we comprehensively analyze the impact of four wave mixing (FWM) on the performance of incoherent multi-wavelength optical code-division multiple-access (MW-OCDMA) systems. We also consider many other interferences and noises, including multiple access interference, optical beating interference, and receiver noise, in the analysis. From the numerical results, we can find the power ranges of different MW-OCDMA systems, in which the impact of FWM is dominant and consequently results in an increase in the bit-error rate of the systems. We also find that the impact of FWM becomes more severe when the frequency spacing is small and/or dispersion-shifted fiber is used. In addition, we quantitatively discuss the impact of FWM on the number of supportable users and power penalty in the MW-OCDMA systems. (c) 2010 Optical Society of America.

  20. Design of Nutrition Catering System for Athletes Based on Access Database

    OpenAIRE

    Hongjiang Wu,; Haiyan Zhao; Xugang Liu; Mingshun Xing

    2015-01-01

    In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO) and Structure Query Language (SQL) were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring n...

  1. Framing access to medicines in developing countries: an analysis of media coverage of Canada's Access to Medicines Regime.

    Science.gov (United States)

    Esmail, Laura C; Phillips, Kaye; Kuek, Victoria; Cosio, Andrea Perez; Kohler, Jillian Clare

    2010-01-04

    In September 2003, the Canadian government committed to developing legislation that would facilitate greater access to affordable medicines for developing countries. Over the course of eight months, the legislation, now known as Canada's Access to Medicines Regime (CAMR), went through a controversial policy development process and the newspaper media was one of the major venues in which the policy debates took place. The purpose of this study was to examine how the media framed CAMR to determine how policy goals were conceptualized, which stakeholder interests controlled the public debate and how these variables related to the public policy process. We conducted a qualitative content analysis of newspaper coverage of the CAMR policy and implementation process from 2003-2008. The primary theoretical framework for this study was framing theory. A total of 90 articles from 11 Canadian newspapers were selected for inclusion in our analysis. A team of four researchers coded the articles for themes relating to access to medicines and which stakeholders' voice figured more prominently on each issue. Stakeholders examined included: the research-based industry, the generic industry, civil society, the Canadian government, and developing country representatives. The most frequently mentioned themes across all documents were the issues of drug affordability, intellectual property, trade agreements and obligations, and development. Issues such as human rights, pharmaceutical innovation, and economic competitiveness got little media representation. Civil society dominated the media contents, followed far behind by the Canadian government, the research-based and generic pharmaceutical industries. Developing country representatives were hardly represented in the media. Media framing obscured the discussion of some of the underlying policy goals in this case and failed to highlight issues which are now significant barriers to the use of the legislation. Using the media to engage

  2. Analysis of the a genome genetic diversity among brassica napus, b. rapa and b. juncea accessions using specific simple sequence repeat markers

    International Nuclear Information System (INIS)

    Tian, H.; Yan, J.; Zhang, R.; Guo, Y.; Hu, S.; Channa, S.A.

    2017-01-01

    This investigation was aimed at evaluating the genetic diversity of 127 accessions among Brassica napus, B. rapa, and B. juncea by using 15 pairs of the A genome specific simple sequence repeat primers. These 127 accessions could be clearly separated into three groups by cluster analysis, principal component analysis, and population structure analysis separately, and the results analyzed by the three methods were very similar. Group I comprised of mainly B. napus accessions and the most of B. juncea accessions formed Group II, Group III included nearly all of the B. rapa accessions. The result showed that 36.86% of the variance was due to significant differences among populations of species, indicated that abundance genetic diversity existed among the A genome of B. napus, B. rapa, and B. juncea accessions. B. napus, B. rapa, and B. juncea have the abundant genetic diversity in the A genome, and some elite genes can be used to broaden the genetic base of them, especially for B. napus, in future rapeseed breeding program. (author)

  3. Nuclear power plant control room crew task analysis database: SEEK system. Users manual

    International Nuclear Information System (INIS)

    Burgy, D.; Schroeder, L.

    1984-05-01

    The Crew Task Analysis SEEK Users Manual was prepared for the Office of Nuclear Regulatory Research of the US Nuclear Regulatory Commission. It is designed for use with the existing computerized Control Room Crew Task Analysis Database. The SEEK system consists of a PR1ME computer with its associated peripherals and software augmented by General Physics Corporation SEEK database management software. The SEEK software programs provide the Crew Task Database user with rapid access to any number of records desired. The software uses English-like sentences to allow the user to construct logical sorts and outputs of the task data. Given the multiple-associative nature of the database, users can directly access the data at the plant, operating sequence, task or element level - or any combination of these levels. A complete description of the crew task data contained in the database is presented in NUREG/CR-3371, Task Analysis of Nuclear Power Plant Control Room Crews (Volumes 1 and 2)

  4. On-Chip Fluorescence Switching System for Constructing a Rewritable Random Access Data Storage Device.

    Science.gov (United States)

    Nguyen, Hoang Hiep; Park, Jeho; Hwang, Seungwoo; Kwon, Oh Seok; Lee, Chang-Soo; Shin, Yong-Beom; Ha, Tai Hwan; Kim, Moonil

    2018-01-10

    We report the development of on-chip fluorescence switching system based on DNA strand displacement and DNA hybridization for the construction of a rewritable and randomly accessible data storage device. In this study, the feasibility and potential effectiveness of our proposed system was evaluated with a series of wet experiments involving 40 bits (5 bytes) of data encoding a 5-charactered text (KRIBB). Also, a flexible data rewriting function was achieved by converting fluorescence signals between "ON" and "OFF" through DNA strand displacement and hybridization events. In addition, the proposed system was successfully validated on a microfluidic chip which could further facilitate the encoding and decoding process of data. To the best of our knowledge, this is the first report on the use of DNA hybridization and DNA strand displacement in the field of data storage devices. Taken together, our results demonstrated that DNA-based fluorescence switching could be applicable to construct a rewritable and randomly accessible data storage device through controllable DNA manipulations.

  5. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  6. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  7. A Systemic Analysis of Land Markets and Land Institutions in West African Cities : Rules and Practices--The Case of Bamako, Mali

    OpenAIRE

    Durand-Lasserve, Alain; Durand-Lasserve, Maylis; Selod, Harris

    2013-01-01

    This paper presents a new type of land market analysis relevant to cities with plural tenure systems as in West Africa. The methodology hinges on a systemic analysis of land delivery channels, which helps to show how land is initially made available for circulation, how tenure can be formalized incrementally, and the different means whereby households can access land. The analysis is appli...

  8. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  9. Website accessibility in the tourism industry: an analysis of official national tourism organization websites around the world.

    Science.gov (United States)

    Domínguez Vila, Trinidad; Alén González, Elisa; Darcy, Simon

    2017-08-09

    To analyze the accessibility of official national tourism organization websites of countries around the world, in order to establish possible common patterns and rankings of those with exemplary practice through to those with the highest number of issues. The purpose for undertaking such an analysis is to provide a quasi-indicator of inclusive organizational practice for online accessibility for both destination managers and their accessible tourism consumers - domestic and overseas people with disability visiting the websites. The official tourism websites of 210 countries included in the latest World Tourism Organization report were analyzed. A website accessibility evaluation tool (website accessible test) was used in the analysis, according to AA and AAA levels of conformance to Web Content Accessibility Guidelines 2.0 requirements. Different patterns compliance to Web Content Accessibility Guidelines 2.0 were established for the clusters, which were rather similar for both AA and AAA conformance levels. The main issues in the least accessible websites were also identified, mainly focused on the following guidelines: navigable, compatible, adaptability, text alternatives and also referred to other assistive technologies. Once the main issues were established several alternatives are suggested to address them, such as implementing more prescriptive laws and regulations, complying with mandatory benchmark standards and/or having external agencies audit website designs. However, in addition to using benchmark standards, efforts to improve this situation should also be made by programmers, who should also rely on preexistent experiences and develop more dynamic knowledge. This knowledge may include text alternatives for any nontext content; creation of content that can be presented in different ways without losing information; provide ways to help users navigate, find content, determine where they are and navigate websites to maximize compatibility with assistive

  10. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  11. Access to healthcare and financial risk protection for older adults in Mexico: secondary data analysis of a national survey.

    Science.gov (United States)

    Doubova, Svetlana V; Pérez-Cuevas, Ricardo; Canning, David; Reich, Michael R

    2015-07-21

    While the benefits of Seguro Popular health insurance in Mexico relative to no insurance have been widely documented, little has been reported on its effects relative to the pre-existing Social Security health insurance. We analyse the effects of Social Security and Seguro Popular health insurances in Mexico on access to healthcare of older adults, and on financial risk protection to their households, compared with older adults without health insurance. Secondary data analysis was performed using the 2012 Mexican Survey of Health and Nutrition (ENSANUT). The study population comprised 18,847 older adults and 13,180 households that have an elderly member. The dependent variables were access to healthcare given the reported need, the financial burden imposed by health expenditures measured through catastrophic health-related expenditures, and using savings for health-related expenditures. Separate propensity score matching analyses were conducted for each comparison. The analysis for access was performed at the individual level, and the analysis for financial burden at the household level. In each case, matching on a wide set of relevant characteristics was achieved. Seguro Popular showed a protective effect against lack of access to healthcare for older adults compared with those with no insurance. The average treatment effect on the treated (ATET) was ascertained through using the nearest-neighbour matching (-8.1%, t-stat -2.305) analysis. However, Seguro Popular did not show a protective effect against catastrophic expenditures in a household where an older adult lived. Social Security showed increased access to healthcare (ATET -11.3%, t-stat -3.138), and protective effect against catastrophic expenditures for households with an elderly member (ATET -1.9%, t-stat -2.178). Seguro Popular increased access to healthcare for Mexican older adults. Social Security showed a significant protective effect against lack of access and catastrophic expenditures compared with

  12. Test-Access Planning and Test Scheduling for Embedded Core-Based System Chips

    OpenAIRE

    Goel, Sandeep Kumar

    2005-01-01

    Advances in the semiconductor process technology enable the creation of a complete system on one single die, the so-called system chip or SOC. To reduce time-to-market for large SOCs, reuse of pre-designed and pre-veried blocks called cores is employed. Like the design style, testing of SOCs can be best approached in a core-based fashion. In order to enable core-based test development, an embedded core should be isolated from its surrounding circuitry and electrical test access from chip pins...

  13. Spatial analysis of cattle and shoat population in Ethiopia: growth trend, distribution and market access.

    Science.gov (United States)

    Leta, Samson; Mesele, Frehiwot

    2014-01-01

    The livestock subsector has an enormous contribution to Ethiopia's national economy and livelihoods of many Ethiopians. The subsector contributes about 16.5% of the national Gross Domestic Product (GDP) and 35.6% of the agricultural GDP. It also contributes 15% of export earnings and 30% of agricultural employment. The livestock subsector currently support and sustain livelihoods for 80% of all rural population. The GDP of livestock related activities valued at 59 billion birr. Ethiopian livestock population trends, distribution and marketing vary considerably across space and time due to a variety of reasons. This study was aimed to assess cattle and shoat population growth trend, distribution and their access to market. Regression analysis was used to assess the cattle and shoat population growth trend and Geographic Information Systems (GIS) techniques were used to determine the spatial distribution of cattle and shoats, and their relative access to market. The data sets used are agricultural census (2001/02) and annual CSA agricultural sample survey (1995/96 to 2012/13). In the past eighteen years, the livestock population namely cattle, sheep and goat grew from 54.5 million to over 103.5 million with average annual increment of 3.4 million. The current average national cattle, sheep and goat population per km(2) are estimated to be 71, 33 and 29 respectively (excluding Addis Ababa, Afar and Somali regions). From the total livestock population the country owns about 46% cattle, 43% sheep and 40% goats are reared within 10 km radius from major livestock market centres and all-weather roads. On the other hand, three fourth of the country's land mass which comprises 15% of the cattle, 20% of the sheep and 21% of goat population is not accessible to market (greater than 30 km from major livestock market centres). It is found that the central highland regions account for the largest share of livestock population and also more accessible to market. Defining the

  14. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  15. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  16. ZBIT Bioinformatics Toolbox: A Web-Platform for Systems Biology and Expression Data Analysis.

    Science.gov (United States)

    Römer, Michael; Eichner, Johannes; Dräger, Andreas; Wrzodek, Clemens; Wrzodek, Finja; Zell, Andreas

    2016-01-01

    Bioinformatics analysis has become an integral part of research in biology. However, installation and use of scientific software can be difficult and often requires technical expert knowledge. Reasons are dependencies on certain operating systems or required third-party libraries, missing graphical user interfaces and documentation, or nonstandard input and output formats. In order to make bioinformatics software easily accessible to researchers, we here present a web-based platform. The Center for Bioinformatics Tuebingen (ZBIT) Bioinformatics Toolbox provides web-based access to a collection of bioinformatics tools developed for systems biology, protein sequence annotation, and expression data analysis. Currently, the collection encompasses software for conversion and processing of community standards SBML and BioPAX, transcription factor analysis, and analysis of microarray data from transcriptomics and proteomics studies. All tools are hosted on a customized Galaxy instance and run on a dedicated computation cluster. Users only need a web browser and an active internet connection in order to benefit from this service. The web platform is designed to facilitate the usage of the bioinformatics tools for researchers without advanced technical background. Users can combine tools for complex analyses or use predefined, customizable workflows. All results are stored persistently and reproducible. For each tool, we provide documentation, tutorials, and example data to maximize usability. The ZBIT Bioinformatics Toolbox is freely available at https://webservices.cs.uni-tuebingen.de/.

  17. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    Science.gov (United States)

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  18. Microsoft DirectAccess best practices and troubleshooting

    CERN Document Server

    Krause, Jordan

    2013-01-01

    This book covers best practices and acts as a complete guide to DirectAccess and automatic remote access.Microsoft DirectAccess Best Practices and Troubleshooting is an ideal guide for any existing or future DirectAccess administrator and system administrators who are working on Windows Server 2012. This book will also be beneficial for someone with a basic knowledge of networking and deployment of Microsoft operating systems and software who wants to learn the intricacies of DirectAccess and its interfaces.

  19. [Use of indicators of geographical accessibility to primary health care centers in addressing inequities].

    Science.gov (United States)

    De Pietri, Diana; Dietrich, Patricia; Mayo, Patricia; Carcagno, Alejandro; de Titto, Ernesto

    2013-12-01

    Characterize geographical indicators in relation to their usefulness in measuring regional inequities, identify and describe areas according to their degree of geographical accessibility to primary health care centers (PHCCs), and detect populations at risk from the perspective of access to primary care. Analysis of spatial accessibility using geographic information systems (GIS) involved three aspects: population without medical coverage, distribution of PHCCs, and the public transportation network connecting them. The development of indicators of demand (real, potential, and differential) and analysis of territorial factors affecting population mobility enabled the characterization of PHCCs with regard to their environment, thereby contributing to local and regional analysis and to the detection of different zones according to regional connectivity levels. Indicators developed in a GIS environment were very useful in analyzing accessibility to PHCCs by vulnerable populations. Zoning the region helped identify inequities by differentiating areas of unmet demand and fragmentation of spatial connectivity between PHCCs and public transportation.

  20. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…